RHSB-2021-005 Red Hat Enterprise Linux 8.4 Security Release Notes
Was this information helpful?
RHSB-2021-005
Red Hat Enterprise Linux 8.4 Security Release Notes
Release Date: May 18, 2021
Release: Red Hat Enterprise Linux 8.4
In this product release, Red Hat Enterprise Linux 8.4 has undergone various improvements and additions, including feature enhancements, bug fixes, and security updates.. As part of our commitment to providing the latest security information, we have compiled the security fixes addressed in this product release.
To access and download Red Hat Enterprise Linux 8.4, please visit: https://access.redhat.com/downloads/.
Highlights
The following components with associated severity rating in Red Hat Enterprise Linux 8.4 were affected:
- Important severity issues fixed in kernel, kernel-rt, linux-firmware
- Moderate severity issues fixed in GNOME, NetworkManager, bluez, brotli, container-tools:rhel8, cpio, curl, dovecot, freerdp, ghostscript, glibc, go-toolset:rhel8, grafana, gssdp, httpd:2.4, idm:DL1, krb5, libvncserver, libxml2, mailman:2.1, mingw, opensc, p11-kit, pandoc, perl, pki-core:10.6, poppler, python-cryptography, python-lxml, python-urllib3, python27:2.7, python3, python38:3.8, qt5-qtbase, raptor2, samba, sane-backends, shim, spice-vdagent, sqlite, systemd, tigervnc, trousers, unbound, userspace, virt:rhel, wpa_supplicant
- Low severity issues fixed in bash, evolution, exiv2, libdb, rust-toolset:rhel8, spice, sudo
Details
The list contains all security fixes for each product component and the designated Common Vulnerability Exposure (CVE). The CVE page contains more information about the flaw affecting the component while the errata contains more information about the fix.
- Important: kernel RHSA-2021:1578
- CVE-2019-18811, CVE-2019-19523, CVE-2019-19528, CVE-2020-0431, CVE-2020-11608, CVE-2020-12114, CVE-2020-12362, CVE-2020-12464, CVE-2020-14314, CVE-2020-14356, CVE-2020-15437, CVE-2020-24394, CVE-2020-25212, CVE-2020-25284, CVE-2020-25285, CVE-2020-25643, CVE-2020-25704, CVE-2020-27786, CVE-2020-27835, CVE-2020-28974, CVE-2020-35508, CVE-2020-36322, CVE-2021-0342
- Important: linux-firmware RHSA-2021:1620
- Important: kernel-rt RHSA-2021:1739
- CVE-2019-19523, CVE-2019-19528, CVE-2020-0431, CVE-2020-11608, CVE-2020-12114, CVE-2020-12362, CVE-2020-12464, CVE-2020-14314, CVE-2020-14356, CVE-2020-15437, CVE-2020-24394, CVE-2020-25212, CVE-2020-25284, CVE-2020-25285, CVE-2020-25643, CVE-2020-25704, CVE-2020-27786, CVE-2020-27835, CVE-2020-28974, CVE-2020-35508, CVE-2021-0342
- Moderate: NetworkManager RHSA-2021:1574
- Moderate: sqlite RHSA-2021:1581
- Moderate: cpio RHSA-2021:1582
- Moderate: glibc RHSA-2021:1585
- Moderate: GNOME RHSA-2021:1586
- Moderate: krb5 RHSA-2021:1593
- Moderate: libxml2 RHSA-2021:1597
- Moderate: bluez RHSA-2021:1598
- Moderate: opensc RHSA-2021:1600
- Moderate: python-cryptography RHSA-2021:1608
- Moderate: p11-kit RHSA-2021:1609
- Moderate: curl RHSA-2021:1610
- Moderate: systemd RHSA-2021:1611
- Moderate: trousers RHSA-2021:1627
- Moderate: python-urllib3 RHSA-2021:1631
- Moderate: python3 RHSA-2021:1633
- Moderate: samba RHSA-2021:1647
- Moderate: perl RHSA-2021:1678
- Moderate: wpa_supplicant RHSA-2021:1686
- Moderate: brotli RHSA-2021:1702
- Moderate: shim RHSA-2021:1734
- CVE-2020-14372, CVE-2020-25632, CVE-2020-25647, CVE-2020-27749, CVE-2020-27779, CVE-2021-20225, CVE-2021-20233
- Moderate: sane-backends RHSA-2021:1744
- Moderate: go-toolset:rhel8 RHSA-2021:1746
- Moderate: mailman:2.1 RHSA-2021:1751
- Moderate: qt5-qtbase RHSA-2021:1756
- Moderate: python27:2.7 RHSA-2021:1761
- Moderate: virt:rhel RHSA-2021:1762
- CVE-2020-11947, CVE-2020-16092, CVE-2020-25637, CVE-2020-25707, CVE-2020-25723, CVE-2020-27821, CVE-2020-28916, CVE-2020-29129, CVE-2020-29130, CVE-2020-29443
- Moderate: pki-core:10.6 RHSA-2021:1775
- Moderate: tigervnc RHSA-2021:1783
- Moderate: gssdp RHSA-2021:1789
- Moderate: spice-vdagent RHSA-2021:1791
- Moderate: container-tools:rhel8 RHSA-2021:1796
- Moderate: userspace RHSA-2021:1804
- CVE-2020-14344, CVE-2020-14345, CVE-2020-14346, CVE-2020-14347, CVE-2020-14360, CVE-2020-14361, CVE-2020-14362, CVE-2020-14363, CVE-2020-25712
- Moderate: httpd:2.4 RHSA-2021:1809
- Moderate: libvncserver RHSA-2021:1811
- Moderate: raptor2 RHSA-2021:1842
- Moderate: idm:DL1 RHSA-2021:1846
- Moderate: freerdp RHSA-2021:1849
- CVE-2020-11095, CVE-2020-11096, CVE-2020-11097, CVE-2020-11098, CVE-2020-11099, CVE-2020-15103, CVE-2020-4030, CVE-2020-4033
- Moderate: ghostscript RHSA-2021:1852
- CVE-2020-14373, CVE-2020-16287, CVE-2020-16288, CVE-2020-16289, CVE-2020-16290, CVE-2020-16291, CVE-2020-16292, CVE-2020-16293, CVE-2020-16294, CVE-2020-16295, CVE-2020-16296, CVE-2020-16297, CVE-2020-16298, CVE-2020-16299, CVE-2020-16300, CVE-2020-16301, CVE-2020-16302, CVE-2020-16303, CVE-2020-16304, CVE-2020-16305, CVE-2020-16306, CVE-2020-16307, CVE-2020-16308, CVE-2020-16309, CVE-2020-16310, CVE-2020-17538
- Moderate: unbound RHSA-2021:1853
- CVE-2019-25032, CVE-2019-25034, CVE-2019-25035, CVE-2019-25036, CVE-2019-25037, CVE-2019-25038, CVE-2019-25039, CVE-2019-25040, CVE-2019-25041, CVE-2019-25042, CVE-2020-28935
- Moderate: grafana RHSA-2021:1859
- Moderate: python38:3.8 RHSA-2021:1879
- Moderate: poppler RHSA-2021:1881
- Moderate: dovecot RHSA-2021:1887
- Moderate: python-lxml RHSA-2021:1898
- Moderate: mingw RHSA-2021:1968
- Moderate: pandoc RHSA-2021:1972
- Low: libdb RHSA-2021:1675
- Low: bash RHSA-2021:1679
- Low: sudo RHSA-2021:1723
- Low: evolution RHSA-2021:1752
- Low: exiv2 RHSA-2021:1758
- Low: spice RHSA-2021:1924
- Low: rust-toolset:rhel8 RHSA-2021:1935
References
- https://access.redhat.com/security/updates/classification/#important
- https://access.redhat.com/security/updates/classification/#moderate
- https://access.redhat.com/security/updates/classification/#low
- 8.4 Release Notes
Comments