Rocky Linux: RLSA-2021:4356 kernel security
Summary
An update for kernel is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
RPMs
bpftool-4.18.0-348.el8.0.2.aarch64.rpm
bpftool-4.18.0-348.el8.0.2.x86_64.rpm
bpftool-debuginfo-4.18.0-348.el8.0.2.aarch64.rpm
bpftool-debuginfo-4.18.0-348.el8.0.2.x86_64.rpm
kernel-4.18.0-348.el8.0.2.aarch64.rpm
kernel-4.18.0-348.el8.0.2.src.rpm
kernel-4.18.0-348.el8.0.2.x86_64.rpm
kernel-abi-stablelists-4.18.0-348.el8.0.2.noarch.rpm
kernel-core-4.18.0-348.el8.0.2.aarch64.rpm
kernel-core-4.18.0-348.el8.0.2.x86_64.rpm
kernel-cross-headers-4.18.0-348.el8.0.2.aarch64.rpm
kernel-cross-headers-4.18.0-348.el8.0.2.x86_64.rpm
kernel-debug-4.18.0-348.el8.0.2.aarch64.rpm
kernel-debug-4.18.0-348.el8.0.2.x86_64.rpm
kernel-debug-core-4.18.0-348.el8.0.2.aarch64.rpm
kernel-debug-core-4.18.0-348.el8.0.2.x86_64.rpm
kernel-debug-debuginfo-4.18.0-348.el8.0.2.aarch64.rpm
kernel-debug-debuginfo-4.18.0-348.el8.0.2.x86_64.rpm
kernel-debug-devel-4.18.0-348.el8.0.2.aarch64.rpm
kernel-debug-devel-4.18.0-348.el8.0.2.x86_64.rpm
kernel-debuginfo-4.18.0-348.el8.0.2.aarch64.rpm
kernel-debuginfo-4.18.0-348.el8.0.2.x86_64.rpm
kernel-debuginfo-common-aarch64-4.18.0-348.el8.0.2.aarch64.rpm
kernel-debuginfo-common-x86_64-4.18.0-348.el8.0.2.x86_64.rpm
kernel-debug-modules-4.18.0-348.el8.0.2.aarch64.rpm
kernel-debug-modules-4.18.0-348.el8.0.2.x86_64.rpm
kernel-debug-modules-extra-4.18.0-348.el8.0.2.aarch64.rpm
kernel-debug-modules-extra-4.18.0-348.el8.0.2.x86_64.rpm
kernel-devel-4.18.0-348.el8.0.2.aarch64.rpm
kernel-devel-4.18.0-348.el8.0.2.x86_64.rpm
kernel-doc-4.18.0-348.el8.0.2.noarch.rpm
kernel-headers-4.18.0-348.el8.0.2.aarch64.rpm
kernel-headers-4.18.0-348.el8.0.2.x86_64.rpm
kernel-modules-4.18.0-348.el8.0.2.aarch64.rpm
kernel-modules-4.18.0-348.el8.0.2.x86_64.rpm
kernel-modules-extra-4.18.0-348.el8.0.2.aarch64.rpm
kernel-modules-extra-4.18.0-348.el8.0.2.x86_64.rpm
kernel-rt-4.18.0-348.rt7.130.el8.0.2.src.rpm
kernel-rt-4.18.0-348.rt7.130.el8.0.2.x86_64.rpm
kernel-rt-core-4.18.0-348.rt7.130.el8.0.2.x86_64.rpm
kernel-rt-debug-4.18.0-348.rt7.130.el8.0.2.x86_64.rpm
kernel-rt-debug-core-4.18.0-348.rt7.130.el8.0.2.x86_64.rpm
kernel-rt-debug-debuginfo-4.18.0-348.rt7.130.el8.0.2.x86_64.rpm
kernel-rt-debug-devel-4.18.0-348.rt7.130.el8.0.2.x86_64.rpm
kernel-rt-debuginfo-4.18.0-348.rt7.130.el8.0.2.x86_64.rpm
kernel-rt-debuginfo-common-x86_64-4.18.0-348.rt7.130.el8.0.2.x86_64.rpm
kernel-rt-debug-modules-4.18.0-348.rt7.130.el8.0.2.x86_64.rpm
kernel-rt-debug-modules-extra-4.18.0-348.rt7.130.el8.0.2.x86_64.rpm
kernel-rt-devel-4.18.0-348.rt7.130.el8.0.2.x86_64.rpm
kernel-rt-modules-4.18.0-348.rt7.130.el8.0.2.x86_64.rpm
kernel-rt-modules-extra-4.18.0-348.rt7.130.el8.0.2.x86_64.rpm
kernel-tools-4.18.0-348.el8.0.2.aarch64.rpm
kernel-tools-4.18.0-348.el8.0.2.x86_64.rpm
kernel-tools-debuginfo-4.18.0-348.el8.0.2.aarch64.rpm
kernel-tools-debuginfo-4.18.0-348.el8.0.2.x86_64.rpm
kernel-tools-libs-4.18.0-348.el8.0.2.aarch64.rpm
kernel-tools-libs-4.18.0-348.el8.0.2.x86_64.rpm
kernel-tools-libs-devel-4.18.0-348.el8.0.2.aarch64.rpm
kernel-tools-libs-devel-4.18.0-348.el8.0.2.x86_64.rpm
perf-4.18.0-348.el8.0.2.aarch64.rpm
perf-4.18.0-348.el8.0.2.x86_64.rpm
perf-debuginfo-4.18.0-348.el8.0.2.aarch64.rpm
perf-debuginfo-4.18.0-348.el8.0.2.x86_64.rpm
python3-perf-4.18.0-348.el8.0.2.aarch64.rpm
python3-perf-4.18.0-348.el8.0.2.x86_64.rpm
python3-perf-debuginfo-4.18.0-348.el8.0.2.aarch64.rpm
python3-perf-debuginfo-4.18.0-348.el8.0.2.x86_64.rpm
References
No References
CVEs
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0129.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28950.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3573.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3600.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3635.json
Fixes
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=