Rocky Linux: RLSA-2021:4356 kernel security | LinuxSecurity.com
\{'type': 'Security', 'shortCode': 'RL', 'name': 'RLSA-2021:4356', 'synopsis': 'Moderate: kernel security, bug fix, and enhancement update', 'severity': 'Moderate', 'topic': 'An update for kernel is now available for Rocky Linux 8.\nRocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.', 'description': 'The kernel packages contain the Linux kernel, the core of any Linux operating system.', 'solution': None, 'affectedProducts': ['Rocky Linux 8'], 'fixes': ['1509204', '1793880', '1816493', '1900844', '1903244', '1906522', '1912683', '1913348', '1915825', '1919893', '1921958', '1923636', '1930376', '1930379', '1930381', '1933527', '1939341', '1941762', '1941784', '1945345', '1945388', '1946965', '1948772', '1951595', '1953847', '1954588', '1957788', '1959559', '1959642', '1959654', '1959657', '1959663', '1960490', '1960492', '1960496', '1960498', '1960500', '1960502', '1960504', '1960708', '1964028', '1964139', '1965038', '1965360', '1965458', '1966578', '1969489', '1971101', '1972278', '1974627', '1975182', '1975949', '1976679', '1976699', '1976946', '1976969', '1977162', '1977422', '1977537', '1977850', '1978369', '1979070', '1979680', '1981954', '1986138', '1989165', '1989999', '1991976', '1992700', '1995249', '1996854'], 'cves': ['Red Hat:::https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0129.json:::CVE-2021-0129', 'Red Hat:::https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28950.json:::CVE-2021-28950', 'Red Hat:::https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3573.json:::CVE-2021-3573', 'Red Hat:::https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3600.json:::CVE-2021-3600', 'Red Hat:::https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3635.json:::CVE-2021-3635'], 'references': [], 'publishedAt': '2021-11-16T07:31:29.363030Z', 'rpms': ['bpftool-4.18.0-348.el8.0.2.aarch64.rpm', 'bpftool-4.18.0-348.el8.0.2.x86_64.rpm', 'bpftool-debuginfo-4.18.0-348.el8.0.2.aarch64.rpm', 'bpftool-debuginfo-4.18.0-348.el8.0.2.x86_64.rpm', 'kernel-4.18.0-348.el8.0.2.aarch64.rpm', 'kernel-4.18.0-348.el8.0.2.src.rpm', 'kernel-4.18.0-348.el8.0.2.x86_64.rpm', 'kernel-abi-stablelists-4.18.0-348.el8.0.2.noarch.rpm', 'kernel-core-4.18.0-348.el8.0.2.aarch64.rpm', 'kernel-core-4.18.0-348.el8.0.2.x86_64.rpm', 'kernel-cross-headers-4.18.0-348.el8.0.2.aarch64.rpm', 'kernel-cross-headers-4.18.0-348.el8.0.2.x86_64.rpm', 'kernel-debug-4.18.0-348.el8.0.2.aarch64.rpm', 'kernel-debug-4.18.0-348.el8.0.2.x86_64.rpm', 'kernel-debug-core-4.18.0-348.el8.0.2.aarch64.rpm', 'kernel-debug-core-4.18.0-348.el8.0.2.x86_64.rpm', 'kernel-debug-debuginfo-4.18.0-348.el8.0.2.aarch64.rpm', 'kernel-debug-debuginfo-4.18.0-348.el8.0.2.x86_64.rpm', 'kernel-debug-devel-4.18.0-348.el8.0.2.aarch64.rpm', 'kernel-debug-devel-4.18.0-348.el8.0.2.x86_64.rpm', 'kernel-debuginfo-4.18.0-348.el8.0.2.aarch64.rpm', 'kernel-debuginfo-4.18.0-348.el8.0.2.x86_64.rpm', 'kernel-debuginfo-common-aarch64-4.18.0-348.el8.0.2.aarch64.rpm', 'kernel-debuginfo-common-x86_64-4.18.0-348.el8.0.2.x86_64.rpm', 'kernel-debug-modules-4.18.0-348.el8.0.2.aarch64.rpm', 'kernel-debug-modules-4.18.0-348.el8.0.2.x86_64.rpm', 'kernel-debug-modules-extra-4.18.0-348.el8.0.2.aarch64.rpm', 'kernel-debug-modules-extra-4.18.0-348.el8.0.2.x86_64.rpm', 'kernel-devel-4.18.0-348.el8.0.2.aarch64.rpm', 'kernel-devel-4.18.0-348.el8.0.2.x86_64.rpm', 'kernel-doc-4.18.0-348.el8.0.2.noarch.rpm', 'kernel-headers-4.18.0-348.el8.0.2.aarch64.rpm', 'kernel-headers-4.18.0-348.el8.0.2.x86_64.rpm', 'kernel-modules-4.18.0-348.el8.0.2.aarch64.rpm', 'kernel-modules-4.18.0-348.el8.0.2.x86_64.rpm', 'kernel-modules-extra-4.18.0-348.el8.0.2.aarch64.rpm', 'kernel-modules-extra-4.18.0-348.el8.0.2.x86_64.rpm', 'kernel-rt-4.18.0-348.rt7.130.el8.0.2.src.rpm', 'kernel-rt-4.18.0-348.rt7.130.el8.0.2.x86_64.rpm', 'kernel-rt-core-4.18.0-348.rt7.130.el8.0.2.x86_64.rpm', 'kernel-rt-debug-4.18.0-348.rt7.130.el8.0.2.x86_64.rpm', 'kernel-rt-debug-core-4.18.0-348.rt7.130.el8.0.2.x86_64.rpm', 'kernel-rt-debug-debuginfo-4.18.0-348.rt7.130.el8.0.2.x86_64.rpm', 'kernel-rt-debug-devel-4.18.0-348.rt7.130.el8.0.2.x86_64.rpm', 'kernel-rt-debuginfo-4.18.0-348.rt7.130.el8.0.2.x86_64.rpm', 'kernel-rt-debuginfo-common-x86_64-4.18.0-348.rt7.130.el8.0.2.x86_64.rpm', 'kernel-rt-debug-modules-4.18.0-348.rt7.130.el8.0.2.x86_64.rpm', 'kernel-rt-debug-modules-extra-4.18.0-348.rt7.130.el8.0.2.x86_64.rpm', 'kernel-rt-devel-4.18.0-348.rt7.130.el8.0.2.x86_64.rpm', 'kernel-rt-modules-4.18.0-348.rt7.130.el8.0.2.x86_64.rpm', 'kernel-rt-modules-extra-4.18.0-348.rt7.130.el8.0.2.x86_64.rpm', 'kernel-tools-4.18.0-348.el8.0.2.aarch64.rpm', 'kernel-tools-4.18.0-348.el8.0.2.x86_64.rpm', 'kernel-tools-debuginfo-4.18.0-348.el8.0.2.aarch64.rpm', 'kernel-tools-debuginfo-4.18.0-348.el8.0.2.x86_64.rpm', 'kernel-tools-libs-4.18.0-348.el8.0.2.aarch64.rpm', 'kernel-tools-libs-4.18.0-348.el8.0.2.x86_64.rpm', 'kernel-tools-libs-devel-4.18.0-348.el8.0.2.aarch64.rpm', 'kernel-tools-libs-devel-4.18.0-348.el8.0.2.x86_64.rpm', 'perf-4.18.0-348.el8.0.2.aarch64.rpm', 'perf-4.18.0-348.el8.0.2.x86_64.rpm', 'perf-debuginfo-4.18.0-348.el8.0.2.aarch64.rpm', 'perf-debuginfo-4.18.0-348.el8.0.2.x86_64.rpm', 'python3-perf-4.18.0-348.el8.0.2.aarch64.rpm', 'python3-perf-4.18.0-348.el8.0.2.x86_64.rpm', 'python3-perf-debuginfo-4.18.0-348.el8.0.2.aarch64.rpm', 'python3-perf-debuginfo-4.18.0-348.el8.0.2.x86_64.rpm']}\

Rocky Linux: RLSA-2021:4356 kernel security

September 2, 2022
An update for kernel is now available for Rocky Linux 8

Summary

An update for kernel is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.


The kernel packages contain the Linux kernel, the core of any Linux operating system.

RPMs

bpftool-4.18.0-348.el8.0.2.aarch64.rpm
bpftool-4.18.0-348.el8.0.2.x86_64.rpm
bpftool-debuginfo-4.18.0-348.el8.0.2.aarch64.rpm
bpftool-debuginfo-4.18.0-348.el8.0.2.x86_64.rpm
kernel-4.18.0-348.el8.0.2.aarch64.rpm
kernel-4.18.0-348.el8.0.2.src.rpm
kernel-4.18.0-348.el8.0.2.x86_64.rpm
kernel-abi-stablelists-4.18.0-348.el8.0.2.noarch.rpm
kernel-core-4.18.0-348.el8.0.2.aarch64.rpm
kernel-core-4.18.0-348.el8.0.2.x86_64.rpm
kernel-cross-headers-4.18.0-348.el8.0.2.aarch64.rpm
kernel-cross-headers-4.18.0-348.el8.0.2.x86_64.rpm
kernel-debug-4.18.0-348.el8.0.2.aarch64.rpm
kernel-debug-4.18.0-348.el8.0.2.x86_64.rpm
kernel-debug-core-4.18.0-348.el8.0.2.aarch64.rpm
kernel-debug-core-4.18.0-348.el8.0.2.x86_64.rpm
kernel-debug-debuginfo-4.18.0-348.el8.0.2.aarch64.rpm
kernel-debug-debuginfo-4.18.0-348.el8.0.2.x86_64.rpm
kernel-debug-devel-4.18.0-348.el8.0.2.aarch64.rpm
kernel-debug-devel-4.18.0-348.el8.0.2.x86_64.rpm
kernel-debuginfo-4.18.0-348.el8.0.2.aarch64.rpm
kernel-debuginfo-4.18.0-348.el8.0.2.x86_64.rpm
kernel-debuginfo-common-aarch64-4.18.0-348.el8.0.2.aarch64.rpm
kernel-debuginfo-common-x86_64-4.18.0-348.el8.0.2.x86_64.rpm
kernel-debug-modules-4.18.0-348.el8.0.2.aarch64.rpm
kernel-debug-modules-4.18.0-348.el8.0.2.x86_64.rpm
kernel-debug-modules-extra-4.18.0-348.el8.0.2.aarch64.rpm
kernel-debug-modules-extra-4.18.0-348.el8.0.2.x86_64.rpm
kernel-devel-4.18.0-348.el8.0.2.aarch64.rpm
kernel-devel-4.18.0-348.el8.0.2.x86_64.rpm
kernel-doc-4.18.0-348.el8.0.2.noarch.rpm
kernel-headers-4.18.0-348.el8.0.2.aarch64.rpm
kernel-headers-4.18.0-348.el8.0.2.x86_64.rpm
kernel-modules-4.18.0-348.el8.0.2.aarch64.rpm
kernel-modules-4.18.0-348.el8.0.2.x86_64.rpm
kernel-modules-extra-4.18.0-348.el8.0.2.aarch64.rpm
kernel-modules-extra-4.18.0-348.el8.0.2.x86_64.rpm
kernel-rt-4.18.0-348.rt7.130.el8.0.2.src.rpm
kernel-rt-4.18.0-348.rt7.130.el8.0.2.x86_64.rpm
kernel-rt-core-4.18.0-348.rt7.130.el8.0.2.x86_64.rpm
kernel-rt-debug-4.18.0-348.rt7.130.el8.0.2.x86_64.rpm
kernel-rt-debug-core-4.18.0-348.rt7.130.el8.0.2.x86_64.rpm
kernel-rt-debug-debuginfo-4.18.0-348.rt7.130.el8.0.2.x86_64.rpm
kernel-rt-debug-devel-4.18.0-348.rt7.130.el8.0.2.x86_64.rpm
kernel-rt-debuginfo-4.18.0-348.rt7.130.el8.0.2.x86_64.rpm
kernel-rt-debuginfo-common-x86_64-4.18.0-348.rt7.130.el8.0.2.x86_64.rpm
kernel-rt-debug-modules-4.18.0-348.rt7.130.el8.0.2.x86_64.rpm
kernel-rt-debug-modules-extra-4.18.0-348.rt7.130.el8.0.2.x86_64.rpm
kernel-rt-devel-4.18.0-348.rt7.130.el8.0.2.x86_64.rpm
kernel-rt-modules-4.18.0-348.rt7.130.el8.0.2.x86_64.rpm
kernel-rt-modules-extra-4.18.0-348.rt7.130.el8.0.2.x86_64.rpm
kernel-tools-4.18.0-348.el8.0.2.aarch64.rpm
kernel-tools-4.18.0-348.el8.0.2.x86_64.rpm
kernel-tools-debuginfo-4.18.0-348.el8.0.2.aarch64.rpm
kernel-tools-debuginfo-4.18.0-348.el8.0.2.x86_64.rpm
kernel-tools-libs-4.18.0-348.el8.0.2.aarch64.rpm
kernel-tools-libs-4.18.0-348.el8.0.2.x86_64.rpm
kernel-tools-libs-devel-4.18.0-348.el8.0.2.aarch64.rpm
kernel-tools-libs-devel-4.18.0-348.el8.0.2.x86_64.rpm
perf-4.18.0-348.el8.0.2.aarch64.rpm
perf-4.18.0-348.el8.0.2.x86_64.rpm
perf-debuginfo-4.18.0-348.el8.0.2.aarch64.rpm
perf-debuginfo-4.18.0-348.el8.0.2.x86_64.rpm
python3-perf-4.18.0-348.el8.0.2.aarch64.rpm
python3-perf-4.18.0-348.el8.0.2.x86_64.rpm
python3-perf-debuginfo-4.18.0-348.el8.0.2.aarch64.rpm
python3-perf-debuginfo-4.18.0-348.el8.0.2.x86_64.rpm

References

Severity
Name: RLSA-2021:4356
Affected Products: Rocky Linux 8

Fixes

https://bugzilla.redhat.com/show_bug.cgi?id=1509204

https://bugzilla.redhat.com/show_bug.cgi?id=1793880

https://bugzilla.redhat.com/show_bug.cgi?id=1816493

https://bugzilla.redhat.com/show_bug.cgi?id=1900844

https://bugzilla.redhat.com/show_bug.cgi?id=1903244

https://bugzilla.redhat.com/show_bug.cgi?id=1906522

https://bugzilla.redhat.com/show_bug.cgi?id=1912683

https://bugzilla.redhat.com/show_bug.cgi?id=1913348

https://bugzilla.redhat.com/show_bug.cgi?id=1915825

https://bugzilla.redhat.com/show_bug.cgi?id=1919893

https://bugzilla.redhat.com/show_bug.cgi?id=1921958

https://bugzilla.redhat.com/show_bug.cgi?id=1923636

https://bugzilla.redhat.com/show_bug.cgi?id=1930376

https://bugzilla.redhat.com/show_bug.cgi?id=1930379

https://bugzilla.redhat.com/show_bug.cgi?id=1930381

https://bugzilla.redhat.com/show_bug.cgi?id=1933527

https://bugzilla.redhat.com/show_bug.cgi?id=1939341

https://bugzilla.redhat.com/show_bug.cgi?id=1941762

https://bugzilla.redhat.com/show_bug.cgi?id=1941784

https://bugzilla.redhat.com/show_bug.cgi?id=1945345

https://bugzilla.redhat.com/show_bug.cgi?id=1945388

https://bugzilla.redhat.com/show_bug.cgi?id=1946965

https://bugzilla.redhat.com/show_bug.cgi?id=1948772

https://bugzilla.redhat.com/show_bug.cgi?id=1951595

https://bugzilla.redhat.com/show_bug.cgi?id=1953847

https://bugzilla.redhat.com/show_bug.cgi?id=1954588

https://bugzilla.redhat.com/show_bug.cgi?id=1957788

https://bugzilla.redhat.com/show_bug.cgi?id=1959559

https://bugzilla.redhat.com/show_bug.cgi?id=1959642

https://bugzilla.redhat.com/show_bug.cgi?id=1959654

https://bugzilla.redhat.com/show_bug.cgi?id=1959657

https://bugzilla.redhat.com/show_bug.cgi?id=1959663

https://bugzilla.redhat.com/show_bug.cgi?id=1960490

https://bugzilla.redhat.com/show_bug.cgi?id=1960492

https://bugzilla.redhat.com/show_bug.cgi?id=1960496

https://bugzilla.redhat.com/show_bug.cgi?id=1960498

https://bugzilla.redhat.com/show_bug.cgi?id=1960500

https://bugzilla.redhat.com/show_bug.cgi?id=1960502

https://bugzilla.redhat.com/show_bug.cgi?id=1960504

https://bugzilla.redhat.com/show_bug.cgi?id=1960708

https://bugzilla.redhat.com/show_bug.cgi?id=1964028

https://bugzilla.redhat.com/show_bug.cgi?id=1964139

https://bugzilla.redhat.com/show_bug.cgi?id=1965038

https://bugzilla.redhat.com/show_bug.cgi?id=1965360

https://bugzilla.redhat.com/show_bug.cgi?id=1965458

https://bugzilla.redhat.com/show_bug.cgi?id=1966578

https://bugzilla.redhat.com/show_bug.cgi?id=1969489

https://bugzilla.redhat.com/show_bug.cgi?id=1971101

https://bugzilla.redhat.com/show_bug.cgi?id=1972278

https://bugzilla.redhat.com/show_bug.cgi?id=1974627

https://bugzilla.redhat.com/show_bug.cgi?id=1975182

https://bugzilla.redhat.com/show_bug.cgi?id=1975949

https://bugzilla.redhat.com/show_bug.cgi?id=1976679

https://bugzilla.redhat.com/show_bug.cgi?id=1976699

https://bugzilla.redhat.com/show_bug.cgi?id=1976946

https://bugzilla.redhat.com/show_bug.cgi?id=1976969

https://bugzilla.redhat.com/show_bug.cgi?id=1977162

https://bugzilla.redhat.com/show_bug.cgi?id=1977422

https://bugzilla.redhat.com/show_bug.cgi?id=1977537

https://bugzilla.redhat.com/show_bug.cgi?id=1977850

https://bugzilla.redhat.com/show_bug.cgi?id=1978369

https://bugzilla.redhat.com/show_bug.cgi?id=1979070

https://bugzilla.redhat.com/show_bug.cgi?id=1979680

https://bugzilla.redhat.com/show_bug.cgi?id=1981954

https://bugzilla.redhat.com/show_bug.cgi?id=1986138

https://bugzilla.redhat.com/show_bug.cgi?id=1989165

https://bugzilla.redhat.com/show_bug.cgi?id=1989999

https://bugzilla.redhat.com/show_bug.cgi?id=1991976

https://bugzilla.redhat.com/show_bug.cgi?id=1992700

https://bugzilla.redhat.com/show_bug.cgi?id=1995249

https://bugzilla.redhat.com/show_bug.cgi?id=1996854

CVES

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0129.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28950.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3573.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3600.json

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3635.json

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.