You are here
Home > Preporuke > Sigurnosni nedostaci jezgre operacijskog sustava RHEL

Sigurnosni nedostaci jezgre operacijskog sustava RHEL

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LRH

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Important: kernel security and bug fix update
Advisory ID: RHSA-2020:3230-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:3230
Issue date: 2020-07-29
CVE Names: CVE-2019-11487 CVE-2020-12888
=====================================================================

1. Summary:

An update for kernel is now available for Red Hat Enterprise Linux 7.4
Advanced Update Support, Red Hat Enterprise Linux 7.4 Telco Extended Update
Support, and Red Hat Enterprise Linux 7.4 Update Services for SAP
Solutions.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Server AUS (v. 7.4) – noarch, x86_64
Red Hat Enterprise Linux Server E4S (v. 7.4) – noarch, ppc64le, x86_64
Red Hat Enterprise Linux Server Optional AUS (v. 7.4) – x86_64
Red Hat Enterprise Linux Server Optional E4S (v. 7.4) – ppc64le, x86_64
Red Hat Enterprise Linux Server Optional TUS (v. 7.4) – x86_64
Red Hat Enterprise Linux Server TUS (v. 7.4) – noarch, x86_64

3. Description:

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security Fix(es):

* kernel: Count overflow in FUSE request leading to use-after-free issues.
(CVE-2019-11487)

* Kernel: vfio: access to disabled MMIO space of some devices may lead to
DoS scenario (CVE-2020-12888)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Bug Fix(es):

* kernel: provide infrastructure to support dual-signing of the kernel
(foundation to help address CVE-2020-10713) (BZ#1837426)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1703063 – CVE-2019-11487 kernel: Count overflow in FUSE request leading to use-after-free issues.
1836244 – CVE-2020-12888 Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario

6. Package List:

Red Hat Enterprise Linux Server AUS (v. 7.4):

Source:
kernel-3.10.0-693.71.2.el7.src.rpm

noarch:
kernel-abi-whitelists-3.10.0-693.71.2.el7.noarch.rpm
kernel-doc-3.10.0-693.71.2.el7.noarch.rpm

x86_64:
kernel-3.10.0-693.71.2.el7.x86_64.rpm
kernel-debug-3.10.0-693.71.2.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-693.71.2.el7.x86_64.rpm
kernel-debug-devel-3.10.0-693.71.2.el7.x86_64.rpm
kernel-debuginfo-3.10.0-693.71.2.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-693.71.2.el7.x86_64.rpm
kernel-devel-3.10.0-693.71.2.el7.x86_64.rpm
kernel-headers-3.10.0-693.71.2.el7.x86_64.rpm
kernel-tools-3.10.0-693.71.2.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-693.71.2.el7.x86_64.rpm
kernel-tools-libs-3.10.0-693.71.2.el7.x86_64.rpm
perf-3.10.0-693.71.2.el7.x86_64.rpm
perf-debuginfo-3.10.0-693.71.2.el7.x86_64.rpm
python-perf-3.10.0-693.71.2.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-693.71.2.el7.x86_64.rpm

Red Hat Enterprise Linux Server E4S (v. 7.4):

Source:
kernel-3.10.0-693.71.2.el7.src.rpm

noarch:
kernel-abi-whitelists-3.10.0-693.71.2.el7.noarch.rpm
kernel-doc-3.10.0-693.71.2.el7.noarch.rpm

ppc64le:
kernel-3.10.0-693.71.2.el7.ppc64le.rpm
kernel-bootwrapper-3.10.0-693.71.2.el7.ppc64le.rpm
kernel-debug-3.10.0-693.71.2.el7.ppc64le.rpm
kernel-debug-debuginfo-3.10.0-693.71.2.el7.ppc64le.rpm
kernel-debuginfo-3.10.0-693.71.2.el7.ppc64le.rpm
kernel-debuginfo-common-ppc64le-3.10.0-693.71.2.el7.ppc64le.rpm
kernel-devel-3.10.0-693.71.2.el7.ppc64le.rpm
kernel-headers-3.10.0-693.71.2.el7.ppc64le.rpm
kernel-tools-3.10.0-693.71.2.el7.ppc64le.rpm
kernel-tools-debuginfo-3.10.0-693.71.2.el7.ppc64le.rpm
kernel-tools-libs-3.10.0-693.71.2.el7.ppc64le.rpm
perf-3.10.0-693.71.2.el7.ppc64le.rpm
perf-debuginfo-3.10.0-693.71.2.el7.ppc64le.rpm
python-perf-3.10.0-693.71.2.el7.ppc64le.rpm
python-perf-debuginfo-3.10.0-693.71.2.el7.ppc64le.rpm

x86_64:
kernel-3.10.0-693.71.2.el7.x86_64.rpm
kernel-debug-3.10.0-693.71.2.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-693.71.2.el7.x86_64.rpm
kernel-debug-devel-3.10.0-693.71.2.el7.x86_64.rpm
kernel-debuginfo-3.10.0-693.71.2.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-693.71.2.el7.x86_64.rpm
kernel-devel-3.10.0-693.71.2.el7.x86_64.rpm
kernel-headers-3.10.0-693.71.2.el7.x86_64.rpm
kernel-tools-3.10.0-693.71.2.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-693.71.2.el7.x86_64.rpm
kernel-tools-libs-3.10.0-693.71.2.el7.x86_64.rpm
perf-3.10.0-693.71.2.el7.x86_64.rpm
perf-debuginfo-3.10.0-693.71.2.el7.x86_64.rpm
python-perf-3.10.0-693.71.2.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-693.71.2.el7.x86_64.rpm

Red Hat Enterprise Linux Server TUS (v. 7.4):

Source:
kernel-3.10.0-693.71.2.el7.src.rpm

noarch:
kernel-abi-whitelists-3.10.0-693.71.2.el7.noarch.rpm
kernel-doc-3.10.0-693.71.2.el7.noarch.rpm

x86_64:
kernel-3.10.0-693.71.2.el7.x86_64.rpm
kernel-debug-3.10.0-693.71.2.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-693.71.2.el7.x86_64.rpm
kernel-debug-devel-3.10.0-693.71.2.el7.x86_64.rpm
kernel-debuginfo-3.10.0-693.71.2.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-693.71.2.el7.x86_64.rpm
kernel-devel-3.10.0-693.71.2.el7.x86_64.rpm
kernel-headers-3.10.0-693.71.2.el7.x86_64.rpm
kernel-tools-3.10.0-693.71.2.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-693.71.2.el7.x86_64.rpm
kernel-tools-libs-3.10.0-693.71.2.el7.x86_64.rpm
perf-3.10.0-693.71.2.el7.x86_64.rpm
perf-debuginfo-3.10.0-693.71.2.el7.x86_64.rpm
python-perf-3.10.0-693.71.2.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-693.71.2.el7.x86_64.rpm

Red Hat Enterprise Linux Server Optional AUS (v. 7.4):

x86_64:
kernel-debug-debuginfo-3.10.0-693.71.2.el7.x86_64.rpm
kernel-debuginfo-3.10.0-693.71.2.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-693.71.2.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-693.71.2.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-693.71.2.el7.x86_64.rpm
perf-debuginfo-3.10.0-693.71.2.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-693.71.2.el7.x86_64.rpm

Red Hat Enterprise Linux Server Optional E4S (v. 7.4):

ppc64le:
kernel-debug-debuginfo-3.10.0-693.71.2.el7.ppc64le.rpm
kernel-debug-devel-3.10.0-693.71.2.el7.ppc64le.rpm
kernel-debuginfo-3.10.0-693.71.2.el7.ppc64le.rpm
kernel-debuginfo-common-ppc64le-3.10.0-693.71.2.el7.ppc64le.rpm
kernel-tools-debuginfo-3.10.0-693.71.2.el7.ppc64le.rpm
kernel-tools-libs-devel-3.10.0-693.71.2.el7.ppc64le.rpm
perf-debuginfo-3.10.0-693.71.2.el7.ppc64le.rpm
python-perf-debuginfo-3.10.0-693.71.2.el7.ppc64le.rpm

x86_64:
kernel-debug-debuginfo-3.10.0-693.71.2.el7.x86_64.rpm
kernel-debuginfo-3.10.0-693.71.2.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-693.71.2.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-693.71.2.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-693.71.2.el7.x86_64.rpm
perf-debuginfo-3.10.0-693.71.2.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-693.71.2.el7.x86_64.rpm

Red Hat Enterprise Linux Server Optional TUS (v. 7.4):

x86_64:
kernel-debug-debuginfo-3.10.0-693.71.2.el7.x86_64.rpm
kernel-debuginfo-3.10.0-693.71.2.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-693.71.2.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-693.71.2.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-693.71.2.el7.x86_64.rpm
perf-debuginfo-3.10.0-693.71.2.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-693.71.2.el7.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-11487
https://access.redhat.com/security/cve/CVE-2020-12888
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/security/vulnerabilities/grub2bootloader

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1

iQIVAwUBXyHtO9zjgjWX9erEAQiF7g/+PQ2n8eVVNvAzmCpGa+eQP/HtYQ9biewa
KhaIWieRV8jRdYIZZxydZuZebIii473B68/1qkzT1LawDUSyCRUCoMj1N7KOY/X9
yjo8+tKK+SrKx2hzsra2pUyhy5YX6O2znmkERaS83cdPgmnIthxA4mQG6LuwUYDt
94IKfrW+ojFV3kSzyKh/7lZx44roYlv+HIOnvNqjmv4O3ITuPxSRSV86vGVIG2za
QwxQQJEApqDEUJt8y3h7PuCXCfGocjCXbe4UVXSSMnxAXntwDMifSl19+fQYenzo
VdngNuPvmog8rVQcAkYqSC/ZqxDP8uyBmSpLBAclbfiv7nYpNuMIdKTGByI12n6z
RP2cmtbz+tXjmZmlY4rPvC5xicdMj95VeYVK9Yrz3MJQPx6Er3f1VZtBvJ2zonEj
z4IN0WIFxqN2aZRtG7wIKrR+JT4T9SB4YMRFsLY5Wu/kw0h36omiQ1AqEQmFOJbs
KBtLlL3YLBf4NeppIdlAVvW1Qlz+PgApm21yhWr6vnj7pMgqRxLJBfCDPk+dzkpp
gsFa4jNM3VVlka7HnThAjyIefZrwt3WyKke6dpbwbrnkwXY3bm7JlVqLSPyJyuym
q7/bhc5TfKJOfnrREqHBrzIyJhSVVrRcsjz4VPOKSe+wfgLEN2jx6oUJx3xoXpFQ
GN0XIvti1yM=
=dZgD
—–END PGP SIGNATURE—–


RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Important: kernel security and bug fix update
Advisory ID: RHSA-2020:3232-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:3232
Issue date: 2020-07-29
CVE Names: CVE-2020-12653 CVE-2020-12654
=====================================================================

1. Summary:

An update for kernel is now available for Red Hat Enterprise Linux 7.2
Advanced Update Support.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Server AUS (v. 7.2) – noarch, x86_64
Red Hat Enterprise Linux Server Optional AUS (v. 7.2) – x86_64

3. Description:

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security Fix(es):

* kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in
drivers/net/wireless/marvell/mwifiex/scan.c (CVE-2020-12653)

* kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function
in drivers/net/wireless/marvell/mwifiex/wmm.c (CVE-2020-12654)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Bug Fix(es):

* kernel: provide infrastructure to support dual-signing of the kernel
(foundation to help address CVE-2020-10713) (BZ#1837424)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1831868 – CVE-2020-12653 kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c
1832530 – CVE-2020-12654 kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c

6. Package List:

Red Hat Enterprise Linux Server AUS (v. 7.2):

Source:
kernel-3.10.0-327.90.2.el7.src.rpm

noarch:
kernel-abi-whitelists-3.10.0-327.90.2.el7.noarch.rpm
kernel-doc-3.10.0-327.90.2.el7.noarch.rpm

x86_64:
kernel-3.10.0-327.90.2.el7.x86_64.rpm
kernel-debug-3.10.0-327.90.2.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-327.90.2.el7.x86_64.rpm
kernel-debug-devel-3.10.0-327.90.2.el7.x86_64.rpm
kernel-debuginfo-3.10.0-327.90.2.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-327.90.2.el7.x86_64.rpm
kernel-devel-3.10.0-327.90.2.el7.x86_64.rpm
kernel-headers-3.10.0-327.90.2.el7.x86_64.rpm
kernel-tools-3.10.0-327.90.2.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-327.90.2.el7.x86_64.rpm
kernel-tools-libs-3.10.0-327.90.2.el7.x86_64.rpm
perf-3.10.0-327.90.2.el7.x86_64.rpm
perf-debuginfo-3.10.0-327.90.2.el7.x86_64.rpm
python-perf-3.10.0-327.90.2.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-327.90.2.el7.x86_64.rpm

Red Hat Enterprise Linux Server Optional AUS (v. 7.2):

x86_64:
kernel-debug-debuginfo-3.10.0-327.90.2.el7.x86_64.rpm
kernel-debuginfo-3.10.0-327.90.2.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-327.90.2.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-327.90.2.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-327.90.2.el7.x86_64.rpm
perf-debuginfo-3.10.0-327.90.2.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-327.90.2.el7.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2020-12653
https://access.redhat.com/security/cve/CVE-2020-12654
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/security/vulnerabilities/grub2bootloader

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=PnY4
—–END PGP SIGNATURE—–


RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Important: kernel security and bug fix update
Advisory ID: RHSA-2020:3226-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:3226
Issue date: 2020-07-29
CVE Names: CVE-2020-10757 CVE-2020-12653 CVE-2020-12654
=====================================================================

1. Summary:

An update for kernel is now available for Red Hat Enterprise Linux 7.6
Extended Update Support.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux ComputeNode EUS (v. 7.6) – noarch, x86_64
Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6) – x86_64
Red Hat Enterprise Linux Server EUS (v. 7.6) – noarch, ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional EUS (v. 7.6) – ppc64, ppc64le, x86_64

3. Description:

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security Fix(es):

* kernel: kernel: DAX hugepages not considered during mremap
(CVE-2020-10757)

* kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in
drivers/net/wireless/marvell/mwifiex/scan.c (CVE-2020-12653)

* kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function
in drivers/net/wireless/marvell/mwifiex/wmm.c (CVE-2020-12654)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Bug Fix(es):

* kernel: provide infrastructure to support dual-signing of the kernel
(foundation to help address CVE-2020-10713) (BZ#1837427)

* Fix dpdk regression introduced by bz1837297 (BZ#1852775)

* Possible race condition updating the cfg structure in
__assign_irq_vector. (BZ#1854552)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1831868 – CVE-2020-12653 kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c
1832530 – CVE-2020-12654 kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c
1842525 – CVE-2020-10757 kernel: kernel: DAX hugepages not considered during mremap

6. Package List:

Red Hat Enterprise Linux ComputeNode EUS (v. 7.6):

Source:
kernel-3.10.0-957.58.2.el7.src.rpm

noarch:
kernel-abi-whitelists-3.10.0-957.58.2.el7.noarch.rpm
kernel-doc-3.10.0-957.58.2.el7.noarch.rpm

x86_64:
bpftool-3.10.0-957.58.2.el7.x86_64.rpm
kernel-3.10.0-957.58.2.el7.x86_64.rpm
kernel-debug-3.10.0-957.58.2.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-957.58.2.el7.x86_64.rpm
kernel-debug-devel-3.10.0-957.58.2.el7.x86_64.rpm
kernel-debuginfo-3.10.0-957.58.2.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-957.58.2.el7.x86_64.rpm
kernel-devel-3.10.0-957.58.2.el7.x86_64.rpm
kernel-headers-3.10.0-957.58.2.el7.x86_64.rpm
kernel-tools-3.10.0-957.58.2.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-957.58.2.el7.x86_64.rpm
kernel-tools-libs-3.10.0-957.58.2.el7.x86_64.rpm
perf-3.10.0-957.58.2.el7.x86_64.rpm
perf-debuginfo-3.10.0-957.58.2.el7.x86_64.rpm
python-perf-3.10.0-957.58.2.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-957.58.2.el7.x86_64.rpm

Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6):

x86_64:
kernel-debug-debuginfo-3.10.0-957.58.2.el7.x86_64.rpm
kernel-debuginfo-3.10.0-957.58.2.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-957.58.2.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-957.58.2.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-957.58.2.el7.x86_64.rpm
perf-debuginfo-3.10.0-957.58.2.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-957.58.2.el7.x86_64.rpm

Red Hat Enterprise Linux Server EUS (v. 7.6):

Source:
kernel-3.10.0-957.58.2.el7.src.rpm

noarch:
kernel-abi-whitelists-3.10.0-957.58.2.el7.noarch.rpm
kernel-doc-3.10.0-957.58.2.el7.noarch.rpm

ppc64:
kernel-3.10.0-957.58.2.el7.ppc64.rpm
kernel-bootwrapper-3.10.0-957.58.2.el7.ppc64.rpm
kernel-debug-3.10.0-957.58.2.el7.ppc64.rpm
kernel-debug-debuginfo-3.10.0-957.58.2.el7.ppc64.rpm
kernel-debug-devel-3.10.0-957.58.2.el7.ppc64.rpm
kernel-debuginfo-3.10.0-957.58.2.el7.ppc64.rpm
kernel-debuginfo-common-ppc64-3.10.0-957.58.2.el7.ppc64.rpm
kernel-devel-3.10.0-957.58.2.el7.ppc64.rpm
kernel-headers-3.10.0-957.58.2.el7.ppc64.rpm
kernel-tools-3.10.0-957.58.2.el7.ppc64.rpm
kernel-tools-debuginfo-3.10.0-957.58.2.el7.ppc64.rpm
kernel-tools-libs-3.10.0-957.58.2.el7.ppc64.rpm
perf-3.10.0-957.58.2.el7.ppc64.rpm
perf-debuginfo-3.10.0-957.58.2.el7.ppc64.rpm
python-perf-3.10.0-957.58.2.el7.ppc64.rpm
python-perf-debuginfo-3.10.0-957.58.2.el7.ppc64.rpm

ppc64le:
kernel-3.10.0-957.58.2.el7.ppc64le.rpm
kernel-bootwrapper-3.10.0-957.58.2.el7.ppc64le.rpm
kernel-debug-3.10.0-957.58.2.el7.ppc64le.rpm
kernel-debug-debuginfo-3.10.0-957.58.2.el7.ppc64le.rpm
kernel-debuginfo-3.10.0-957.58.2.el7.ppc64le.rpm
kernel-debuginfo-common-ppc64le-3.10.0-957.58.2.el7.ppc64le.rpm
kernel-devel-3.10.0-957.58.2.el7.ppc64le.rpm
kernel-headers-3.10.0-957.58.2.el7.ppc64le.rpm
kernel-tools-3.10.0-957.58.2.el7.ppc64le.rpm
kernel-tools-debuginfo-3.10.0-957.58.2.el7.ppc64le.rpm
kernel-tools-libs-3.10.0-957.58.2.el7.ppc64le.rpm
perf-3.10.0-957.58.2.el7.ppc64le.rpm
perf-debuginfo-3.10.0-957.58.2.el7.ppc64le.rpm
python-perf-3.10.0-957.58.2.el7.ppc64le.rpm
python-perf-debuginfo-3.10.0-957.58.2.el7.ppc64le.rpm

s390x:
kernel-3.10.0-957.58.2.el7.s390x.rpm
kernel-debug-3.10.0-957.58.2.el7.s390x.rpm
kernel-debug-debuginfo-3.10.0-957.58.2.el7.s390x.rpm
kernel-debug-devel-3.10.0-957.58.2.el7.s390x.rpm
kernel-debuginfo-3.10.0-957.58.2.el7.s390x.rpm
kernel-debuginfo-common-s390x-3.10.0-957.58.2.el7.s390x.rpm
kernel-devel-3.10.0-957.58.2.el7.s390x.rpm
kernel-headers-3.10.0-957.58.2.el7.s390x.rpm
kernel-kdump-3.10.0-957.58.2.el7.s390x.rpm
kernel-kdump-debuginfo-3.10.0-957.58.2.el7.s390x.rpm
kernel-kdump-devel-3.10.0-957.58.2.el7.s390x.rpm
perf-3.10.0-957.58.2.el7.s390x.rpm
perf-debuginfo-3.10.0-957.58.2.el7.s390x.rpm
python-perf-3.10.0-957.58.2.el7.s390x.rpm
python-perf-debuginfo-3.10.0-957.58.2.el7.s390x.rpm

x86_64:
bpftool-3.10.0-957.58.2.el7.x86_64.rpm
kernel-3.10.0-957.58.2.el7.x86_64.rpm
kernel-debug-3.10.0-957.58.2.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-957.58.2.el7.x86_64.rpm
kernel-debug-devel-3.10.0-957.58.2.el7.x86_64.rpm
kernel-debuginfo-3.10.0-957.58.2.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-957.58.2.el7.x86_64.rpm
kernel-devel-3.10.0-957.58.2.el7.x86_64.rpm
kernel-headers-3.10.0-957.58.2.el7.x86_64.rpm
kernel-tools-3.10.0-957.58.2.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-957.58.2.el7.x86_64.rpm
kernel-tools-libs-3.10.0-957.58.2.el7.x86_64.rpm
perf-3.10.0-957.58.2.el7.x86_64.rpm
perf-debuginfo-3.10.0-957.58.2.el7.x86_64.rpm
python-perf-3.10.0-957.58.2.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-957.58.2.el7.x86_64.rpm

Red Hat Enterprise Linux Server Optional EUS (v. 7.6):

ppc64:
kernel-debug-debuginfo-3.10.0-957.58.2.el7.ppc64.rpm
kernel-debuginfo-3.10.0-957.58.2.el7.ppc64.rpm
kernel-debuginfo-common-ppc64-3.10.0-957.58.2.el7.ppc64.rpm
kernel-tools-debuginfo-3.10.0-957.58.2.el7.ppc64.rpm
kernel-tools-libs-devel-3.10.0-957.58.2.el7.ppc64.rpm
perf-debuginfo-3.10.0-957.58.2.el7.ppc64.rpm
python-perf-debuginfo-3.10.0-957.58.2.el7.ppc64.rpm

ppc64le:
kernel-debug-debuginfo-3.10.0-957.58.2.el7.ppc64le.rpm
kernel-debug-devel-3.10.0-957.58.2.el7.ppc64le.rpm
kernel-debuginfo-3.10.0-957.58.2.el7.ppc64le.rpm
kernel-debuginfo-common-ppc64le-3.10.0-957.58.2.el7.ppc64le.rpm
kernel-tools-debuginfo-3.10.0-957.58.2.el7.ppc64le.rpm
kernel-tools-libs-devel-3.10.0-957.58.2.el7.ppc64le.rpm
perf-debuginfo-3.10.0-957.58.2.el7.ppc64le.rpm
python-perf-debuginfo-3.10.0-957.58.2.el7.ppc64le.rpm

x86_64:
kernel-debug-debuginfo-3.10.0-957.58.2.el7.x86_64.rpm
kernel-debuginfo-3.10.0-957.58.2.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-957.58.2.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-957.58.2.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-957.58.2.el7.x86_64.rpm
perf-debuginfo-3.10.0-957.58.2.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-957.58.2.el7.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2020-10757
https://access.redhat.com/security/cve/CVE-2020-12653
https://access.redhat.com/security/cve/CVE-2020-12654
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/security/vulnerabilities/grub2bootloader

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=TSwi
—–END PGP SIGNATURE—–


RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Important: kernel security and bug fix update
Advisory ID: RHSA-2020:3224-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:3224
Issue date: 2020-07-29
CVE Names: CVE-2020-12653 CVE-2020-12654
=====================================================================

1. Summary:

An update for kernel is now available for Red Hat Enterprise Linux 7.7
Extended Update Support.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux ComputeNode EUS (v. 7.7) – noarch, x86_64
Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7) – x86_64
Red Hat Enterprise Linux Server EUS (v. 7.7) – noarch, ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional EUS (v. 7.7) – ppc64, ppc64le, x86_64

3. Description:

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security Fix(es):

* kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in
drivers/net/wireless/marvell/mwifiex/scan.c (CVE-2020-12653)

* kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function
in drivers/net/wireless/marvell/mwifiex/wmm.c (CVE-2020-12654)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Bug Fix(es):

* kernel: provide infrastructure to support dual-signing of the kernel
(foundation to help address CVE-2020-10713) (BZ#1837428)

* RHEL7.7 – Request: retrofit kernel commit f82b4b6 to RHEL 7.7/7.8 3.10
kernels. (BZ#1838601)

* Possible race condition updating the cfg structure in
__assign_irq_vector. (BZ#1854553)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1831868 – CVE-2020-12653 kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c
1832530 – CVE-2020-12654 kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c

6. Package List:

Red Hat Enterprise Linux ComputeNode EUS (v. 7.7):

Source:
kernel-3.10.0-1062.31.2.el7.src.rpm

noarch:
kernel-abi-whitelists-3.10.0-1062.31.2.el7.noarch.rpm
kernel-doc-3.10.0-1062.31.2.el7.noarch.rpm

x86_64:
bpftool-3.10.0-1062.31.2.el7.x86_64.rpm
bpftool-debuginfo-3.10.0-1062.31.2.el7.x86_64.rpm
kernel-3.10.0-1062.31.2.el7.x86_64.rpm
kernel-debug-3.10.0-1062.31.2.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-1062.31.2.el7.x86_64.rpm
kernel-debug-devel-3.10.0-1062.31.2.el7.x86_64.rpm
kernel-debuginfo-3.10.0-1062.31.2.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-1062.31.2.el7.x86_64.rpm
kernel-devel-3.10.0-1062.31.2.el7.x86_64.rpm
kernel-headers-3.10.0-1062.31.2.el7.x86_64.rpm
kernel-tools-3.10.0-1062.31.2.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-1062.31.2.el7.x86_64.rpm
kernel-tools-libs-3.10.0-1062.31.2.el7.x86_64.rpm
perf-3.10.0-1062.31.2.el7.x86_64.rpm
perf-debuginfo-3.10.0-1062.31.2.el7.x86_64.rpm
python-perf-3.10.0-1062.31.2.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-1062.31.2.el7.x86_64.rpm

Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7):

x86_64:
bpftool-debuginfo-3.10.0-1062.31.2.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-1062.31.2.el7.x86_64.rpm
kernel-debuginfo-3.10.0-1062.31.2.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-1062.31.2.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-1062.31.2.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-1062.31.2.el7.x86_64.rpm
perf-debuginfo-3.10.0-1062.31.2.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-1062.31.2.el7.x86_64.rpm

Red Hat Enterprise Linux Server EUS (v. 7.7):

Source:
kernel-3.10.0-1062.31.2.el7.src.rpm

noarch:
kernel-abi-whitelists-3.10.0-1062.31.2.el7.noarch.rpm
kernel-doc-3.10.0-1062.31.2.el7.noarch.rpm

ppc64:
bpftool-3.10.0-1062.31.2.el7.ppc64.rpm
bpftool-debuginfo-3.10.0-1062.31.2.el7.ppc64.rpm
kernel-3.10.0-1062.31.2.el7.ppc64.rpm
kernel-bootwrapper-3.10.0-1062.31.2.el7.ppc64.rpm
kernel-debug-3.10.0-1062.31.2.el7.ppc64.rpm
kernel-debug-debuginfo-3.10.0-1062.31.2.el7.ppc64.rpm
kernel-debug-devel-3.10.0-1062.31.2.el7.ppc64.rpm
kernel-debuginfo-3.10.0-1062.31.2.el7.ppc64.rpm
kernel-debuginfo-common-ppc64-3.10.0-1062.31.2.el7.ppc64.rpm
kernel-devel-3.10.0-1062.31.2.el7.ppc64.rpm
kernel-headers-3.10.0-1062.31.2.el7.ppc64.rpm
kernel-tools-3.10.0-1062.31.2.el7.ppc64.rpm
kernel-tools-debuginfo-3.10.0-1062.31.2.el7.ppc64.rpm
kernel-tools-libs-3.10.0-1062.31.2.el7.ppc64.rpm
perf-3.10.0-1062.31.2.el7.ppc64.rpm
perf-debuginfo-3.10.0-1062.31.2.el7.ppc64.rpm
python-perf-3.10.0-1062.31.2.el7.ppc64.rpm
python-perf-debuginfo-3.10.0-1062.31.2.el7.ppc64.rpm

ppc64le:
bpftool-3.10.0-1062.31.2.el7.ppc64le.rpm
bpftool-debuginfo-3.10.0-1062.31.2.el7.ppc64le.rpm
kernel-3.10.0-1062.31.2.el7.ppc64le.rpm
kernel-bootwrapper-3.10.0-1062.31.2.el7.ppc64le.rpm
kernel-debug-3.10.0-1062.31.2.el7.ppc64le.rpm
kernel-debug-debuginfo-3.10.0-1062.31.2.el7.ppc64le.rpm
kernel-debuginfo-3.10.0-1062.31.2.el7.ppc64le.rpm
kernel-debuginfo-common-ppc64le-3.10.0-1062.31.2.el7.ppc64le.rpm
kernel-devel-3.10.0-1062.31.2.el7.ppc64le.rpm
kernel-headers-3.10.0-1062.31.2.el7.ppc64le.rpm
kernel-tools-3.10.0-1062.31.2.el7.ppc64le.rpm
kernel-tools-debuginfo-3.10.0-1062.31.2.el7.ppc64le.rpm
kernel-tools-libs-3.10.0-1062.31.2.el7.ppc64le.rpm
perf-3.10.0-1062.31.2.el7.ppc64le.rpm
perf-debuginfo-3.10.0-1062.31.2.el7.ppc64le.rpm
python-perf-3.10.0-1062.31.2.el7.ppc64le.rpm
python-perf-debuginfo-3.10.0-1062.31.2.el7.ppc64le.rpm

s390x:
bpftool-3.10.0-1062.31.2.el7.s390x.rpm
bpftool-debuginfo-3.10.0-1062.31.2.el7.s390x.rpm
kernel-3.10.0-1062.31.2.el7.s390x.rpm
kernel-debug-3.10.0-1062.31.2.el7.s390x.rpm
kernel-debug-debuginfo-3.10.0-1062.31.2.el7.s390x.rpm
kernel-debug-devel-3.10.0-1062.31.2.el7.s390x.rpm
kernel-debuginfo-3.10.0-1062.31.2.el7.s390x.rpm
kernel-debuginfo-common-s390x-3.10.0-1062.31.2.el7.s390x.rpm
kernel-devel-3.10.0-1062.31.2.el7.s390x.rpm
kernel-headers-3.10.0-1062.31.2.el7.s390x.rpm
kernel-kdump-3.10.0-1062.31.2.el7.s390x.rpm
kernel-kdump-debuginfo-3.10.0-1062.31.2.el7.s390x.rpm
kernel-kdump-devel-3.10.0-1062.31.2.el7.s390x.rpm
perf-3.10.0-1062.31.2.el7.s390x.rpm
perf-debuginfo-3.10.0-1062.31.2.el7.s390x.rpm
python-perf-3.10.0-1062.31.2.el7.s390x.rpm
python-perf-debuginfo-3.10.0-1062.31.2.el7.s390x.rpm

x86_64:
bpftool-3.10.0-1062.31.2.el7.x86_64.rpm
bpftool-debuginfo-3.10.0-1062.31.2.el7.x86_64.rpm
kernel-3.10.0-1062.31.2.el7.x86_64.rpm
kernel-debug-3.10.0-1062.31.2.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-1062.31.2.el7.x86_64.rpm
kernel-debug-devel-3.10.0-1062.31.2.el7.x86_64.rpm
kernel-debuginfo-3.10.0-1062.31.2.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-1062.31.2.el7.x86_64.rpm
kernel-devel-3.10.0-1062.31.2.el7.x86_64.rpm
kernel-headers-3.10.0-1062.31.2.el7.x86_64.rpm
kernel-tools-3.10.0-1062.31.2.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-1062.31.2.el7.x86_64.rpm
kernel-tools-libs-3.10.0-1062.31.2.el7.x86_64.rpm
perf-3.10.0-1062.31.2.el7.x86_64.rpm
perf-debuginfo-3.10.0-1062.31.2.el7.x86_64.rpm
python-perf-3.10.0-1062.31.2.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-1062.31.2.el7.x86_64.rpm

Red Hat Enterprise Linux Server Optional EUS (v. 7.7):

ppc64:
bpftool-debuginfo-3.10.0-1062.31.2.el7.ppc64.rpm
kernel-debug-debuginfo-3.10.0-1062.31.2.el7.ppc64.rpm
kernel-debuginfo-3.10.0-1062.31.2.el7.ppc64.rpm
kernel-debuginfo-common-ppc64-3.10.0-1062.31.2.el7.ppc64.rpm
kernel-tools-debuginfo-3.10.0-1062.31.2.el7.ppc64.rpm
kernel-tools-libs-devel-3.10.0-1062.31.2.el7.ppc64.rpm
perf-debuginfo-3.10.0-1062.31.2.el7.ppc64.rpm
python-perf-debuginfo-3.10.0-1062.31.2.el7.ppc64.rpm

ppc64le:
bpftool-debuginfo-3.10.0-1062.31.2.el7.ppc64le.rpm
kernel-debug-debuginfo-3.10.0-1062.31.2.el7.ppc64le.rpm
kernel-debug-devel-3.10.0-1062.31.2.el7.ppc64le.rpm
kernel-debuginfo-3.10.0-1062.31.2.el7.ppc64le.rpm
kernel-debuginfo-common-ppc64le-3.10.0-1062.31.2.el7.ppc64le.rpm
kernel-tools-debuginfo-3.10.0-1062.31.2.el7.ppc64le.rpm
kernel-tools-libs-devel-3.10.0-1062.31.2.el7.ppc64le.rpm
perf-debuginfo-3.10.0-1062.31.2.el7.ppc64le.rpm
python-perf-debuginfo-3.10.0-1062.31.2.el7.ppc64le.rpm

x86_64:
bpftool-debuginfo-3.10.0-1062.31.2.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-1062.31.2.el7.x86_64.rpm
kernel-debuginfo-3.10.0-1062.31.2.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-1062.31.2.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-1062.31.2.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-1062.31.2.el7.x86_64.rpm
perf-debuginfo-3.10.0-1062.31.2.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-1062.31.2.el7.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2020-12653
https://access.redhat.com/security/cve/CVE-2020-12654
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/security/vulnerabilities/grub2bootloader

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=HDwM
—–END PGP SIGNATURE—–


RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: kernel security and bug fix update
Advisory ID: RHSA-2020:3228-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:3228
Issue date: 2020-07-29
CVE Names: CVE-2019-20908 CVE-2020-15780
=====================================================================

1. Summary:

An update for kernel is now available for Red Hat Enterprise Linux 8.0
Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux BaseOS E4S (v. 8.0) – aarch64, noarch, ppc64le, s390x, x86_64

3. Description:

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security Fix(es):

* kernel: lockdown: bypass through ACPI write via efivar_ssdt
(CVE-2019-20908)

* kernel: lockdown: bypass through ACPI write via acpi_configfs
(CVE-2020-15780)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Bug Fix(es):

* kernel: provide infrastructure to support dual-signing of the kernel
(foundation to help address CVE-2020-10713) (BZ#1837431)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1852942 – CVE-2019-20908 kernel: lockdown: bypass through ACPI write via efivar_ssdt
1852962 – CVE-2020-15780 kernel: lockdown: bypass through ACPI write via acpi_configfs

6. Package List:

Red Hat Enterprise Linux BaseOS E4S (v. 8.0):

Source:
kernel-4.18.0-80.27.2.el8_0.src.rpm

aarch64:
bpftool-4.18.0-80.27.2.el8_0.aarch64.rpm
bpftool-debuginfo-4.18.0-80.27.2.el8_0.aarch64.rpm
kernel-4.18.0-80.27.2.el8_0.aarch64.rpm
kernel-core-4.18.0-80.27.2.el8_0.aarch64.rpm
kernel-cross-headers-4.18.0-80.27.2.el8_0.aarch64.rpm
kernel-debug-4.18.0-80.27.2.el8_0.aarch64.rpm
kernel-debug-core-4.18.0-80.27.2.el8_0.aarch64.rpm
kernel-debug-debuginfo-4.18.0-80.27.2.el8_0.aarch64.rpm
kernel-debug-devel-4.18.0-80.27.2.el8_0.aarch64.rpm
kernel-debug-modules-4.18.0-80.27.2.el8_0.aarch64.rpm
kernel-debug-modules-extra-4.18.0-80.27.2.el8_0.aarch64.rpm
kernel-debuginfo-4.18.0-80.27.2.el8_0.aarch64.rpm
kernel-debuginfo-common-aarch64-4.18.0-80.27.2.el8_0.aarch64.rpm
kernel-devel-4.18.0-80.27.2.el8_0.aarch64.rpm
kernel-headers-4.18.0-80.27.2.el8_0.aarch64.rpm
kernel-modules-4.18.0-80.27.2.el8_0.aarch64.rpm
kernel-modules-extra-4.18.0-80.27.2.el8_0.aarch64.rpm
kernel-tools-4.18.0-80.27.2.el8_0.aarch64.rpm
kernel-tools-debuginfo-4.18.0-80.27.2.el8_0.aarch64.rpm
kernel-tools-libs-4.18.0-80.27.2.el8_0.aarch64.rpm
perf-4.18.0-80.27.2.el8_0.aarch64.rpm
perf-debuginfo-4.18.0-80.27.2.el8_0.aarch64.rpm
python3-perf-4.18.0-80.27.2.el8_0.aarch64.rpm
python3-perf-debuginfo-4.18.0-80.27.2.el8_0.aarch64.rpm

noarch:
kernel-abi-whitelists-4.18.0-80.27.2.el8_0.noarch.rpm
kernel-doc-4.18.0-80.27.2.el8_0.noarch.rpm

ppc64le:
bpftool-4.18.0-80.27.2.el8_0.ppc64le.rpm
bpftool-debuginfo-4.18.0-80.27.2.el8_0.ppc64le.rpm
kernel-4.18.0-80.27.2.el8_0.ppc64le.rpm
kernel-core-4.18.0-80.27.2.el8_0.ppc64le.rpm
kernel-cross-headers-4.18.0-80.27.2.el8_0.ppc64le.rpm
kernel-debug-4.18.0-80.27.2.el8_0.ppc64le.rpm
kernel-debug-core-4.18.0-80.27.2.el8_0.ppc64le.rpm
kernel-debug-debuginfo-4.18.0-80.27.2.el8_0.ppc64le.rpm
kernel-debug-devel-4.18.0-80.27.2.el8_0.ppc64le.rpm
kernel-debug-modules-4.18.0-80.27.2.el8_0.ppc64le.rpm
kernel-debug-modules-extra-4.18.0-80.27.2.el8_0.ppc64le.rpm
kernel-debuginfo-4.18.0-80.27.2.el8_0.ppc64le.rpm
kernel-debuginfo-common-ppc64le-4.18.0-80.27.2.el8_0.ppc64le.rpm
kernel-devel-4.18.0-80.27.2.el8_0.ppc64le.rpm
kernel-headers-4.18.0-80.27.2.el8_0.ppc64le.rpm
kernel-modules-4.18.0-80.27.2.el8_0.ppc64le.rpm
kernel-modules-extra-4.18.0-80.27.2.el8_0.ppc64le.rpm
kernel-tools-4.18.0-80.27.2.el8_0.ppc64le.rpm
kernel-tools-debuginfo-4.18.0-80.27.2.el8_0.ppc64le.rpm
kernel-tools-libs-4.18.0-80.27.2.el8_0.ppc64le.rpm
perf-4.18.0-80.27.2.el8_0.ppc64le.rpm
perf-debuginfo-4.18.0-80.27.2.el8_0.ppc64le.rpm
python3-perf-4.18.0-80.27.2.el8_0.ppc64le.rpm
python3-perf-debuginfo-4.18.0-80.27.2.el8_0.ppc64le.rpm

s390x:
bpftool-4.18.0-80.27.2.el8_0.s390x.rpm
bpftool-debuginfo-4.18.0-80.27.2.el8_0.s390x.rpm
kernel-4.18.0-80.27.2.el8_0.s390x.rpm
kernel-core-4.18.0-80.27.2.el8_0.s390x.rpm
kernel-cross-headers-4.18.0-80.27.2.el8_0.s390x.rpm
kernel-debug-4.18.0-80.27.2.el8_0.s390x.rpm
kernel-debug-core-4.18.0-80.27.2.el8_0.s390x.rpm
kernel-debug-debuginfo-4.18.0-80.27.2.el8_0.s390x.rpm
kernel-debug-devel-4.18.0-80.27.2.el8_0.s390x.rpm
kernel-debug-modules-4.18.0-80.27.2.el8_0.s390x.rpm
kernel-debug-modules-extra-4.18.0-80.27.2.el8_0.s390x.rpm
kernel-debuginfo-4.18.0-80.27.2.el8_0.s390x.rpm
kernel-debuginfo-common-s390x-4.18.0-80.27.2.el8_0.s390x.rpm
kernel-devel-4.18.0-80.27.2.el8_0.s390x.rpm
kernel-headers-4.18.0-80.27.2.el8_0.s390x.rpm
kernel-modules-4.18.0-80.27.2.el8_0.s390x.rpm
kernel-modules-extra-4.18.0-80.27.2.el8_0.s390x.rpm
kernel-tools-4.18.0-80.27.2.el8_0.s390x.rpm
kernel-tools-debuginfo-4.18.0-80.27.2.el8_0.s390x.rpm
kernel-zfcpdump-4.18.0-80.27.2.el8_0.s390x.rpm
kernel-zfcpdump-core-4.18.0-80.27.2.el8_0.s390x.rpm
kernel-zfcpdump-debuginfo-4.18.0-80.27.2.el8_0.s390x.rpm
kernel-zfcpdump-devel-4.18.0-80.27.2.el8_0.s390x.rpm
kernel-zfcpdump-modules-4.18.0-80.27.2.el8_0.s390x.rpm
kernel-zfcpdump-modules-extra-4.18.0-80.27.2.el8_0.s390x.rpm
perf-4.18.0-80.27.2.el8_0.s390x.rpm
perf-debuginfo-4.18.0-80.27.2.el8_0.s390x.rpm
python3-perf-4.18.0-80.27.2.el8_0.s390x.rpm
python3-perf-debuginfo-4.18.0-80.27.2.el8_0.s390x.rpm

x86_64:
bpftool-4.18.0-80.27.2.el8_0.x86_64.rpm
bpftool-debuginfo-4.18.0-80.27.2.el8_0.x86_64.rpm
kernel-4.18.0-80.27.2.el8_0.x86_64.rpm
kernel-core-4.18.0-80.27.2.el8_0.x86_64.rpm
kernel-cross-headers-4.18.0-80.27.2.el8_0.x86_64.rpm
kernel-debug-4.18.0-80.27.2.el8_0.x86_64.rpm
kernel-debug-core-4.18.0-80.27.2.el8_0.x86_64.rpm
kernel-debug-debuginfo-4.18.0-80.27.2.el8_0.x86_64.rpm
kernel-debug-devel-4.18.0-80.27.2.el8_0.x86_64.rpm
kernel-debug-modules-4.18.0-80.27.2.el8_0.x86_64.rpm
kernel-debug-modules-extra-4.18.0-80.27.2.el8_0.x86_64.rpm
kernel-debuginfo-4.18.0-80.27.2.el8_0.x86_64.rpm
kernel-debuginfo-common-x86_64-4.18.0-80.27.2.el8_0.x86_64.rpm
kernel-devel-4.18.0-80.27.2.el8_0.x86_64.rpm
kernel-headers-4.18.0-80.27.2.el8_0.x86_64.rpm
kernel-modules-4.18.0-80.27.2.el8_0.x86_64.rpm
kernel-modules-extra-4.18.0-80.27.2.el8_0.x86_64.rpm
kernel-tools-4.18.0-80.27.2.el8_0.x86_64.rpm
kernel-tools-debuginfo-4.18.0-80.27.2.el8_0.x86_64.rpm
kernel-tools-libs-4.18.0-80.27.2.el8_0.x86_64.rpm
perf-4.18.0-80.27.2.el8_0.x86_64.rpm
perf-debuginfo-4.18.0-80.27.2.el8_0.x86_64.rpm
python3-perf-4.18.0-80.27.2.el8_0.x86_64.rpm
python3-perf-debuginfo-4.18.0-80.27.2.el8_0.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-20908
https://access.redhat.com/security/cve/CVE-2020-15780
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/security/vulnerabilities/grub2bootloader

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1

iQIVAwUBXyHZitzjgjWX9erEAQjaQQ//QNVwsYkZBClZ8b+nKILTnGTpX8HVNaYN
HqnkWVoDMesggS9PrJr/jyrZCkmZA80mkxNRs0QxpM5El3pUW08YfVJ49itSYZxU
s4qWCtfrJYDUCL8hpVy5RlhJ1tdyOpz4lp/tgTI9DWqITsVNJSK4jog8KFa/MiDP
LsVqHjqqWRRMLsfXeJAWgfLAuWE5inz9RtnR/+X3uUxWBpdM74b/qvj3aLOiqZ6C
MG/440RgOLoqN3To2P4f6AbtO84FFVDEIqQnRfReX1mFUExRauEpS/QHvAPkUYG6
2wQd5r3LHaOHXVeRIL+SBsa7m81ddJobMRrzmhOBKvVMUVBPrV3UdFFEArvgiuM/
5k7+MJwQbB2kOUJHtTl0/X7RyNvL8iY3AcT51n7+drVykTwCRYk9fwgdD8rZrb7g
jizsPNukN7Ie8qYxGkIHzUd6bnM88lZVTmMvHVGylgR3vLQizPBjO/zQkijfAu46
L73FDmtunl61DWvxTLklnCzSp7L9V6CqADOM+jg2uIfR8dkyuSjaJN4bOligrlRt
y1KFkIBkL06KUBeKTmAr+LA5PujyfYzhjspje28eFLo1HH5GyLaischhyNiRwsxJ
WFSor8HwTaKsObmzZ1l2Vt72fWI0dz4Qg9211Z8W8JkQ04grJzeVC7046gQ5H9kS
zwRw+QGhukQ=
=kiaY
—–END PGP SIGNATURE—–


RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Important: kernel security and bug fix update
Advisory ID: RHSA-2020:3222-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:3222
Issue date: 2020-07-29
CVE Names: CVE-2019-19807 CVE-2019-20908 CVE-2020-10757
CVE-2020-10766 CVE-2020-10767 CVE-2020-10768
CVE-2020-12653 CVE-2020-12654 CVE-2020-12888
CVE-2020-15780
=====================================================================

1. Summary:

An update for kernel is now available for Red Hat Enterprise Linux 8.1
Extended Update Support.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat CodeReady Linux Builder EUS (v. 8.1) – aarch64, ppc64le, x86_64
Red Hat Enterprise Linux BaseOS EUS (v. 8.1) – aarch64, noarch, ppc64le, s390x, x86_64

3. Description:

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security Fix(es):

* kernel: use-after-free in sound/core/timer.c (CVE-2019-19807)

* kernel: kernel: DAX hugepages not considered during mremap
(CVE-2020-10757)

* kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug
allows an attacker to turn off the SSBD protection. (CVE-2020-10766)

* kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP
is unavailable or enhanced IBRS is available. (CVE-2020-10767)

* kernel: Indirect branch speculation can be enabled after it was
force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (CVE-2020-10768)

* kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in
drivers/net/wireless/marvell/mwifiex/scan.c (CVE-2020-12653)

* kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function
in drivers/net/wireless/marvell/mwifiex/wmm.c (CVE-2020-12654)

* Kernel: vfio: access to disabled MMIO space of some devices may lead to
DoS scenario (CVE-2020-12888)

* kernel: lockdown: bypass through ACPI write via efivar_ssdt
(CVE-2019-20908)

* kernel: lockdown: bypass through ACPI write via acpi_configfs
(CVE-2020-15780)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Bug Fix(es):

* [DELL EMC 8.1 BUG] : Observing Multiple “hw csum failure” while
installing RHEL 8.1 on iSCSI LUN (BZ#1821374)

* kernel: provide infrastructure to support dual-signing of the kernel
(foundation to help address CVE-2020-10713) (BZ#1837432)

* deadlock between modprobe and netns exit (BZ#1845163)

* exit_boot failed when install RHEL8.1 (BZ#1846179)

* http request is taking more time for endpoint running on different host
via nodeport service (BZ#1847127)

* RHEL8.1 – s390/cio: fix virtio-ccw DMA without PV (BZ#1847534)

* RHEL8.1 – zEDC problems on z14 (genwqe/pci) (BZ#1847939)

* NVMe/FC with DM-MP unexpected I/O failure during “transitioning”
[EIOP-8345] (BZ#1854678)

* Backport conntrack race condition fixes (BZ#1854953)

* nf_conntrack module unload fail and refcount become to negative
(BZ#1854954)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1786078 – CVE-2019-19807 kernel: use-after-free in sound/core/timer.c
1831868 – CVE-2020-12653 kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c
1832530 – CVE-2020-12654 kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c
1836244 – CVE-2020-12888 Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario
1842525 – CVE-2020-10757 kernel: kernel: DAX hugepages not considered during mremap
1845840 – CVE-2020-10766 kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection.
1845867 – CVE-2020-10767 kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available.
1845868 – CVE-2020-10768 kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command.
1852942 – CVE-2019-20908 kernel: lockdown: bypass through ACPI write via efivar_ssdt
1852962 – CVE-2020-15780 kernel: lockdown: bypass through ACPI write via acpi_configfs

6. Package List:

Red Hat Enterprise Linux BaseOS EUS (v. 8.1):

Source:
kernel-4.18.0-147.24.2.el8_1.src.rpm

aarch64:
bpftool-4.18.0-147.24.2.el8_1.aarch64.rpm
bpftool-debuginfo-4.18.0-147.24.2.el8_1.aarch64.rpm
kernel-4.18.0-147.24.2.el8_1.aarch64.rpm
kernel-core-4.18.0-147.24.2.el8_1.aarch64.rpm
kernel-cross-headers-4.18.0-147.24.2.el8_1.aarch64.rpm
kernel-debug-4.18.0-147.24.2.el8_1.aarch64.rpm
kernel-debug-core-4.18.0-147.24.2.el8_1.aarch64.rpm
kernel-debug-debuginfo-4.18.0-147.24.2.el8_1.aarch64.rpm
kernel-debug-devel-4.18.0-147.24.2.el8_1.aarch64.rpm
kernel-debug-modules-4.18.0-147.24.2.el8_1.aarch64.rpm
kernel-debug-modules-extra-4.18.0-147.24.2.el8_1.aarch64.rpm
kernel-debuginfo-4.18.0-147.24.2.el8_1.aarch64.rpm
kernel-debuginfo-common-aarch64-4.18.0-147.24.2.el8_1.aarch64.rpm
kernel-devel-4.18.0-147.24.2.el8_1.aarch64.rpm
kernel-headers-4.18.0-147.24.2.el8_1.aarch64.rpm
kernel-modules-4.18.0-147.24.2.el8_1.aarch64.rpm
kernel-modules-extra-4.18.0-147.24.2.el8_1.aarch64.rpm
kernel-tools-4.18.0-147.24.2.el8_1.aarch64.rpm
kernel-tools-debuginfo-4.18.0-147.24.2.el8_1.aarch64.rpm
kernel-tools-libs-4.18.0-147.24.2.el8_1.aarch64.rpm
perf-4.18.0-147.24.2.el8_1.aarch64.rpm
perf-debuginfo-4.18.0-147.24.2.el8_1.aarch64.rpm
python3-perf-4.18.0-147.24.2.el8_1.aarch64.rpm
python3-perf-debuginfo-4.18.0-147.24.2.el8_1.aarch64.rpm

noarch:
kernel-abi-whitelists-4.18.0-147.24.2.el8_1.noarch.rpm
kernel-doc-4.18.0-147.24.2.el8_1.noarch.rpm

ppc64le:
bpftool-4.18.0-147.24.2.el8_1.ppc64le.rpm
bpftool-debuginfo-4.18.0-147.24.2.el8_1.ppc64le.rpm
kernel-4.18.0-147.24.2.el8_1.ppc64le.rpm
kernel-core-4.18.0-147.24.2.el8_1.ppc64le.rpm
kernel-cross-headers-4.18.0-147.24.2.el8_1.ppc64le.rpm
kernel-debug-4.18.0-147.24.2.el8_1.ppc64le.rpm
kernel-debug-core-4.18.0-147.24.2.el8_1.ppc64le.rpm
kernel-debug-debuginfo-4.18.0-147.24.2.el8_1.ppc64le.rpm
kernel-debug-devel-4.18.0-147.24.2.el8_1.ppc64le.rpm
kernel-debug-modules-4.18.0-147.24.2.el8_1.ppc64le.rpm
kernel-debug-modules-extra-4.18.0-147.24.2.el8_1.ppc64le.rpm
kernel-debuginfo-4.18.0-147.24.2.el8_1.ppc64le.rpm
kernel-debuginfo-common-ppc64le-4.18.0-147.24.2.el8_1.ppc64le.rpm
kernel-devel-4.18.0-147.24.2.el8_1.ppc64le.rpm
kernel-headers-4.18.0-147.24.2.el8_1.ppc64le.rpm
kernel-modules-4.18.0-147.24.2.el8_1.ppc64le.rpm
kernel-modules-extra-4.18.0-147.24.2.el8_1.ppc64le.rpm
kernel-tools-4.18.0-147.24.2.el8_1.ppc64le.rpm
kernel-tools-debuginfo-4.18.0-147.24.2.el8_1.ppc64le.rpm
kernel-tools-libs-4.18.0-147.24.2.el8_1.ppc64le.rpm
perf-4.18.0-147.24.2.el8_1.ppc64le.rpm
perf-debuginfo-4.18.0-147.24.2.el8_1.ppc64le.rpm
python3-perf-4.18.0-147.24.2.el8_1.ppc64le.rpm
python3-perf-debuginfo-4.18.0-147.24.2.el8_1.ppc64le.rpm

s390x:
bpftool-4.18.0-147.24.2.el8_1.s390x.rpm
bpftool-debuginfo-4.18.0-147.24.2.el8_1.s390x.rpm
kernel-4.18.0-147.24.2.el8_1.s390x.rpm
kernel-core-4.18.0-147.24.2.el8_1.s390x.rpm
kernel-cross-headers-4.18.0-147.24.2.el8_1.s390x.rpm
kernel-debug-4.18.0-147.24.2.el8_1.s390x.rpm
kernel-debug-core-4.18.0-147.24.2.el8_1.s390x.rpm
kernel-debug-debuginfo-4.18.0-147.24.2.el8_1.s390x.rpm
kernel-debug-devel-4.18.0-147.24.2.el8_1.s390x.rpm
kernel-debug-modules-4.18.0-147.24.2.el8_1.s390x.rpm
kernel-debug-modules-extra-4.18.0-147.24.2.el8_1.s390x.rpm
kernel-debuginfo-4.18.0-147.24.2.el8_1.s390x.rpm
kernel-debuginfo-common-s390x-4.18.0-147.24.2.el8_1.s390x.rpm
kernel-devel-4.18.0-147.24.2.el8_1.s390x.rpm
kernel-headers-4.18.0-147.24.2.el8_1.s390x.rpm
kernel-modules-4.18.0-147.24.2.el8_1.s390x.rpm
kernel-modules-extra-4.18.0-147.24.2.el8_1.s390x.rpm
kernel-tools-4.18.0-147.24.2.el8_1.s390x.rpm
kernel-tools-debuginfo-4.18.0-147.24.2.el8_1.s390x.rpm
kernel-zfcpdump-4.18.0-147.24.2.el8_1.s390x.rpm
kernel-zfcpdump-core-4.18.0-147.24.2.el8_1.s390x.rpm
kernel-zfcpdump-debuginfo-4.18.0-147.24.2.el8_1.s390x.rpm
kernel-zfcpdump-devel-4.18.0-147.24.2.el8_1.s390x.rpm
kernel-zfcpdump-modules-4.18.0-147.24.2.el8_1.s390x.rpm
kernel-zfcpdump-modules-extra-4.18.0-147.24.2.el8_1.s390x.rpm
perf-4.18.0-147.24.2.el8_1.s390x.rpm
perf-debuginfo-4.18.0-147.24.2.el8_1.s390x.rpm
python3-perf-4.18.0-147.24.2.el8_1.s390x.rpm
python3-perf-debuginfo-4.18.0-147.24.2.el8_1.s390x.rpm

x86_64:
bpftool-4.18.0-147.24.2.el8_1.x86_64.rpm
bpftool-debuginfo-4.18.0-147.24.2.el8_1.x86_64.rpm
kernel-4.18.0-147.24.2.el8_1.x86_64.rpm
kernel-core-4.18.0-147.24.2.el8_1.x86_64.rpm
kernel-cross-headers-4.18.0-147.24.2.el8_1.x86_64.rpm
kernel-debug-4.18.0-147.24.2.el8_1.x86_64.rpm
kernel-debug-core-4.18.0-147.24.2.el8_1.x86_64.rpm
kernel-debug-debuginfo-4.18.0-147.24.2.el8_1.x86_64.rpm
kernel-debug-devel-4.18.0-147.24.2.el8_1.x86_64.rpm
kernel-debug-modules-4.18.0-147.24.2.el8_1.x86_64.rpm
kernel-debug-modules-extra-4.18.0-147.24.2.el8_1.x86_64.rpm
kernel-debuginfo-4.18.0-147.24.2.el8_1.x86_64.rpm
kernel-debuginfo-common-x86_64-4.18.0-147.24.2.el8_1.x86_64.rpm
kernel-devel-4.18.0-147.24.2.el8_1.x86_64.rpm
kernel-headers-4.18.0-147.24.2.el8_1.x86_64.rpm
kernel-modules-4.18.0-147.24.2.el8_1.x86_64.rpm
kernel-modules-extra-4.18.0-147.24.2.el8_1.x86_64.rpm
kernel-tools-4.18.0-147.24.2.el8_1.x86_64.rpm
kernel-tools-debuginfo-4.18.0-147.24.2.el8_1.x86_64.rpm
kernel-tools-libs-4.18.0-147.24.2.el8_1.x86_64.rpm
perf-4.18.0-147.24.2.el8_1.x86_64.rpm
perf-debuginfo-4.18.0-147.24.2.el8_1.x86_64.rpm
python3-perf-4.18.0-147.24.2.el8_1.x86_64.rpm
python3-perf-debuginfo-4.18.0-147.24.2.el8_1.x86_64.rpm

Red Hat CodeReady Linux Builder EUS (v. 8.1):

aarch64:
bpftool-debuginfo-4.18.0-147.24.2.el8_1.aarch64.rpm
kernel-debug-debuginfo-4.18.0-147.24.2.el8_1.aarch64.rpm
kernel-debuginfo-4.18.0-147.24.2.el8_1.aarch64.rpm
kernel-debuginfo-common-aarch64-4.18.0-147.24.2.el8_1.aarch64.rpm
kernel-tools-debuginfo-4.18.0-147.24.2.el8_1.aarch64.rpm
kernel-tools-libs-devel-4.18.0-147.24.2.el8_1.aarch64.rpm
perf-debuginfo-4.18.0-147.24.2.el8_1.aarch64.rpm
python3-perf-debuginfo-4.18.0-147.24.2.el8_1.aarch64.rpm

ppc64le:
bpftool-debuginfo-4.18.0-147.24.2.el8_1.ppc64le.rpm
kernel-debug-debuginfo-4.18.0-147.24.2.el8_1.ppc64le.rpm
kernel-debuginfo-4.18.0-147.24.2.el8_1.ppc64le.rpm
kernel-debuginfo-common-ppc64le-4.18.0-147.24.2.el8_1.ppc64le.rpm
kernel-tools-debuginfo-4.18.0-147.24.2.el8_1.ppc64le.rpm
kernel-tools-libs-devel-4.18.0-147.24.2.el8_1.ppc64le.rpm
perf-debuginfo-4.18.0-147.24.2.el8_1.ppc64le.rpm
python3-perf-debuginfo-4.18.0-147.24.2.el8_1.ppc64le.rpm

x86_64:
bpftool-debuginfo-4.18.0-147.24.2.el8_1.x86_64.rpm
kernel-debug-debuginfo-4.18.0-147.24.2.el8_1.x86_64.rpm
kernel-debuginfo-4.18.0-147.24.2.el8_1.x86_64.rpm
kernel-debuginfo-common-x86_64-4.18.0-147.24.2.el8_1.x86_64.rpm
kernel-tools-debuginfo-4.18.0-147.24.2.el8_1.x86_64.rpm
kernel-tools-libs-devel-4.18.0-147.24.2.el8_1.x86_64.rpm
perf-debuginfo-4.18.0-147.24.2.el8_1.x86_64.rpm
python3-perf-debuginfo-4.18.0-147.24.2.el8_1.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-19807
https://access.redhat.com/security/cve/CVE-2019-20908
https://access.redhat.com/security/cve/CVE-2020-10757
https://access.redhat.com/security/cve/CVE-2020-10766
https://access.redhat.com/security/cve/CVE-2020-10767
https://access.redhat.com/security/cve/CVE-2020-10768
https://access.redhat.com/security/cve/CVE-2020-12653
https://access.redhat.com/security/cve/CVE-2020-12654
https://access.redhat.com/security/cve/CVE-2020-12888
https://access.redhat.com/security/cve/CVE-2020-15780
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/security/vulnerabilities/grub2bootloader

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1

iQIVAwUBXyHQZtzjgjWX9erEAQggmxAApwdIGaM8ov9YYPnA7i1jCEFdQ93ZEa4j
aWOf5sSjxtQRAgfY2opEvc4wnvDuLKxl8TNTgmw198s26O3HgmBr/kz7oUVr24ak
x+0tzkwucUzoNTCD1d+WmOVTlWLKzaawmd3MEhKC2/6+mUADbNCKfu3PObkX+KX7
2IJF5KGXFjU4UYVGsq1Syxv5UhNJWOX77AGxn6uRJ6/QJA2CriwHn0L6aWoOnCmY
ESO8gAKBvnKLdM2dlEa1U/tLn1c3WMGsGCV78dtf5Eor7gFBwrNm/2eC2kXQX8md
9+B1JQ1IP+H4mBJuewSf674qjGbplaF43/Aoqscb+IJw1t18Rt5KEg/3kM18/MWB
ir5cy6UlVFjsW19KX/i1eLyvtUn/pKYgREO79pQjARoTzmat/LBC9aOWmMKji1ue
g6DbBcFCM+C3vXgQ0LsM8h1pMye1/3LB6wL3GtaHpHXJrDXywnLvqPp6Q/OJLFkA
97YD6uSQaQi5G93BbbIQ5SO4kKBcK7T/ba2K7JCD0W+eyTwZ5I7WcTSh+gu6p55J
agml0ZNOaJem8Y924NGAPSMSu2PPlRTZ/NC3tQ5CYCwTsEmpn2iafFtyKbHIEeSi
pDa5iYxtq/fCEzeNDdlxX/tc99wpf/5CUrVrvTlg9MTrsjXHYEIfPAXMU2TSUHS3
Dya6quF3tN8=
=Awur
—–END PGP SIGNATURE—–


RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: kernel security and bug fix update
Advisory ID: RHSA-2020:3218-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:3218
Issue date: 2020-07-29
CVE Names: CVE-2019-20908 CVE-2020-15780
=====================================================================

1. Summary:

An update for kernel is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat CodeReady Linux Builder (v. 8) – aarch64, ppc64le, x86_64
Red Hat Enterprise Linux BaseOS (v. 8) – aarch64, noarch, ppc64le, s390x, x86_64

3. Description:

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security Fix(es):

* kernel: lockdown: bypass through ACPI write via efivar_ssdt
(CVE-2019-20908)

* kernel: lockdown: bypass through ACPI write via acpi_configfs
(CVE-2020-15780)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Bug Fix(es):

* kernel: provide infrastructure to support dual-signing of the kernel
(foundation to help address CVE-2020-10713) (BZ#1837433)

* [Regression] RHEL8.2 RC – [Boston/DD2.1]
[RHEL8.2/kernel-4.18.0-193.el8.ppc64le] Host kernel crashes while running
storage test bucket on KVM guest (iscsi) (BZ#1852048)

* RHEL8.2 – s390/mm: fix panic in gup_fast on large pud (BZ#1853336)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1852942 – CVE-2019-20908 kernel: lockdown: bypass through ACPI write via efivar_ssdt
1852962 – CVE-2020-15780 kernel: lockdown: bypass through ACPI write via acpi_configfs

6. Package List:

Red Hat Enterprise Linux BaseOS (v. 8):

Source:
kernel-4.18.0-193.14.3.el8_2.src.rpm

aarch64:
bpftool-4.18.0-193.14.3.el8_2.aarch64.rpm
bpftool-debuginfo-4.18.0-193.14.3.el8_2.aarch64.rpm
kernel-4.18.0-193.14.3.el8_2.aarch64.rpm
kernel-core-4.18.0-193.14.3.el8_2.aarch64.rpm
kernel-cross-headers-4.18.0-193.14.3.el8_2.aarch64.rpm
kernel-debug-4.18.0-193.14.3.el8_2.aarch64.rpm
kernel-debug-core-4.18.0-193.14.3.el8_2.aarch64.rpm
kernel-debug-debuginfo-4.18.0-193.14.3.el8_2.aarch64.rpm
kernel-debug-devel-4.18.0-193.14.3.el8_2.aarch64.rpm
kernel-debug-modules-4.18.0-193.14.3.el8_2.aarch64.rpm
kernel-debug-modules-extra-4.18.0-193.14.3.el8_2.aarch64.rpm
kernel-debuginfo-4.18.0-193.14.3.el8_2.aarch64.rpm
kernel-debuginfo-common-aarch64-4.18.0-193.14.3.el8_2.aarch64.rpm
kernel-devel-4.18.0-193.14.3.el8_2.aarch64.rpm
kernel-headers-4.18.0-193.14.3.el8_2.aarch64.rpm
kernel-modules-4.18.0-193.14.3.el8_2.aarch64.rpm
kernel-modules-extra-4.18.0-193.14.3.el8_2.aarch64.rpm
kernel-tools-4.18.0-193.14.3.el8_2.aarch64.rpm
kernel-tools-debuginfo-4.18.0-193.14.3.el8_2.aarch64.rpm
kernel-tools-libs-4.18.0-193.14.3.el8_2.aarch64.rpm
perf-4.18.0-193.14.3.el8_2.aarch64.rpm
perf-debuginfo-4.18.0-193.14.3.el8_2.aarch64.rpm
python3-perf-4.18.0-193.14.3.el8_2.aarch64.rpm
python3-perf-debuginfo-4.18.0-193.14.3.el8_2.aarch64.rpm

noarch:
kernel-abi-whitelists-4.18.0-193.14.3.el8_2.noarch.rpm
kernel-doc-4.18.0-193.14.3.el8_2.noarch.rpm

ppc64le:
bpftool-4.18.0-193.14.3.el8_2.ppc64le.rpm
bpftool-debuginfo-4.18.0-193.14.3.el8_2.ppc64le.rpm
kernel-4.18.0-193.14.3.el8_2.ppc64le.rpm
kernel-core-4.18.0-193.14.3.el8_2.ppc64le.rpm
kernel-cross-headers-4.18.0-193.14.3.el8_2.ppc64le.rpm
kernel-debug-4.18.0-193.14.3.el8_2.ppc64le.rpm
kernel-debug-core-4.18.0-193.14.3.el8_2.ppc64le.rpm
kernel-debug-debuginfo-4.18.0-193.14.3.el8_2.ppc64le.rpm
kernel-debug-devel-4.18.0-193.14.3.el8_2.ppc64le.rpm
kernel-debug-modules-4.18.0-193.14.3.el8_2.ppc64le.rpm
kernel-debug-modules-extra-4.18.0-193.14.3.el8_2.ppc64le.rpm
kernel-debuginfo-4.18.0-193.14.3.el8_2.ppc64le.rpm
kernel-debuginfo-common-ppc64le-4.18.0-193.14.3.el8_2.ppc64le.rpm
kernel-devel-4.18.0-193.14.3.el8_2.ppc64le.rpm
kernel-headers-4.18.0-193.14.3.el8_2.ppc64le.rpm
kernel-modules-4.18.0-193.14.3.el8_2.ppc64le.rpm
kernel-modules-extra-4.18.0-193.14.3.el8_2.ppc64le.rpm
kernel-tools-4.18.0-193.14.3.el8_2.ppc64le.rpm
kernel-tools-debuginfo-4.18.0-193.14.3.el8_2.ppc64le.rpm
kernel-tools-libs-4.18.0-193.14.3.el8_2.ppc64le.rpm
perf-4.18.0-193.14.3.el8_2.ppc64le.rpm
perf-debuginfo-4.18.0-193.14.3.el8_2.ppc64le.rpm
python3-perf-4.18.0-193.14.3.el8_2.ppc64le.rpm
python3-perf-debuginfo-4.18.0-193.14.3.el8_2.ppc64le.rpm

s390x:
bpftool-4.18.0-193.14.3.el8_2.s390x.rpm
bpftool-debuginfo-4.18.0-193.14.3.el8_2.s390x.rpm
kernel-4.18.0-193.14.3.el8_2.s390x.rpm
kernel-core-4.18.0-193.14.3.el8_2.s390x.rpm
kernel-cross-headers-4.18.0-193.14.3.el8_2.s390x.rpm
kernel-debug-4.18.0-193.14.3.el8_2.s390x.rpm
kernel-debug-core-4.18.0-193.14.3.el8_2.s390x.rpm
kernel-debug-debuginfo-4.18.0-193.14.3.el8_2.s390x.rpm
kernel-debug-devel-4.18.0-193.14.3.el8_2.s390x.rpm
kernel-debug-modules-4.18.0-193.14.3.el8_2.s390x.rpm
kernel-debug-modules-extra-4.18.0-193.14.3.el8_2.s390x.rpm
kernel-debuginfo-4.18.0-193.14.3.el8_2.s390x.rpm
kernel-debuginfo-common-s390x-4.18.0-193.14.3.el8_2.s390x.rpm
kernel-devel-4.18.0-193.14.3.el8_2.s390x.rpm
kernel-headers-4.18.0-193.14.3.el8_2.s390x.rpm
kernel-modules-4.18.0-193.14.3.el8_2.s390x.rpm
kernel-modules-extra-4.18.0-193.14.3.el8_2.s390x.rpm
kernel-tools-4.18.0-193.14.3.el8_2.s390x.rpm
kernel-tools-debuginfo-4.18.0-193.14.3.el8_2.s390x.rpm
kernel-zfcpdump-4.18.0-193.14.3.el8_2.s390x.rpm
kernel-zfcpdump-core-4.18.0-193.14.3.el8_2.s390x.rpm
kernel-zfcpdump-debuginfo-4.18.0-193.14.3.el8_2.s390x.rpm
kernel-zfcpdump-devel-4.18.0-193.14.3.el8_2.s390x.rpm
kernel-zfcpdump-modules-4.18.0-193.14.3.el8_2.s390x.rpm
kernel-zfcpdump-modules-extra-4.18.0-193.14.3.el8_2.s390x.rpm
perf-4.18.0-193.14.3.el8_2.s390x.rpm
perf-debuginfo-4.18.0-193.14.3.el8_2.s390x.rpm
python3-perf-4.18.0-193.14.3.el8_2.s390x.rpm
python3-perf-debuginfo-4.18.0-193.14.3.el8_2.s390x.rpm

x86_64:
bpftool-4.18.0-193.14.3.el8_2.x86_64.rpm
bpftool-debuginfo-4.18.0-193.14.3.el8_2.x86_64.rpm
kernel-4.18.0-193.14.3.el8_2.x86_64.rpm
kernel-core-4.18.0-193.14.3.el8_2.x86_64.rpm
kernel-cross-headers-4.18.0-193.14.3.el8_2.x86_64.rpm
kernel-debug-4.18.0-193.14.3.el8_2.x86_64.rpm
kernel-debug-core-4.18.0-193.14.3.el8_2.x86_64.rpm
kernel-debug-debuginfo-4.18.0-193.14.3.el8_2.x86_64.rpm
kernel-debug-devel-4.18.0-193.14.3.el8_2.x86_64.rpm
kernel-debug-modules-4.18.0-193.14.3.el8_2.x86_64.rpm
kernel-debug-modules-extra-4.18.0-193.14.3.el8_2.x86_64.rpm
kernel-debuginfo-4.18.0-193.14.3.el8_2.x86_64.rpm
kernel-debuginfo-common-x86_64-4.18.0-193.14.3.el8_2.x86_64.rpm
kernel-devel-4.18.0-193.14.3.el8_2.x86_64.rpm
kernel-headers-4.18.0-193.14.3.el8_2.x86_64.rpm
kernel-modules-4.18.0-193.14.3.el8_2.x86_64.rpm
kernel-modules-extra-4.18.0-193.14.3.el8_2.x86_64.rpm
kernel-tools-4.18.0-193.14.3.el8_2.x86_64.rpm
kernel-tools-debuginfo-4.18.0-193.14.3.el8_2.x86_64.rpm
kernel-tools-libs-4.18.0-193.14.3.el8_2.x86_64.rpm
perf-4.18.0-193.14.3.el8_2.x86_64.rpm
perf-debuginfo-4.18.0-193.14.3.el8_2.x86_64.rpm
python3-perf-4.18.0-193.14.3.el8_2.x86_64.rpm
python3-perf-debuginfo-4.18.0-193.14.3.el8_2.x86_64.rpm

Red Hat CodeReady Linux Builder (v. 8):

aarch64:
bpftool-debuginfo-4.18.0-193.14.3.el8_2.aarch64.rpm
kernel-debug-debuginfo-4.18.0-193.14.3.el8_2.aarch64.rpm
kernel-debuginfo-4.18.0-193.14.3.el8_2.aarch64.rpm
kernel-debuginfo-common-aarch64-4.18.0-193.14.3.el8_2.aarch64.rpm
kernel-tools-debuginfo-4.18.0-193.14.3.el8_2.aarch64.rpm
kernel-tools-libs-devel-4.18.0-193.14.3.el8_2.aarch64.rpm
perf-debuginfo-4.18.0-193.14.3.el8_2.aarch64.rpm
python3-perf-debuginfo-4.18.0-193.14.3.el8_2.aarch64.rpm

ppc64le:
bpftool-debuginfo-4.18.0-193.14.3.el8_2.ppc64le.rpm
kernel-debug-debuginfo-4.18.0-193.14.3.el8_2.ppc64le.rpm
kernel-debuginfo-4.18.0-193.14.3.el8_2.ppc64le.rpm
kernel-debuginfo-common-ppc64le-4.18.0-193.14.3.el8_2.ppc64le.rpm
kernel-tools-debuginfo-4.18.0-193.14.3.el8_2.ppc64le.rpm
kernel-tools-libs-devel-4.18.0-193.14.3.el8_2.ppc64le.rpm
perf-debuginfo-4.18.0-193.14.3.el8_2.ppc64le.rpm
python3-perf-debuginfo-4.18.0-193.14.3.el8_2.ppc64le.rpm

x86_64:
bpftool-debuginfo-4.18.0-193.14.3.el8_2.x86_64.rpm
kernel-debug-debuginfo-4.18.0-193.14.3.el8_2.x86_64.rpm
kernel-debuginfo-4.18.0-193.14.3.el8_2.x86_64.rpm
kernel-debuginfo-common-x86_64-4.18.0-193.14.3.el8_2.x86_64.rpm
kernel-tools-debuginfo-4.18.0-193.14.3.el8_2.x86_64.rpm
kernel-tools-libs-devel-4.18.0-193.14.3.el8_2.x86_64.rpm
perf-debuginfo-4.18.0-193.14.3.el8_2.x86_64.rpm
python3-perf-debuginfo-4.18.0-193.14.3.el8_2.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-20908
https://access.redhat.com/security/cve/CVE-2020-15780
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/security/vulnerabilities/grub2bootloader

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=JNO5
—–END PGP SIGNATURE—–


RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Important: kernel security and bug fix update
Advisory ID: RHSA-2020:3220-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:3220
Issue date: 2020-07-29
CVE Names: CVE-2019-19527 CVE-2020-10757 CVE-2020-12653
CVE-2020-12654
=====================================================================

1. Summary:

An update for kernel is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Client (v. 7) – noarch, x86_64
Red Hat Enterprise Linux Client Optional (v. 7) – x86_64
Red Hat Enterprise Linux ComputeNode (v. 7) – noarch, x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) – x86_64
Red Hat Enterprise Linux Server (v. 7) – noarch, ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) – ppc64, ppc64le, x86_64
Red Hat Enterprise Linux Workstation (v. 7) – noarch, x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) – x86_64

3. Description:

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security Fix(es):

* kernel: kernel: DAX hugepages not considered during mremap
(CVE-2020-10757)

* kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in
drivers/net/wireless/marvell/mwifiex/scan.c (CVE-2020-12653)

* kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function
in drivers/net/wireless/marvell/mwifiex/wmm.c (CVE-2020-12654)

* kernel: use-after-free caused by a malicious USB device in the
drivers/hid/usbhid/hiddev.c driver (CVE-2019-19527)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Bug Fix(es):

* RHEL7.7 – scsi: ibmvfc: Avoid loss of all paths during SVC node reboot
(BZ#1830889)

* [DELL EMC 7.8 BUG bnxt_en] Error messages related to hwrm observed for
BCM 57504 under dmesg in RHEL 7.8 (BZ#1834190)

* kernel: provide infrastructure to support dual-signing of the kernel
(foundation to help address CVE-2020-10713) (BZ#1837429)

* RHEL7.7 – Request: retrofit kernel commit f82b4b6 to RHEL 7.7/7.8 3.10
kernels. (BZ#1838602)

* kipmi thread high CPU consumption when performing BMC firmware upgrade
(BZ#1841825)

* RHEL7.7 – virtio-blk: fix hw_queue stopped on arbitrary error (kvm)
(BZ#1842994)

* rhel 7 infinite blocked waiting on inode_dio_wait in nfs (BZ#1845520)

* http request is taking more time for endpoint running on different host
via nodeport service (BZ#1847333)

* ext4: change LRU to round-robin in extent status tree shrinker
(BZ#1847343)

* libaio is returning duplicate events (BZ#1850055)

* After upgrade to 3.9.89 pod containers with CPU limits fail to start due
to cgroup error (BZ#1850500)

* Fix dpdk regression introduced by bz1837297 (BZ#1852245)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1783498 – CVE-2019-19527 kernel: use-after-free caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver
1831868 – CVE-2020-12653 kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c
1832530 – CVE-2020-12654 kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c
1842525 – CVE-2020-10757 kernel: kernel: DAX hugepages not considered during mremap

6. Package List:

Red Hat Enterprise Linux Client (v. 7):

Source:
kernel-3.10.0-1127.18.2.el7.src.rpm

noarch:
kernel-abi-whitelists-3.10.0-1127.18.2.el7.noarch.rpm
kernel-doc-3.10.0-1127.18.2.el7.noarch.rpm

x86_64:
bpftool-3.10.0-1127.18.2.el7.x86_64.rpm
bpftool-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-debug-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-debug-devel-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-devel-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-headers-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-tools-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-tools-libs-3.10.0-1127.18.2.el7.x86_64.rpm
perf-3.10.0-1127.18.2.el7.x86_64.rpm
perf-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm
python-perf-3.10.0-1127.18.2.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm

Red Hat Enterprise Linux Client Optional (v. 7):

x86_64:
bpftool-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-1127.18.2.el7.x86_64.rpm
perf-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm

Red Hat Enterprise Linux ComputeNode (v. 7):

Source:
kernel-3.10.0-1127.18.2.el7.src.rpm

noarch:
kernel-abi-whitelists-3.10.0-1127.18.2.el7.noarch.rpm
kernel-doc-3.10.0-1127.18.2.el7.noarch.rpm

x86_64:
bpftool-3.10.0-1127.18.2.el7.x86_64.rpm
bpftool-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-debug-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-debug-devel-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-devel-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-headers-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-tools-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-tools-libs-3.10.0-1127.18.2.el7.x86_64.rpm
perf-3.10.0-1127.18.2.el7.x86_64.rpm
perf-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm
python-perf-3.10.0-1127.18.2.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm

Red Hat Enterprise Linux ComputeNode Optional (v. 7):

x86_64:
bpftool-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-1127.18.2.el7.x86_64.rpm
perf-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source:
kernel-3.10.0-1127.18.2.el7.src.rpm

noarch:
kernel-abi-whitelists-3.10.0-1127.18.2.el7.noarch.rpm
kernel-doc-3.10.0-1127.18.2.el7.noarch.rpm

ppc64:
bpftool-3.10.0-1127.18.2.el7.ppc64.rpm
bpftool-debuginfo-3.10.0-1127.18.2.el7.ppc64.rpm
kernel-3.10.0-1127.18.2.el7.ppc64.rpm
kernel-bootwrapper-3.10.0-1127.18.2.el7.ppc64.rpm
kernel-debug-3.10.0-1127.18.2.el7.ppc64.rpm
kernel-debug-debuginfo-3.10.0-1127.18.2.el7.ppc64.rpm
kernel-debug-devel-3.10.0-1127.18.2.el7.ppc64.rpm
kernel-debuginfo-3.10.0-1127.18.2.el7.ppc64.rpm
kernel-debuginfo-common-ppc64-3.10.0-1127.18.2.el7.ppc64.rpm
kernel-devel-3.10.0-1127.18.2.el7.ppc64.rpm
kernel-headers-3.10.0-1127.18.2.el7.ppc64.rpm
kernel-tools-3.10.0-1127.18.2.el7.ppc64.rpm
kernel-tools-debuginfo-3.10.0-1127.18.2.el7.ppc64.rpm
kernel-tools-libs-3.10.0-1127.18.2.el7.ppc64.rpm
perf-3.10.0-1127.18.2.el7.ppc64.rpm
perf-debuginfo-3.10.0-1127.18.2.el7.ppc64.rpm
python-perf-3.10.0-1127.18.2.el7.ppc64.rpm
python-perf-debuginfo-3.10.0-1127.18.2.el7.ppc64.rpm

ppc64le:
bpftool-3.10.0-1127.18.2.el7.ppc64le.rpm
bpftool-debuginfo-3.10.0-1127.18.2.el7.ppc64le.rpm
kernel-3.10.0-1127.18.2.el7.ppc64le.rpm
kernel-bootwrapper-3.10.0-1127.18.2.el7.ppc64le.rpm
kernel-debug-3.10.0-1127.18.2.el7.ppc64le.rpm
kernel-debug-debuginfo-3.10.0-1127.18.2.el7.ppc64le.rpm
kernel-debuginfo-3.10.0-1127.18.2.el7.ppc64le.rpm
kernel-debuginfo-common-ppc64le-3.10.0-1127.18.2.el7.ppc64le.rpm
kernel-devel-3.10.0-1127.18.2.el7.ppc64le.rpm
kernel-headers-3.10.0-1127.18.2.el7.ppc64le.rpm
kernel-tools-3.10.0-1127.18.2.el7.ppc64le.rpm
kernel-tools-debuginfo-3.10.0-1127.18.2.el7.ppc64le.rpm
kernel-tools-libs-3.10.0-1127.18.2.el7.ppc64le.rpm
perf-3.10.0-1127.18.2.el7.ppc64le.rpm
perf-debuginfo-3.10.0-1127.18.2.el7.ppc64le.rpm
python-perf-3.10.0-1127.18.2.el7.ppc64le.rpm
python-perf-debuginfo-3.10.0-1127.18.2.el7.ppc64le.rpm

s390x:
bpftool-3.10.0-1127.18.2.el7.s390x.rpm
bpftool-debuginfo-3.10.0-1127.18.2.el7.s390x.rpm
kernel-3.10.0-1127.18.2.el7.s390x.rpm
kernel-debug-3.10.0-1127.18.2.el7.s390x.rpm
kernel-debug-debuginfo-3.10.0-1127.18.2.el7.s390x.rpm
kernel-debug-devel-3.10.0-1127.18.2.el7.s390x.rpm
kernel-debuginfo-3.10.0-1127.18.2.el7.s390x.rpm
kernel-debuginfo-common-s390x-3.10.0-1127.18.2.el7.s390x.rpm
kernel-devel-3.10.0-1127.18.2.el7.s390x.rpm
kernel-headers-3.10.0-1127.18.2.el7.s390x.rpm
kernel-kdump-3.10.0-1127.18.2.el7.s390x.rpm
kernel-kdump-debuginfo-3.10.0-1127.18.2.el7.s390x.rpm
kernel-kdump-devel-3.10.0-1127.18.2.el7.s390x.rpm
perf-3.10.0-1127.18.2.el7.s390x.rpm
perf-debuginfo-3.10.0-1127.18.2.el7.s390x.rpm
python-perf-3.10.0-1127.18.2.el7.s390x.rpm
python-perf-debuginfo-3.10.0-1127.18.2.el7.s390x.rpm

x86_64:
bpftool-3.10.0-1127.18.2.el7.x86_64.rpm
bpftool-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-debug-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-debug-devel-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-devel-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-headers-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-tools-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-tools-libs-3.10.0-1127.18.2.el7.x86_64.rpm
perf-3.10.0-1127.18.2.el7.x86_64.rpm
perf-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm
python-perf-3.10.0-1127.18.2.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

ppc64:
bpftool-debuginfo-3.10.0-1127.18.2.el7.ppc64.rpm
kernel-debug-debuginfo-3.10.0-1127.18.2.el7.ppc64.rpm
kernel-debuginfo-3.10.0-1127.18.2.el7.ppc64.rpm
kernel-debuginfo-common-ppc64-3.10.0-1127.18.2.el7.ppc64.rpm
kernel-tools-debuginfo-3.10.0-1127.18.2.el7.ppc64.rpm
kernel-tools-libs-devel-3.10.0-1127.18.2.el7.ppc64.rpm
perf-debuginfo-3.10.0-1127.18.2.el7.ppc64.rpm
python-perf-debuginfo-3.10.0-1127.18.2.el7.ppc64.rpm

ppc64le:
bpftool-debuginfo-3.10.0-1127.18.2.el7.ppc64le.rpm
kernel-debug-debuginfo-3.10.0-1127.18.2.el7.ppc64le.rpm
kernel-debug-devel-3.10.0-1127.18.2.el7.ppc64le.rpm
kernel-debuginfo-3.10.0-1127.18.2.el7.ppc64le.rpm
kernel-debuginfo-common-ppc64le-3.10.0-1127.18.2.el7.ppc64le.rpm
kernel-tools-debuginfo-3.10.0-1127.18.2.el7.ppc64le.rpm
kernel-tools-libs-devel-3.10.0-1127.18.2.el7.ppc64le.rpm
perf-debuginfo-3.10.0-1127.18.2.el7.ppc64le.rpm
python-perf-debuginfo-3.10.0-1127.18.2.el7.ppc64le.rpm

x86_64:
bpftool-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-1127.18.2.el7.x86_64.rpm
perf-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source:
kernel-3.10.0-1127.18.2.el7.src.rpm

noarch:
kernel-abi-whitelists-3.10.0-1127.18.2.el7.noarch.rpm
kernel-doc-3.10.0-1127.18.2.el7.noarch.rpm

x86_64:
bpftool-3.10.0-1127.18.2.el7.x86_64.rpm
bpftool-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-debug-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-debug-devel-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-devel-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-headers-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-tools-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-tools-libs-3.10.0-1127.18.2.el7.x86_64.rpm
perf-3.10.0-1127.18.2.el7.x86_64.rpm
perf-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm
python-perf-3.10.0-1127.18.2.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 7):

x86_64:
bpftool-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-1127.18.2.el7.x86_64.rpm
perf-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-1127.18.2.el7.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-19527
https://access.redhat.com/security/cve/CVE-2020-10757
https://access.redhat.com/security/cve/CVE-2020-12653
https://access.redhat.com/security/cve/CVE-2020-12654
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/security/vulnerabilities/grub2bootloader

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=Uxvu
—–END PGP SIGNATURE—–


RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

AutorFilip Omazic
Cert idNCERT-REF-2020-07-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa Mozilla Firefox

Otkriveni su sigurnosni nedostaci u programskom paketu Mozilla Firefox za operacijski sustav Gentoo. Otkriveni nedostaci potencijalnim napadačima omogućuju otkrivanje osjetljivih...

Close