Rocky Linux: RLSA-2021:1586 GNOME security
Summary
An update for GNOME is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
RPMs
webkit2gtk3-2.30.4-1.el8.aarch64.rpm
webkit2gtk3-2.30.4-1.el8.i686.rpm
webkit2gtk3-2.30.4-1.el8.src.rpm
webkit2gtk3-2.30.4-1.el8.x86_64.rpm
webkit2gtk3-debuginfo-2.30.4-1.el8.aarch64.rpm
webkit2gtk3-debuginfo-2.30.4-1.el8.i686.rpm
webkit2gtk3-debuginfo-2.30.4-1.el8.x86_64.rpm
webkit2gtk3-debugsource-2.30.4-1.el8.aarch64.rpm
webkit2gtk3-debugsource-2.30.4-1.el8.i686.rpm
webkit2gtk3-debugsource-2.30.4-1.el8.x86_64.rpm
webkit2gtk3-devel-2.30.4-1.el8.aarch64.rpm
webkit2gtk3-devel-2.30.4-1.el8.i686.rpm
webkit2gtk3-devel-2.30.4-1.el8.x86_64.rpm
webkit2gtk3-devel-debuginfo-2.30.4-1.el8.aarch64.rpm
webkit2gtk3-devel-debuginfo-2.30.4-1.el8.i686.rpm
webkit2gtk3-devel-debuginfo-2.30.4-1.el8.x86_64.rpm
webkit2gtk3-jsc-2.30.4-1.el8.aarch64.rpm
webkit2gtk3-jsc-2.30.4-1.el8.i686.rpm
webkit2gtk3-jsc-2.30.4-1.el8.x86_64.rpm
webkit2gtk3-jsc-debuginfo-2.30.4-1.el8.aarch64.rpm
webkit2gtk3-jsc-debuginfo-2.30.4-1.el8.i686.rpm
webkit2gtk3-jsc-debuginfo-2.30.4-1.el8.x86_64.rpm
webkit2gtk3-jsc-devel-2.30.4-1.el8.aarch64.rpm
webkit2gtk3-jsc-devel-2.30.4-1.el8.i686.rpm
webkit2gtk3-jsc-devel-2.30.4-1.el8.x86_64.rpm
webkit2gtk3-jsc-devel-debuginfo-2.30.4-1.el8.aarch64.rpm
webkit2gtk3-jsc-devel-debuginfo-2.30.4-1.el8.i686.rpm
webkit2gtk3-jsc-devel-debuginfo-2.30.4-1.el8.x86_64.rpm
References
No References
CVEs
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1817.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1820.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1825.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1826.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30661.json
Fixes
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=