—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Important: kernel-rt security update
Advisory ID: RHSA-2020:4280-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:4280
Issue date: 2020-10-19
CVE Names: CVE-2020-12351 CVE-2020-12352
=====================================================================
1. Summary:
An update for kernel-rt is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux for Real Time (v. 7) – noarch, x86_64
Red Hat Enterprise Linux for Real Time for NFV (v. 7) – noarch, x86_64
3. Description:
The kernel-rt packages provide the Real Time Linux Kernel, which enables
fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: net: bluetooth: type confusion while processing AMP packets
(CVE-2020-12351)
* kernel: net: bluetooth: information leak when processing certain AMP
packets (CVE-2020-12352)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
5. Bugs fixed (https://bugzilla.redhat.com/):
1886521 – CVE-2020-12351 kernel: net: bluetooth: type confusion while processing AMP packets
1886529 – CVE-2020-12352 kernel: net: bluetooth: information leak when processing certain AMP packets
6. Package List:
Red Hat Enterprise Linux for Real Time for NFV (v. 7):
Source:
kernel-rt-3.10.0-1160.2.2.rt56.1134.el7.src.rpm
noarch:
kernel-rt-doc-3.10.0-1160.2.2.rt56.1134.el7.noarch.rpm
x86_64:
kernel-rt-3.10.0-1160.2.2.rt56.1134.el7.x86_64.rpm
kernel-rt-debug-3.10.0-1160.2.2.rt56.1134.el7.x86_64.rpm
kernel-rt-debug-debuginfo-3.10.0-1160.2.2.rt56.1134.el7.x86_64.rpm
kernel-rt-debug-devel-3.10.0-1160.2.2.rt56.1134.el7.x86_64.rpm
kernel-rt-debug-kvm-3.10.0-1160.2.2.rt56.1134.el7.x86_64.rpm
kernel-rt-debug-kvm-debuginfo-3.10.0-1160.2.2.rt56.1134.el7.x86_64.rpm
kernel-rt-debuginfo-3.10.0-1160.2.2.rt56.1134.el7.x86_64.rpm
kernel-rt-debuginfo-common-x86_64-3.10.0-1160.2.2.rt56.1134.el7.x86_64.rpm
kernel-rt-devel-3.10.0-1160.2.2.rt56.1134.el7.x86_64.rpm
kernel-rt-kvm-3.10.0-1160.2.2.rt56.1134.el7.x86_64.rpm
kernel-rt-kvm-debuginfo-3.10.0-1160.2.2.rt56.1134.el7.x86_64.rpm
kernel-rt-trace-3.10.0-1160.2.2.rt56.1134.el7.x86_64.rpm
kernel-rt-trace-debuginfo-3.10.0-1160.2.2.rt56.1134.el7.x86_64.rpm
kernel-rt-trace-devel-3.10.0-1160.2.2.rt56.1134.el7.x86_64.rpm
kernel-rt-trace-kvm-3.10.0-1160.2.2.rt56.1134.el7.x86_64.rpm
kernel-rt-trace-kvm-debuginfo-3.10.0-1160.2.2.rt56.1134.el7.x86_64.rpm
Red Hat Enterprise Linux for Real Time (v. 7):
Source:
kernel-rt-3.10.0-1160.2.2.rt56.1134.el7.src.rpm
noarch:
kernel-rt-doc-3.10.0-1160.2.2.rt56.1134.el7.noarch.rpm
x86_64:
kernel-rt-3.10.0-1160.2.2.rt56.1134.el7.x86_64.rpm
kernel-rt-debug-3.10.0-1160.2.2.rt56.1134.el7.x86_64.rpm
kernel-rt-debug-debuginfo-3.10.0-1160.2.2.rt56.1134.el7.x86_64.rpm
kernel-rt-debug-devel-3.10.0-1160.2.2.rt56.1134.el7.x86_64.rpm
kernel-rt-debuginfo-3.10.0-1160.2.2.rt56.1134.el7.x86_64.rpm
kernel-rt-debuginfo-common-x86_64-3.10.0-1160.2.2.rt56.1134.el7.x86_64.rpm
kernel-rt-devel-3.10.0-1160.2.2.rt56.1134.el7.x86_64.rpm
kernel-rt-trace-3.10.0-1160.2.2.rt56.1134.el7.x86_64.rpm
kernel-rt-trace-debuginfo-3.10.0-1160.2.2.rt56.1134.el7.x86_64.rpm
kernel-rt-trace-devel-3.10.0-1160.2.2.rt56.1134.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2020-12351
https://access.redhat.com/security/cve/CVE-2020-12352
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/security/vulnerabilities/BleedingTooth
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2020 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=WmCD
—–END PGP SIGNATURE—–
—
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Important: kernel security update
Advisory ID: RHSA-2020:4278-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:4278
Issue date: 2020-10-19
CVE Names: CVE-2020-12351 CVE-2020-12352
=====================================================================
1. Summary:
An update for kernel is now available for Red Hat Enterprise Linux 7.4
Advanced Update Support, Red Hat Enterprise Linux 7.4 Telco Extended Update
Support, and Red Hat Enterprise Linux 7.4 Update Services for SAP
Solutions.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Server AUS (v. 7.4) – noarch, x86_64
Red Hat Enterprise Linux Server E4S (v. 7.4) – noarch, ppc64le, x86_64
Red Hat Enterprise Linux Server Optional AUS (v. 7.4) – x86_64
Red Hat Enterprise Linux Server Optional E4S (v. 7.4) – ppc64le, x86_64
Red Hat Enterprise Linux Server Optional TUS (v. 7.4) – x86_64
Red Hat Enterprise Linux Server TUS (v. 7.4) – noarch, x86_64
3. Description:
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
Security Fix(es):
* kernel: net: bluetooth: type confusion while processing AMP packets
(CVE-2020-12351)
* kernel: net: bluetooth: information leak when processing certain AMP
packets (CVE-2020-12352)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
5. Bugs fixed (https://bugzilla.redhat.com/):
1886521 – CVE-2020-12351 kernel: net: bluetooth: type confusion while processing AMP packets
1886529 – CVE-2020-12352 kernel: net: bluetooth: information leak when processing certain AMP packets
6. Package List:
Red Hat Enterprise Linux Server AUS (v. 7.4):
Source:
kernel-3.10.0-693.77.1.el7.src.rpm
noarch:
kernel-abi-whitelists-3.10.0-693.77.1.el7.noarch.rpm
kernel-doc-3.10.0-693.77.1.el7.noarch.rpm
x86_64:
kernel-3.10.0-693.77.1.el7.x86_64.rpm
kernel-debug-3.10.0-693.77.1.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-693.77.1.el7.x86_64.rpm
kernel-debug-devel-3.10.0-693.77.1.el7.x86_64.rpm
kernel-debuginfo-3.10.0-693.77.1.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-693.77.1.el7.x86_64.rpm
kernel-devel-3.10.0-693.77.1.el7.x86_64.rpm
kernel-headers-3.10.0-693.77.1.el7.x86_64.rpm
kernel-tools-3.10.0-693.77.1.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-693.77.1.el7.x86_64.rpm
kernel-tools-libs-3.10.0-693.77.1.el7.x86_64.rpm
perf-3.10.0-693.77.1.el7.x86_64.rpm
perf-debuginfo-3.10.0-693.77.1.el7.x86_64.rpm
python-perf-3.10.0-693.77.1.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-693.77.1.el7.x86_64.rpm
Red Hat Enterprise Linux Server E4S (v. 7.4):
Source:
kernel-3.10.0-693.77.1.el7.src.rpm
noarch:
kernel-abi-whitelists-3.10.0-693.77.1.el7.noarch.rpm
kernel-doc-3.10.0-693.77.1.el7.noarch.rpm
ppc64le:
kernel-3.10.0-693.77.1.el7.ppc64le.rpm
kernel-bootwrapper-3.10.0-693.77.1.el7.ppc64le.rpm
kernel-debug-3.10.0-693.77.1.el7.ppc64le.rpm
kernel-debug-debuginfo-3.10.0-693.77.1.el7.ppc64le.rpm
kernel-debuginfo-3.10.0-693.77.1.el7.ppc64le.rpm
kernel-debuginfo-common-ppc64le-3.10.0-693.77.1.el7.ppc64le.rpm
kernel-devel-3.10.0-693.77.1.el7.ppc64le.rpm
kernel-headers-3.10.0-693.77.1.el7.ppc64le.rpm
kernel-tools-3.10.0-693.77.1.el7.ppc64le.rpm
kernel-tools-debuginfo-3.10.0-693.77.1.el7.ppc64le.rpm
kernel-tools-libs-3.10.0-693.77.1.el7.ppc64le.rpm
perf-3.10.0-693.77.1.el7.ppc64le.rpm
perf-debuginfo-3.10.0-693.77.1.el7.ppc64le.rpm
python-perf-3.10.0-693.77.1.el7.ppc64le.rpm
python-perf-debuginfo-3.10.0-693.77.1.el7.ppc64le.rpm
x86_64:
kernel-3.10.0-693.77.1.el7.x86_64.rpm
kernel-debug-3.10.0-693.77.1.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-693.77.1.el7.x86_64.rpm
kernel-debug-devel-3.10.0-693.77.1.el7.x86_64.rpm
kernel-debuginfo-3.10.0-693.77.1.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-693.77.1.el7.x86_64.rpm
kernel-devel-3.10.0-693.77.1.el7.x86_64.rpm
kernel-headers-3.10.0-693.77.1.el7.x86_64.rpm
kernel-tools-3.10.0-693.77.1.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-693.77.1.el7.x86_64.rpm
kernel-tools-libs-3.10.0-693.77.1.el7.x86_64.rpm
perf-3.10.0-693.77.1.el7.x86_64.rpm
perf-debuginfo-3.10.0-693.77.1.el7.x86_64.rpm
python-perf-3.10.0-693.77.1.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-693.77.1.el7.x86_64.rpm
Red Hat Enterprise Linux Server TUS (v. 7.4):
Source:
kernel-3.10.0-693.77.1.el7.src.rpm
noarch:
kernel-abi-whitelists-3.10.0-693.77.1.el7.noarch.rpm
kernel-doc-3.10.0-693.77.1.el7.noarch.rpm
x86_64:
kernel-3.10.0-693.77.1.el7.x86_64.rpm
kernel-debug-3.10.0-693.77.1.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-693.77.1.el7.x86_64.rpm
kernel-debug-devel-3.10.0-693.77.1.el7.x86_64.rpm
kernel-debuginfo-3.10.0-693.77.1.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-693.77.1.el7.x86_64.rpm
kernel-devel-3.10.0-693.77.1.el7.x86_64.rpm
kernel-headers-3.10.0-693.77.1.el7.x86_64.rpm
kernel-tools-3.10.0-693.77.1.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-693.77.1.el7.x86_64.rpm
kernel-tools-libs-3.10.0-693.77.1.el7.x86_64.rpm
perf-3.10.0-693.77.1.el7.x86_64.rpm
perf-debuginfo-3.10.0-693.77.1.el7.x86_64.rpm
python-perf-3.10.0-693.77.1.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-693.77.1.el7.x86_64.rpm
Red Hat Enterprise Linux Server Optional AUS (v. 7.4):
x86_64:
kernel-debug-debuginfo-3.10.0-693.77.1.el7.x86_64.rpm
kernel-debuginfo-3.10.0-693.77.1.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-693.77.1.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-693.77.1.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-693.77.1.el7.x86_64.rpm
perf-debuginfo-3.10.0-693.77.1.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-693.77.1.el7.x86_64.rpm
Red Hat Enterprise Linux Server Optional E4S (v. 7.4):
ppc64le:
kernel-debug-debuginfo-3.10.0-693.77.1.el7.ppc64le.rpm
kernel-debug-devel-3.10.0-693.77.1.el7.ppc64le.rpm
kernel-debuginfo-3.10.0-693.77.1.el7.ppc64le.rpm
kernel-debuginfo-common-ppc64le-3.10.0-693.77.1.el7.ppc64le.rpm
kernel-tools-debuginfo-3.10.0-693.77.1.el7.ppc64le.rpm
kernel-tools-libs-devel-3.10.0-693.77.1.el7.ppc64le.rpm
perf-debuginfo-3.10.0-693.77.1.el7.ppc64le.rpm
python-perf-debuginfo-3.10.0-693.77.1.el7.ppc64le.rpm
x86_64:
kernel-debug-debuginfo-3.10.0-693.77.1.el7.x86_64.rpm
kernel-debuginfo-3.10.0-693.77.1.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-693.77.1.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-693.77.1.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-693.77.1.el7.x86_64.rpm
perf-debuginfo-3.10.0-693.77.1.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-693.77.1.el7.x86_64.rpm
Red Hat Enterprise Linux Server Optional TUS (v. 7.4):
x86_64:
kernel-debug-debuginfo-3.10.0-693.77.1.el7.x86_64.rpm
kernel-debuginfo-3.10.0-693.77.1.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-693.77.1.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-693.77.1.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-693.77.1.el7.x86_64.rpm
perf-debuginfo-3.10.0-693.77.1.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-693.77.1.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2020-12351
https://access.redhat.com/security/cve/CVE-2020-12352
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/security/vulnerabilities/BleedingTooth
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2020 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=AStB
—–END PGP SIGNATURE—–
—
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Important: kernel-alt security update
Advisory ID: RHSA-2020:4279-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:4279
Issue date: 2020-10-19
CVE Names: CVE-2020-12351 CVE-2020-12352 CVE-2020-16166
CVE-2020-25212
=====================================================================
1. Summary:
An update for kernel-alt is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) – aarch64, noarch, ppc64le, s390x
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7) – aarch64, noarch, ppc64le
3. Description:
The kernel-alt packages provide the Linux kernel version 4.x.
Security Fix(es):
* kernel: net: bluetooth: type confusion while processing AMP packets
(CVE-2020-12351)
* kernel: net: bluetooth: information leak when processing certain AMP
packets (CVE-2020-12352)
* kernel: information exposure in drivers/char/random.c and
kernel/time/timer.c (CVE-2020-16166)
* kernel: TOCTOU mismatch in the NFS client code (CVE-2020-25212)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
5. Bugs fixed (https://bugzilla.redhat.com/):
1865751 – CVE-2020-16166 kernel: information exposure in drivers/char/random.c and kernel/time/timer.c
1877575 – CVE-2020-25212 kernel: TOCTOU mismatch in the NFS client code
1886521 – CVE-2020-12351 kernel: net: bluetooth: type confusion while processing AMP packets
1886529 – CVE-2020-12352 kernel: net: bluetooth: information leak when processing certain AMP packets
6. Package List:
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7):
Source:
kernel-alt-4.14.0-115.32.1.el7a.src.rpm
aarch64:
kernel-4.14.0-115.32.1.el7a.aarch64.rpm
kernel-debug-4.14.0-115.32.1.el7a.aarch64.rpm
kernel-debug-debuginfo-4.14.0-115.32.1.el7a.aarch64.rpm
kernel-debug-devel-4.14.0-115.32.1.el7a.aarch64.rpm
kernel-debuginfo-4.14.0-115.32.1.el7a.aarch64.rpm
kernel-debuginfo-common-aarch64-4.14.0-115.32.1.el7a.aarch64.rpm
kernel-devel-4.14.0-115.32.1.el7a.aarch64.rpm
kernel-headers-4.14.0-115.32.1.el7a.aarch64.rpm
kernel-tools-4.14.0-115.32.1.el7a.aarch64.rpm
kernel-tools-debuginfo-4.14.0-115.32.1.el7a.aarch64.rpm
kernel-tools-libs-4.14.0-115.32.1.el7a.aarch64.rpm
perf-4.14.0-115.32.1.el7a.aarch64.rpm
perf-debuginfo-4.14.0-115.32.1.el7a.aarch64.rpm
python-perf-4.14.0-115.32.1.el7a.aarch64.rpm
python-perf-debuginfo-4.14.0-115.32.1.el7a.aarch64.rpm
noarch:
kernel-abi-whitelists-4.14.0-115.32.1.el7a.noarch.rpm
kernel-doc-4.14.0-115.32.1.el7a.noarch.rpm
ppc64le:
kernel-4.14.0-115.32.1.el7a.ppc64le.rpm
kernel-bootwrapper-4.14.0-115.32.1.el7a.ppc64le.rpm
kernel-debug-4.14.0-115.32.1.el7a.ppc64le.rpm
kernel-debug-debuginfo-4.14.0-115.32.1.el7a.ppc64le.rpm
kernel-debuginfo-4.14.0-115.32.1.el7a.ppc64le.rpm
kernel-debuginfo-common-ppc64le-4.14.0-115.32.1.el7a.ppc64le.rpm
kernel-devel-4.14.0-115.32.1.el7a.ppc64le.rpm
kernel-headers-4.14.0-115.32.1.el7a.ppc64le.rpm
kernel-tools-4.14.0-115.32.1.el7a.ppc64le.rpm
kernel-tools-debuginfo-4.14.0-115.32.1.el7a.ppc64le.rpm
kernel-tools-libs-4.14.0-115.32.1.el7a.ppc64le.rpm
perf-4.14.0-115.32.1.el7a.ppc64le.rpm
perf-debuginfo-4.14.0-115.32.1.el7a.ppc64le.rpm
python-perf-4.14.0-115.32.1.el7a.ppc64le.rpm
python-perf-debuginfo-4.14.0-115.32.1.el7a.ppc64le.rpm
s390x:
kernel-4.14.0-115.32.1.el7a.s390x.rpm
kernel-debug-4.14.0-115.32.1.el7a.s390x.rpm
kernel-debug-debuginfo-4.14.0-115.32.1.el7a.s390x.rpm
kernel-debug-devel-4.14.0-115.32.1.el7a.s390x.rpm
kernel-debuginfo-4.14.0-115.32.1.el7a.s390x.rpm
kernel-debuginfo-common-s390x-4.14.0-115.32.1.el7a.s390x.rpm
kernel-devel-4.14.0-115.32.1.el7a.s390x.rpm
kernel-headers-4.14.0-115.32.1.el7a.s390x.rpm
kernel-kdump-4.14.0-115.32.1.el7a.s390x.rpm
kernel-kdump-debuginfo-4.14.0-115.32.1.el7a.s390x.rpm
kernel-kdump-devel-4.14.0-115.32.1.el7a.s390x.rpm
perf-4.14.0-115.32.1.el7a.s390x.rpm
perf-debuginfo-4.14.0-115.32.1.el7a.s390x.rpm
python-perf-4.14.0-115.32.1.el7a.s390x.rpm
python-perf-debuginfo-4.14.0-115.32.1.el7a.s390x.rpm
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7):
aarch64:
kernel-debug-debuginfo-4.14.0-115.32.1.el7a.aarch64.rpm
kernel-debuginfo-4.14.0-115.32.1.el7a.aarch64.rpm
kernel-debuginfo-common-aarch64-4.14.0-115.32.1.el7a.aarch64.rpm
kernel-tools-debuginfo-4.14.0-115.32.1.el7a.aarch64.rpm
kernel-tools-libs-devel-4.14.0-115.32.1.el7a.aarch64.rpm
perf-debuginfo-4.14.0-115.32.1.el7a.aarch64.rpm
python-perf-debuginfo-4.14.0-115.32.1.el7a.aarch64.rpm
noarch:
kernel-doc-4.14.0-115.32.1.el7a.noarch.rpm
ppc64le:
kernel-debug-debuginfo-4.14.0-115.32.1.el7a.ppc64le.rpm
kernel-debug-devel-4.14.0-115.32.1.el7a.ppc64le.rpm
kernel-debuginfo-4.14.0-115.32.1.el7a.ppc64le.rpm
kernel-debuginfo-common-ppc64le-4.14.0-115.32.1.el7a.ppc64le.rpm
kernel-tools-debuginfo-4.14.0-115.32.1.el7a.ppc64le.rpm
kernel-tools-libs-devel-4.14.0-115.32.1.el7a.ppc64le.rpm
perf-debuginfo-4.14.0-115.32.1.el7a.ppc64le.rpm
python-perf-debuginfo-4.14.0-115.32.1.el7a.ppc64le.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2020-12351
https://access.redhat.com/security/cve/CVE-2020-12352
https://access.redhat.com/security/cve/CVE-2020-16166
https://access.redhat.com/security/cve/CVE-2020-25212
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/security/vulnerabilities/BleedingTooth
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2020 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
iQIVAwUBX43GAdzjgjWX9erEAQhsQw//cASAZ+XRnRllBo3xhzYcvE9asAULka/h
RIfja4hlOkLKq98p/fSDSRTRUbeceu3TFvU4ubgEZswsbOzLJckWB5md7a370kiA
LNuL4BMFJcmqaEzP5BVjtKCptkaTznxs1mATQWEda1QC+MQeYCT2dm/aHn12rtVH
3aS/NIGLQgxPB2vGge0X9H06qTbkngn5Ki0UANFnCsd8ETE82KeDcLMdjxhA0wQj
AdbxjrF/IX784ouqoK7yJ5gdS0sppz9LD7dfLlnt7QTLVvpqO9JSyCaBJ9FIwXqu
rUXR+TONzTQZC/kS/xsjyCnkZz2H2/Cswf1QVqEAZOicR0Ws1+vTtx0cMCmSFyIU
5ii7ukFzyTlhVkuoUxJIopBZCsr64apqKdVT3izoySmfkHSqE0BKo9z9DFNPPTIi
S6SKAVtX0ilmorNbuLB12vxORUIugdvyxzagG56aaggBcB/BZVGFrmHbVNkX8tz6
2rDE93g5sUEYYIxMfJTBG6nIXpa+KtUfgruVOC0ye7vljdXx3ZvDtcgeJC/JjIk2
e6MqvArFCFPeqvAB1AR2pzHGA2whLlAmpL6qgMlZw5klil4EVlPHrSeXNsN1ZZuZ
ZKOGHnzpipevW2RUMYqGRgkAk/PJutuzkw+o0tw/TCpH1GLPPovboXNIW7UrHg8z
Aogr+Rv3CfY=
=zUPJ
—–END PGP SIGNATURE—–
—
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Important: kernel security update
Advisory ID: RHSA-2020:4281-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:4281
Issue date: 2020-10-19
CVE Names: CVE-2020-12351 CVE-2020-12352
=====================================================================
1. Summary:
An update for kernel is now available for Red Hat Enterprise Linux 7.6
Extended Update Support.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux ComputeNode EUS (v. 7.6) – noarch, x86_64
Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6) – x86_64
Red Hat Enterprise Linux Server EUS (v. 7.6) – noarch, ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional EUS (v. 7.6) – ppc64, ppc64le, x86_64
3. Description:
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
Security Fix(es):
* kernel: net: bluetooth: type confusion while processing AMP packets
(CVE-2020-12351)
* kernel: net: bluetooth: information leak when processing certain AMP
packets (CVE-2020-12352)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
5. Bugs fixed (https://bugzilla.redhat.com/):
1886521 – CVE-2020-12351 kernel: net: bluetooth: type confusion while processing AMP packets
1886529 – CVE-2020-12352 kernel: net: bluetooth: information leak when processing certain AMP packets
6. Package List:
Red Hat Enterprise Linux ComputeNode EUS (v. 7.6):
Source:
kernel-3.10.0-957.61.2.el7.src.rpm
noarch:
kernel-abi-whitelists-3.10.0-957.61.2.el7.noarch.rpm
kernel-doc-3.10.0-957.61.2.el7.noarch.rpm
x86_64:
bpftool-3.10.0-957.61.2.el7.x86_64.rpm
kernel-3.10.0-957.61.2.el7.x86_64.rpm
kernel-debug-3.10.0-957.61.2.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-957.61.2.el7.x86_64.rpm
kernel-debug-devel-3.10.0-957.61.2.el7.x86_64.rpm
kernel-debuginfo-3.10.0-957.61.2.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-957.61.2.el7.x86_64.rpm
kernel-devel-3.10.0-957.61.2.el7.x86_64.rpm
kernel-headers-3.10.0-957.61.2.el7.x86_64.rpm
kernel-tools-3.10.0-957.61.2.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-957.61.2.el7.x86_64.rpm
kernel-tools-libs-3.10.0-957.61.2.el7.x86_64.rpm
perf-3.10.0-957.61.2.el7.x86_64.rpm
perf-debuginfo-3.10.0-957.61.2.el7.x86_64.rpm
python-perf-3.10.0-957.61.2.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-957.61.2.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6):
x86_64:
kernel-debug-debuginfo-3.10.0-957.61.2.el7.x86_64.rpm
kernel-debuginfo-3.10.0-957.61.2.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-957.61.2.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-957.61.2.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-957.61.2.el7.x86_64.rpm
perf-debuginfo-3.10.0-957.61.2.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-957.61.2.el7.x86_64.rpm
Red Hat Enterprise Linux Server EUS (v. 7.6):
Source:
kernel-3.10.0-957.61.2.el7.src.rpm
noarch:
kernel-abi-whitelists-3.10.0-957.61.2.el7.noarch.rpm
kernel-doc-3.10.0-957.61.2.el7.noarch.rpm
ppc64:
kernel-3.10.0-957.61.2.el7.ppc64.rpm
kernel-bootwrapper-3.10.0-957.61.2.el7.ppc64.rpm
kernel-debug-3.10.0-957.61.2.el7.ppc64.rpm
kernel-debug-debuginfo-3.10.0-957.61.2.el7.ppc64.rpm
kernel-debug-devel-3.10.0-957.61.2.el7.ppc64.rpm
kernel-debuginfo-3.10.0-957.61.2.el7.ppc64.rpm
kernel-debuginfo-common-ppc64-3.10.0-957.61.2.el7.ppc64.rpm
kernel-devel-3.10.0-957.61.2.el7.ppc64.rpm
kernel-headers-3.10.0-957.61.2.el7.ppc64.rpm
kernel-tools-3.10.0-957.61.2.el7.ppc64.rpm
kernel-tools-debuginfo-3.10.0-957.61.2.el7.ppc64.rpm
kernel-tools-libs-3.10.0-957.61.2.el7.ppc64.rpm
perf-3.10.0-957.61.2.el7.ppc64.rpm
perf-debuginfo-3.10.0-957.61.2.el7.ppc64.rpm
python-perf-3.10.0-957.61.2.el7.ppc64.rpm
python-perf-debuginfo-3.10.0-957.61.2.el7.ppc64.rpm
ppc64le:
kernel-3.10.0-957.61.2.el7.ppc64le.rpm
kernel-bootwrapper-3.10.0-957.61.2.el7.ppc64le.rpm
kernel-debug-3.10.0-957.61.2.el7.ppc64le.rpm
kernel-debug-debuginfo-3.10.0-957.61.2.el7.ppc64le.rpm
kernel-debuginfo-3.10.0-957.61.2.el7.ppc64le.rpm
kernel-debuginfo-common-ppc64le-3.10.0-957.61.2.el7.ppc64le.rpm
kernel-devel-3.10.0-957.61.2.el7.ppc64le.rpm
kernel-headers-3.10.0-957.61.2.el7.ppc64le.rpm
kernel-tools-3.10.0-957.61.2.el7.ppc64le.rpm
kernel-tools-debuginfo-3.10.0-957.61.2.el7.ppc64le.rpm
kernel-tools-libs-3.10.0-957.61.2.el7.ppc64le.rpm
perf-3.10.0-957.61.2.el7.ppc64le.rpm
perf-debuginfo-3.10.0-957.61.2.el7.ppc64le.rpm
python-perf-3.10.0-957.61.2.el7.ppc64le.rpm
python-perf-debuginfo-3.10.0-957.61.2.el7.ppc64le.rpm
s390x:
kernel-3.10.0-957.61.2.el7.s390x.rpm
kernel-debug-3.10.0-957.61.2.el7.s390x.rpm
kernel-debug-debuginfo-3.10.0-957.61.2.el7.s390x.rpm
kernel-debug-devel-3.10.0-957.61.2.el7.s390x.rpm
kernel-debuginfo-3.10.0-957.61.2.el7.s390x.rpm
kernel-debuginfo-common-s390x-3.10.0-957.61.2.el7.s390x.rpm
kernel-devel-3.10.0-957.61.2.el7.s390x.rpm
kernel-headers-3.10.0-957.61.2.el7.s390x.rpm
kernel-kdump-3.10.0-957.61.2.el7.s390x.rpm
kernel-kdump-debuginfo-3.10.0-957.61.2.el7.s390x.rpm
kernel-kdump-devel-3.10.0-957.61.2.el7.s390x.rpm
perf-3.10.0-957.61.2.el7.s390x.rpm
perf-debuginfo-3.10.0-957.61.2.el7.s390x.rpm
python-perf-3.10.0-957.61.2.el7.s390x.rpm
python-perf-debuginfo-3.10.0-957.61.2.el7.s390x.rpm
x86_64:
bpftool-3.10.0-957.61.2.el7.x86_64.rpm
kernel-3.10.0-957.61.2.el7.x86_64.rpm
kernel-debug-3.10.0-957.61.2.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-957.61.2.el7.x86_64.rpm
kernel-debug-devel-3.10.0-957.61.2.el7.x86_64.rpm
kernel-debuginfo-3.10.0-957.61.2.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-957.61.2.el7.x86_64.rpm
kernel-devel-3.10.0-957.61.2.el7.x86_64.rpm
kernel-headers-3.10.0-957.61.2.el7.x86_64.rpm
kernel-tools-3.10.0-957.61.2.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-957.61.2.el7.x86_64.rpm
kernel-tools-libs-3.10.0-957.61.2.el7.x86_64.rpm
perf-3.10.0-957.61.2.el7.x86_64.rpm
perf-debuginfo-3.10.0-957.61.2.el7.x86_64.rpm
python-perf-3.10.0-957.61.2.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-957.61.2.el7.x86_64.rpm
Red Hat Enterprise Linux Server Optional EUS (v. 7.6):
ppc64:
kernel-debug-debuginfo-3.10.0-957.61.2.el7.ppc64.rpm
kernel-debuginfo-3.10.0-957.61.2.el7.ppc64.rpm
kernel-debuginfo-common-ppc64-3.10.0-957.61.2.el7.ppc64.rpm
kernel-tools-debuginfo-3.10.0-957.61.2.el7.ppc64.rpm
kernel-tools-libs-devel-3.10.0-957.61.2.el7.ppc64.rpm
perf-debuginfo-3.10.0-957.61.2.el7.ppc64.rpm
python-perf-debuginfo-3.10.0-957.61.2.el7.ppc64.rpm
ppc64le:
kernel-debug-debuginfo-3.10.0-957.61.2.el7.ppc64le.rpm
kernel-debug-devel-3.10.0-957.61.2.el7.ppc64le.rpm
kernel-debuginfo-3.10.0-957.61.2.el7.ppc64le.rpm
kernel-debuginfo-common-ppc64le-3.10.0-957.61.2.el7.ppc64le.rpm
kernel-tools-debuginfo-3.10.0-957.61.2.el7.ppc64le.rpm
kernel-tools-libs-devel-3.10.0-957.61.2.el7.ppc64le.rpm
perf-debuginfo-3.10.0-957.61.2.el7.ppc64le.rpm
python-perf-debuginfo-3.10.0-957.61.2.el7.ppc64le.rpm
x86_64:
kernel-debug-debuginfo-3.10.0-957.61.2.el7.x86_64.rpm
kernel-debuginfo-3.10.0-957.61.2.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-957.61.2.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-957.61.2.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-957.61.2.el7.x86_64.rpm
perf-debuginfo-3.10.0-957.61.2.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-957.61.2.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2020-12351
https://access.redhat.com/security/cve/CVE-2020-12352
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/security/vulnerabilities/BleedingTooth
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2020 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=4UiQ
—–END PGP SIGNATURE—–
—
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Important: kernel security update
Advisory ID: RHSA-2020:4277-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:4277
Issue date: 2020-10-19
CVE Names: CVE-2020-12351 CVE-2020-12352
=====================================================================
1. Summary:
An update for kernel is now available for Red Hat Enterprise Linux 7.7
Extended Update Support.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux ComputeNode EUS (v. 7.7) – noarch, x86_64
Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7) – x86_64
Red Hat Enterprise Linux Server EUS (v. 7.7) – noarch, ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional EUS (v. 7.7) – ppc64, ppc64le, x86_64
3. Description:
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
Security Fix(es):
* kernel: net: bluetooth: type confusion while processing AMP packets
(CVE-2020-12351)
* kernel: net: bluetooth: information leak when processing certain AMP
packets (CVE-2020-12352)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
5. Bugs fixed (https://bugzilla.redhat.com/):
1886521 – CVE-2020-12351 kernel: net: bluetooth: type confusion while processing AMP packets
1886529 – CVE-2020-12352 kernel: net: bluetooth: information leak when processing certain AMP packets
6. Package List:
Red Hat Enterprise Linux ComputeNode EUS (v. 7.7):
Source:
kernel-3.10.0-1062.37.1.el7.src.rpm
noarch:
kernel-abi-whitelists-3.10.0-1062.37.1.el7.noarch.rpm
kernel-doc-3.10.0-1062.37.1.el7.noarch.rpm
x86_64:
bpftool-3.10.0-1062.37.1.el7.x86_64.rpm
bpftool-debuginfo-3.10.0-1062.37.1.el7.x86_64.rpm
kernel-3.10.0-1062.37.1.el7.x86_64.rpm
kernel-debug-3.10.0-1062.37.1.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-1062.37.1.el7.x86_64.rpm
kernel-debug-devel-3.10.0-1062.37.1.el7.x86_64.rpm
kernel-debuginfo-3.10.0-1062.37.1.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-1062.37.1.el7.x86_64.rpm
kernel-devel-3.10.0-1062.37.1.el7.x86_64.rpm
kernel-headers-3.10.0-1062.37.1.el7.x86_64.rpm
kernel-tools-3.10.0-1062.37.1.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-1062.37.1.el7.x86_64.rpm
kernel-tools-libs-3.10.0-1062.37.1.el7.x86_64.rpm
perf-3.10.0-1062.37.1.el7.x86_64.rpm
perf-debuginfo-3.10.0-1062.37.1.el7.x86_64.rpm
python-perf-3.10.0-1062.37.1.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-1062.37.1.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7):
x86_64:
bpftool-debuginfo-3.10.0-1062.37.1.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-1062.37.1.el7.x86_64.rpm
kernel-debuginfo-3.10.0-1062.37.1.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-1062.37.1.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-1062.37.1.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-1062.37.1.el7.x86_64.rpm
perf-debuginfo-3.10.0-1062.37.1.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-1062.37.1.el7.x86_64.rpm
Red Hat Enterprise Linux Server EUS (v. 7.7):
Source:
kernel-3.10.0-1062.37.1.el7.src.rpm
noarch:
kernel-abi-whitelists-3.10.0-1062.37.1.el7.noarch.rpm
kernel-doc-3.10.0-1062.37.1.el7.noarch.rpm
ppc64:
bpftool-3.10.0-1062.37.1.el7.ppc64.rpm
bpftool-debuginfo-3.10.0-1062.37.1.el7.ppc64.rpm
kernel-3.10.0-1062.37.1.el7.ppc64.rpm
kernel-bootwrapper-3.10.0-1062.37.1.el7.ppc64.rpm
kernel-debug-3.10.0-1062.37.1.el7.ppc64.rpm
kernel-debug-debuginfo-3.10.0-1062.37.1.el7.ppc64.rpm
kernel-debug-devel-3.10.0-1062.37.1.el7.ppc64.rpm
kernel-debuginfo-3.10.0-1062.37.1.el7.ppc64.rpm
kernel-debuginfo-common-ppc64-3.10.0-1062.37.1.el7.ppc64.rpm
kernel-devel-3.10.0-1062.37.1.el7.ppc64.rpm
kernel-headers-3.10.0-1062.37.1.el7.ppc64.rpm
kernel-tools-3.10.0-1062.37.1.el7.ppc64.rpm
kernel-tools-debuginfo-3.10.0-1062.37.1.el7.ppc64.rpm
kernel-tools-libs-3.10.0-1062.37.1.el7.ppc64.rpm
perf-3.10.0-1062.37.1.el7.ppc64.rpm
perf-debuginfo-3.10.0-1062.37.1.el7.ppc64.rpm
python-perf-3.10.0-1062.37.1.el7.ppc64.rpm
python-perf-debuginfo-3.10.0-1062.37.1.el7.ppc64.rpm
ppc64le:
bpftool-3.10.0-1062.37.1.el7.ppc64le.rpm
bpftool-debuginfo-3.10.0-1062.37.1.el7.ppc64le.rpm
kernel-3.10.0-1062.37.1.el7.ppc64le.rpm
kernel-bootwrapper-3.10.0-1062.37.1.el7.ppc64le.rpm
kernel-debug-3.10.0-1062.37.1.el7.ppc64le.rpm
kernel-debug-debuginfo-3.10.0-1062.37.1.el7.ppc64le.rpm
kernel-debuginfo-3.10.0-1062.37.1.el7.ppc64le.rpm
kernel-debuginfo-common-ppc64le-3.10.0-1062.37.1.el7.ppc64le.rpm
kernel-devel-3.10.0-1062.37.1.el7.ppc64le.rpm
kernel-headers-3.10.0-1062.37.1.el7.ppc64le.rpm
kernel-tools-3.10.0-1062.37.1.el7.ppc64le.rpm
kernel-tools-debuginfo-3.10.0-1062.37.1.el7.ppc64le.rpm
kernel-tools-libs-3.10.0-1062.37.1.el7.ppc64le.rpm
perf-3.10.0-1062.37.1.el7.ppc64le.rpm
perf-debuginfo-3.10.0-1062.37.1.el7.ppc64le.rpm
python-perf-3.10.0-1062.37.1.el7.ppc64le.rpm
python-perf-debuginfo-3.10.0-1062.37.1.el7.ppc64le.rpm
s390x:
bpftool-3.10.0-1062.37.1.el7.s390x.rpm
bpftool-debuginfo-3.10.0-1062.37.1.el7.s390x.rpm
kernel-3.10.0-1062.37.1.el7.s390x.rpm
kernel-debug-3.10.0-1062.37.1.el7.s390x.rpm
kernel-debug-debuginfo-3.10.0-1062.37.1.el7.s390x.rpm
kernel-debug-devel-3.10.0-1062.37.1.el7.s390x.rpm
kernel-debuginfo-3.10.0-1062.37.1.el7.s390x.rpm
kernel-debuginfo-common-s390x-3.10.0-1062.37.1.el7.s390x.rpm
kernel-devel-3.10.0-1062.37.1.el7.s390x.rpm
kernel-headers-3.10.0-1062.37.1.el7.s390x.rpm
kernel-kdump-3.10.0-1062.37.1.el7.s390x.rpm
kernel-kdump-debuginfo-3.10.0-1062.37.1.el7.s390x.rpm
kernel-kdump-devel-3.10.0-1062.37.1.el7.s390x.rpm
perf-3.10.0-1062.37.1.el7.s390x.rpm
perf-debuginfo-3.10.0-1062.37.1.el7.s390x.rpm
python-perf-3.10.0-1062.37.1.el7.s390x.rpm
python-perf-debuginfo-3.10.0-1062.37.1.el7.s390x.rpm
x86_64:
bpftool-3.10.0-1062.37.1.el7.x86_64.rpm
bpftool-debuginfo-3.10.0-1062.37.1.el7.x86_64.rpm
kernel-3.10.0-1062.37.1.el7.x86_64.rpm
kernel-debug-3.10.0-1062.37.1.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-1062.37.1.el7.x86_64.rpm
kernel-debug-devel-3.10.0-1062.37.1.el7.x86_64.rpm
kernel-debuginfo-3.10.0-1062.37.1.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-1062.37.1.el7.x86_64.rpm
kernel-devel-3.10.0-1062.37.1.el7.x86_64.rpm
kernel-headers-3.10.0-1062.37.1.el7.x86_64.rpm
kernel-tools-3.10.0-1062.37.1.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-1062.37.1.el7.x86_64.rpm
kernel-tools-libs-3.10.0-1062.37.1.el7.x86_64.rpm
perf-3.10.0-1062.37.1.el7.x86_64.rpm
perf-debuginfo-3.10.0-1062.37.1.el7.x86_64.rpm
python-perf-3.10.0-1062.37.1.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-1062.37.1.el7.x86_64.rpm
Red Hat Enterprise Linux Server Optional EUS (v. 7.7):
ppc64:
bpftool-debuginfo-3.10.0-1062.37.1.el7.ppc64.rpm
kernel-debug-debuginfo-3.10.0-1062.37.1.el7.ppc64.rpm
kernel-debuginfo-3.10.0-1062.37.1.el7.ppc64.rpm
kernel-debuginfo-common-ppc64-3.10.0-1062.37.1.el7.ppc64.rpm
kernel-tools-debuginfo-3.10.0-1062.37.1.el7.ppc64.rpm
kernel-tools-libs-devel-3.10.0-1062.37.1.el7.ppc64.rpm
perf-debuginfo-3.10.0-1062.37.1.el7.ppc64.rpm
python-perf-debuginfo-3.10.0-1062.37.1.el7.ppc64.rpm
ppc64le:
bpftool-debuginfo-3.10.0-1062.37.1.el7.ppc64le.rpm
kernel-debug-debuginfo-3.10.0-1062.37.1.el7.ppc64le.rpm
kernel-debug-devel-3.10.0-1062.37.1.el7.ppc64le.rpm
kernel-debuginfo-3.10.0-1062.37.1.el7.ppc64le.rpm
kernel-debuginfo-common-ppc64le-3.10.0-1062.37.1.el7.ppc64le.rpm
kernel-tools-debuginfo-3.10.0-1062.37.1.el7.ppc64le.rpm
kernel-tools-libs-devel-3.10.0-1062.37.1.el7.ppc64le.rpm
perf-debuginfo-3.10.0-1062.37.1.el7.ppc64le.rpm
python-perf-debuginfo-3.10.0-1062.37.1.el7.ppc64le.rpm
x86_64:
bpftool-debuginfo-3.10.0-1062.37.1.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-1062.37.1.el7.x86_64.rpm
kernel-debuginfo-3.10.0-1062.37.1.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-1062.37.1.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-1062.37.1.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-1062.37.1.el7.x86_64.rpm
perf-debuginfo-3.10.0-1062.37.1.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-1062.37.1.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2020-12351
https://access.redhat.com/security/cve/CVE-2020-12352
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/security/vulnerabilities/BleedingTooth
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2020 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=6r6c
—–END PGP SIGNATURE—–
—
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Important: kernel-rt security and bug fix update
Advisory ID: RHSA-2020:4289-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:4289
Issue date: 2020-10-20
CVE Names: CVE-2020-12351 CVE-2020-12352 CVE-2020-14331
CVE-2020-14385 CVE-2020-14386
=====================================================================
1. Summary:
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Real Time (v. 8) – x86_64
Red Hat Enterprise Linux Real Time for NFV (v. 8) – x86_64
3. Description:
The kernel-rt packages provide the Real Time Linux Kernel, which enables
fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: net: bluetooth: type confusion while processing AMP packets
(CVE-2020-12351)
* kernel: net: bluetooth: information leak when processing certain AMP
packets (CVE-2020-12352)
* kernel: metadata validator in XFS may cause an inode with a valid,
user-creatable extended attribute to be flagged as corrupt (CVE-2020-14385)
* kernel: memory corruption in net/packet/af_packet.c leads to elevation of
privilege (CVE-2020-14386)
* kernel: kernel: buffer over write in vgacon_scroll (CVE-2020-14331)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Bug Fix(es):
* kernel-rt: update RT source tree to the RHEL-8.2.z Batch#4 source tree
(BZ#1877921)
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
5. Bugs fixed (https://bugzilla.redhat.com/):
1858679 – CVE-2020-14331 kernel: kernel: buffer over write in vgacon_scroll
1874800 – CVE-2020-14385 kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt
1875699 – CVE-2020-14386 kernel: memory corruption in net/packet/af_packet.c leads to elevation of privilege
1886521 – CVE-2020-12351 kernel: net: bluetooth: type confusion while processing AMP packets
1886529 – CVE-2020-12352 kernel: net: bluetooth: information leak when processing certain AMP packets
6. Package List:
Red Hat Enterprise Linux Real Time for NFV (v. 8):
Source:
kernel-rt-4.18.0-193.28.1.rt13.77.el8_2.src.rpm
x86_64:
kernel-rt-4.18.0-193.28.1.rt13.77.el8_2.x86_64.rpm
kernel-rt-core-4.18.0-193.28.1.rt13.77.el8_2.x86_64.rpm
kernel-rt-debug-4.18.0-193.28.1.rt13.77.el8_2.x86_64.rpm
kernel-rt-debug-core-4.18.0-193.28.1.rt13.77.el8_2.x86_64.rpm
kernel-rt-debug-debuginfo-4.18.0-193.28.1.rt13.77.el8_2.x86_64.rpm
kernel-rt-debug-devel-4.18.0-193.28.1.rt13.77.el8_2.x86_64.rpm
kernel-rt-debug-kvm-4.18.0-193.28.1.rt13.77.el8_2.x86_64.rpm
kernel-rt-debug-modules-4.18.0-193.28.1.rt13.77.el8_2.x86_64.rpm
kernel-rt-debug-modules-extra-4.18.0-193.28.1.rt13.77.el8_2.x86_64.rpm
kernel-rt-debuginfo-4.18.0-193.28.1.rt13.77.el8_2.x86_64.rpm
kernel-rt-debuginfo-common-x86_64-4.18.0-193.28.1.rt13.77.el8_2.x86_64.rpm
kernel-rt-devel-4.18.0-193.28.1.rt13.77.el8_2.x86_64.rpm
kernel-rt-kvm-4.18.0-193.28.1.rt13.77.el8_2.x86_64.rpm
kernel-rt-modules-4.18.0-193.28.1.rt13.77.el8_2.x86_64.rpm
kernel-rt-modules-extra-4.18.0-193.28.1.rt13.77.el8_2.x86_64.rpm
Red Hat Enterprise Linux Real Time (v. 8):
Source:
kernel-rt-4.18.0-193.28.1.rt13.77.el8_2.src.rpm
x86_64:
kernel-rt-4.18.0-193.28.1.rt13.77.el8_2.x86_64.rpm
kernel-rt-core-4.18.0-193.28.1.rt13.77.el8_2.x86_64.rpm
kernel-rt-debug-4.18.0-193.28.1.rt13.77.el8_2.x86_64.rpm
kernel-rt-debug-core-4.18.0-193.28.1.rt13.77.el8_2.x86_64.rpm
kernel-rt-debug-debuginfo-4.18.0-193.28.1.rt13.77.el8_2.x86_64.rpm
kernel-rt-debug-devel-4.18.0-193.28.1.rt13.77.el8_2.x86_64.rpm
kernel-rt-debug-modules-4.18.0-193.28.1.rt13.77.el8_2.x86_64.rpm
kernel-rt-debug-modules-extra-4.18.0-193.28.1.rt13.77.el8_2.x86_64.rpm
kernel-rt-debuginfo-4.18.0-193.28.1.rt13.77.el8_2.x86_64.rpm
kernel-rt-debuginfo-common-x86_64-4.18.0-193.28.1.rt13.77.el8_2.x86_64.rpm
kernel-rt-devel-4.18.0-193.28.1.rt13.77.el8_2.x86_64.rpm
kernel-rt-modules-4.18.0-193.28.1.rt13.77.el8_2.x86_64.rpm
kernel-rt-modules-extra-4.18.0-193.28.1.rt13.77.el8_2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2020-12351
https://access.redhat.com/security/cve/CVE-2020-12352
https://access.redhat.com/security/cve/CVE-2020-14331
https://access.redhat.com/security/cve/CVE-2020-14385
https://access.redhat.com/security/cve/CVE-2020-14386
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/security/vulnerabilities/BleedingTooth
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2020 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=o5gQ
—–END PGP SIGNATURE—–
—
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Important: kernel security and bug fix update
Advisory ID: RHSA-2020:4286-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:4286
Issue date: 2020-10-20
CVE Names: CVE-2020-12351 CVE-2020-12352 CVE-2020-14331
CVE-2020-14385 CVE-2020-14386
=====================================================================
1. Summary:
An update for kernel is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat CodeReady Linux Builder (v. 8) – aarch64, ppc64le, x86_64
Red Hat Enterprise Linux BaseOS (v. 8) – aarch64, noarch, ppc64le, s390x, x86_64
3. Description:
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
Security Fix(es):
* kernel: net: bluetooth: type confusion while processing AMP packets
(CVE-2020-12351)
* kernel: net: bluetooth: information leak when processing certain AMP
packets (CVE-2020-12352)
* kernel: metadata validator in XFS may cause an inode with a valid,
user-creatable extended attribute to be flagged as corrupt (CVE-2020-14385)
* kernel: memory corruption in net/packet/af_packet.c leads to elevation of
privilege (CVE-2020-14386)
* kernel: kernel: buffer over write in vgacon_scroll (CVE-2020-14331)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Bug Fix(es):
* [mlx5] stale ethtool steering rules remain after moving back to legacy
mode (BZ#1857777)
* 50% cpu in masked_flow_update with pop to pod TCP_RR (BZ#1859216)
* take into account GSO and fragmented packets in execute_check_pkt_len
action (BZ#1860169)
* RHEL8.1 – scsi: ibmvfc: Avoid loss of all paths during SVC node reboot
(BZ#1866371)
* RHEL8.3 Pre-Beta – smc: SMC connections hang with later-level
implementations (BZ#1866390)
* Incorrect pinning of IRQ threads on isolated CPUs by drivers that use
cpumask_local_spread() (BZ#1867174)
* [RHEL8] Fixes for DEADLINE scheduler class (BZ#1867612)
* RHEL8.1 – s390/pci: Fix unexpected write combine on resource (BZ#1869276)
* dm multipath: fix spurious failures during IO completion [EIOP-8345]
(BZ#1869386)
* IO on virtio-scsi hangs when running cpu hotplug test (BZ#1869779)
* store_rps_map doesn’t accept an empty bitmask, which is required for
disabling RPS on a queue (BZ#1870181)
* Memory registration cache data corruption possible, fix requires
backporting (BZ#1872424)
* fix another case of wait list corruption for PSM/sdma (BZ#1872766)
* [RHEL-8] Segmentation fault (core dumped) when fi_bw -e msg -v -T 1 -p
“verbs” (BZ#1872771)
* fix mounting and inode number handling on s390x (BZ#1875787)
* failure to enter nohz_full mode for non SCHED_FIFO tasks (BZ#1877417)
* Secure boot key is not loaded with kernel-4.18.0-232.el8.x86_64 /
shim-x64-15-15 (BZ#1877528)
* [RHEL-8.3] Kdump failed to start when secure boot enabled:
kexec_file_load failed: Required key not available (BZ#1877530)
* [RHEL-8.3] Kdump/kexec kernel panicked on EFI boot: general protection
fault: 0000 [#1] SMP PTI (BZ#1879988)
* Sleeping or scheduling after sched_cpu_dying() led to “scheduling while
atomic” and BUG at kernel/cpu.c:907! (BZ#1880081)
* [conntrack] udp packet reverse NAT occasionally fail when race condition
request combination with the DNAT load balancing rules (BZ#1882095)
* [Regression] RHEL8.3 Beta – Do not initiate shutdown for
EPOW_SHUTDOWN_ON_UPS event (BZ#1882243)
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
5. Bugs fixed (https://bugzilla.redhat.com/):
1858679 – CVE-2020-14331 kernel: kernel: buffer over write in vgacon_scroll
1874800 – CVE-2020-14385 kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt
1875699 – CVE-2020-14386 kernel: memory corruption in net/packet/af_packet.c leads to elevation of privilege
1886521 – CVE-2020-12351 kernel: net: bluetooth: type confusion while processing AMP packets
1886529 – CVE-2020-12352 kernel: net: bluetooth: information leak when processing certain AMP packets
6. Package List:
Red Hat Enterprise Linux BaseOS (v. 8):
Source:
kernel-4.18.0-193.28.1.el8_2.src.rpm
aarch64:
bpftool-4.18.0-193.28.1.el8_2.aarch64.rpm
bpftool-debuginfo-4.18.0-193.28.1.el8_2.aarch64.rpm
kernel-4.18.0-193.28.1.el8_2.aarch64.rpm
kernel-core-4.18.0-193.28.1.el8_2.aarch64.rpm
kernel-cross-headers-4.18.0-193.28.1.el8_2.aarch64.rpm
kernel-debug-4.18.0-193.28.1.el8_2.aarch64.rpm
kernel-debug-core-4.18.0-193.28.1.el8_2.aarch64.rpm
kernel-debug-debuginfo-4.18.0-193.28.1.el8_2.aarch64.rpm
kernel-debug-devel-4.18.0-193.28.1.el8_2.aarch64.rpm
kernel-debug-modules-4.18.0-193.28.1.el8_2.aarch64.rpm
kernel-debug-modules-extra-4.18.0-193.28.1.el8_2.aarch64.rpm
kernel-debuginfo-4.18.0-193.28.1.el8_2.aarch64.rpm
kernel-debuginfo-common-aarch64-4.18.0-193.28.1.el8_2.aarch64.rpm
kernel-devel-4.18.0-193.28.1.el8_2.aarch64.rpm
kernel-headers-4.18.0-193.28.1.el8_2.aarch64.rpm
kernel-modules-4.18.0-193.28.1.el8_2.aarch64.rpm
kernel-modules-extra-4.18.0-193.28.1.el8_2.aarch64.rpm
kernel-tools-4.18.0-193.28.1.el8_2.aarch64.rpm
kernel-tools-debuginfo-4.18.0-193.28.1.el8_2.aarch64.rpm
kernel-tools-libs-4.18.0-193.28.1.el8_2.aarch64.rpm
perf-4.18.0-193.28.1.el8_2.aarch64.rpm
perf-debuginfo-4.18.0-193.28.1.el8_2.aarch64.rpm
python3-perf-4.18.0-193.28.1.el8_2.aarch64.rpm
python3-perf-debuginfo-4.18.0-193.28.1.el8_2.aarch64.rpm
noarch:
kernel-abi-whitelists-4.18.0-193.28.1.el8_2.noarch.rpm
kernel-doc-4.18.0-193.28.1.el8_2.noarch.rpm
ppc64le:
bpftool-4.18.0-193.28.1.el8_2.ppc64le.rpm
bpftool-debuginfo-4.18.0-193.28.1.el8_2.ppc64le.rpm
kernel-4.18.0-193.28.1.el8_2.ppc64le.rpm
kernel-core-4.18.0-193.28.1.el8_2.ppc64le.rpm
kernel-cross-headers-4.18.0-193.28.1.el8_2.ppc64le.rpm
kernel-debug-4.18.0-193.28.1.el8_2.ppc64le.rpm
kernel-debug-core-4.18.0-193.28.1.el8_2.ppc64le.rpm
kernel-debug-debuginfo-4.18.0-193.28.1.el8_2.ppc64le.rpm
kernel-debug-devel-4.18.0-193.28.1.el8_2.ppc64le.rpm
kernel-debug-modules-4.18.0-193.28.1.el8_2.ppc64le.rpm
kernel-debug-modules-extra-4.18.0-193.28.1.el8_2.ppc64le.rpm
kernel-debuginfo-4.18.0-193.28.1.el8_2.ppc64le.rpm
kernel-debuginfo-common-ppc64le-4.18.0-193.28.1.el8_2.ppc64le.rpm
kernel-devel-4.18.0-193.28.1.el8_2.ppc64le.rpm
kernel-headers-4.18.0-193.28.1.el8_2.ppc64le.rpm
kernel-modules-4.18.0-193.28.1.el8_2.ppc64le.rpm
kernel-modules-extra-4.18.0-193.28.1.el8_2.ppc64le.rpm
kernel-tools-4.18.0-193.28.1.el8_2.ppc64le.rpm
kernel-tools-debuginfo-4.18.0-193.28.1.el8_2.ppc64le.rpm
kernel-tools-libs-4.18.0-193.28.1.el8_2.ppc64le.rpm
perf-4.18.0-193.28.1.el8_2.ppc64le.rpm
perf-debuginfo-4.18.0-193.28.1.el8_2.ppc64le.rpm
python3-perf-4.18.0-193.28.1.el8_2.ppc64le.rpm
python3-perf-debuginfo-4.18.0-193.28.1.el8_2.ppc64le.rpm
s390x:
bpftool-4.18.0-193.28.1.el8_2.s390x.rpm
bpftool-debuginfo-4.18.0-193.28.1.el8_2.s390x.rpm
kernel-4.18.0-193.28.1.el8_2.s390x.rpm
kernel-core-4.18.0-193.28.1.el8_2.s390x.rpm
kernel-cross-headers-4.18.0-193.28.1.el8_2.s390x.rpm
kernel-debug-4.18.0-193.28.1.el8_2.s390x.rpm
kernel-debug-core-4.18.0-193.28.1.el8_2.s390x.rpm
kernel-debug-debuginfo-4.18.0-193.28.1.el8_2.s390x.rpm
kernel-debug-devel-4.18.0-193.28.1.el8_2.s390x.rpm
kernel-debug-modules-4.18.0-193.28.1.el8_2.s390x.rpm
kernel-debug-modules-extra-4.18.0-193.28.1.el8_2.s390x.rpm
kernel-debuginfo-4.18.0-193.28.1.el8_2.s390x.rpm
kernel-debuginfo-common-s390x-4.18.0-193.28.1.el8_2.s390x.rpm
kernel-devel-4.18.0-193.28.1.el8_2.s390x.rpm
kernel-headers-4.18.0-193.28.1.el8_2.s390x.rpm
kernel-modules-4.18.0-193.28.1.el8_2.s390x.rpm
kernel-modules-extra-4.18.0-193.28.1.el8_2.s390x.rpm
kernel-tools-4.18.0-193.28.1.el8_2.s390x.rpm
kernel-tools-debuginfo-4.18.0-193.28.1.el8_2.s390x.rpm
kernel-zfcpdump-4.18.0-193.28.1.el8_2.s390x.rpm
kernel-zfcpdump-core-4.18.0-193.28.1.el8_2.s390x.rpm
kernel-zfcpdump-debuginfo-4.18.0-193.28.1.el8_2.s390x.rpm
kernel-zfcpdump-devel-4.18.0-193.28.1.el8_2.s390x.rpm
kernel-zfcpdump-modules-4.18.0-193.28.1.el8_2.s390x.rpm
kernel-zfcpdump-modules-extra-4.18.0-193.28.1.el8_2.s390x.rpm
perf-4.18.0-193.28.1.el8_2.s390x.rpm
perf-debuginfo-4.18.0-193.28.1.el8_2.s390x.rpm
python3-perf-4.18.0-193.28.1.el8_2.s390x.rpm
python3-perf-debuginfo-4.18.0-193.28.1.el8_2.s390x.rpm
x86_64:
bpftool-4.18.0-193.28.1.el8_2.x86_64.rpm
bpftool-debuginfo-4.18.0-193.28.1.el8_2.x86_64.rpm
kernel-4.18.0-193.28.1.el8_2.x86_64.rpm
kernel-core-4.18.0-193.28.1.el8_2.x86_64.rpm
kernel-cross-headers-4.18.0-193.28.1.el8_2.x86_64.rpm
kernel-debug-4.18.0-193.28.1.el8_2.x86_64.rpm
kernel-debug-core-4.18.0-193.28.1.el8_2.x86_64.rpm
kernel-debug-debuginfo-4.18.0-193.28.1.el8_2.x86_64.rpm
kernel-debug-devel-4.18.0-193.28.1.el8_2.x86_64.rpm
kernel-debug-modules-4.18.0-193.28.1.el8_2.x86_64.rpm
kernel-debug-modules-extra-4.18.0-193.28.1.el8_2.x86_64.rpm
kernel-debuginfo-4.18.0-193.28.1.el8_2.x86_64.rpm
kernel-debuginfo-common-x86_64-4.18.0-193.28.1.el8_2.x86_64.rpm
kernel-devel-4.18.0-193.28.1.el8_2.x86_64.rpm
kernel-headers-4.18.0-193.28.1.el8_2.x86_64.rpm
kernel-modules-4.18.0-193.28.1.el8_2.x86_64.rpm
kernel-modules-extra-4.18.0-193.28.1.el8_2.x86_64.rpm
kernel-tools-4.18.0-193.28.1.el8_2.x86_64.rpm
kernel-tools-debuginfo-4.18.0-193.28.1.el8_2.x86_64.rpm
kernel-tools-libs-4.18.0-193.28.1.el8_2.x86_64.rpm
perf-4.18.0-193.28.1.el8_2.x86_64.rpm
perf-debuginfo-4.18.0-193.28.1.el8_2.x86_64.rpm
python3-perf-4.18.0-193.28.1.el8_2.x86_64.rpm
python3-perf-debuginfo-4.18.0-193.28.1.el8_2.x86_64.rpm
Red Hat CodeReady Linux Builder (v. 8):
aarch64:
bpftool-debuginfo-4.18.0-193.28.1.el8_2.aarch64.rpm
kernel-debug-debuginfo-4.18.0-193.28.1.el8_2.aarch64.rpm
kernel-debuginfo-4.18.0-193.28.1.el8_2.aarch64.rpm
kernel-debuginfo-common-aarch64-4.18.0-193.28.1.el8_2.aarch64.rpm
kernel-tools-debuginfo-4.18.0-193.28.1.el8_2.aarch64.rpm
kernel-tools-libs-devel-4.18.0-193.28.1.el8_2.aarch64.rpm
perf-debuginfo-4.18.0-193.28.1.el8_2.aarch64.rpm
python3-perf-debuginfo-4.18.0-193.28.1.el8_2.aarch64.rpm
ppc64le:
bpftool-debuginfo-4.18.0-193.28.1.el8_2.ppc64le.rpm
kernel-debug-debuginfo-4.18.0-193.28.1.el8_2.ppc64le.rpm
kernel-debuginfo-4.18.0-193.28.1.el8_2.ppc64le.rpm
kernel-debuginfo-common-ppc64le-4.18.0-193.28.1.el8_2.ppc64le.rpm
kernel-tools-debuginfo-4.18.0-193.28.1.el8_2.ppc64le.rpm
kernel-tools-libs-devel-4.18.0-193.28.1.el8_2.ppc64le.rpm
perf-debuginfo-4.18.0-193.28.1.el8_2.ppc64le.rpm
python3-perf-debuginfo-4.18.0-193.28.1.el8_2.ppc64le.rpm
x86_64:
bpftool-debuginfo-4.18.0-193.28.1.el8_2.x86_64.rpm
kernel-debug-debuginfo-4.18.0-193.28.1.el8_2.x86_64.rpm
kernel-debuginfo-4.18.0-193.28.1.el8_2.x86_64.rpm
kernel-debuginfo-common-x86_64-4.18.0-193.28.1.el8_2.x86_64.rpm
kernel-tools-debuginfo-4.18.0-193.28.1.el8_2.x86_64.rpm
kernel-tools-libs-devel-4.18.0-193.28.1.el8_2.x86_64.rpm
perf-debuginfo-4.18.0-193.28.1.el8_2.x86_64.rpm
python3-perf-debuginfo-4.18.0-193.28.1.el8_2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2020-12351
https://access.redhat.com/security/cve/CVE-2020-12352
https://access.redhat.com/security/cve/CVE-2020-14331
https://access.redhat.com/security/cve/CVE-2020-14385
https://access.redhat.com/security/cve/CVE-2020-14386
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/security/vulnerabilities/BleedingTooth
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2020 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=A4Za
—–END PGP SIGNATURE—–
—
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Important: kernel security and bug fix update
Advisory ID: RHSA-2020:4287-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:4287
Issue date: 2020-10-20
CVE Names: CVE-2020-12351 CVE-2020-12352 CVE-2020-14385
CVE-2020-14386
=====================================================================
1. Summary:
An update for kernel is now available for Red Hat Enterprise Linux 8.1
Extended Update Support.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat CodeReady Linux Builder EUS (v. 8.1) – aarch64, ppc64le, x86_64
Red Hat Enterprise Linux BaseOS EUS (v. 8.1) – aarch64, noarch, ppc64le, s390x, x86_64
3. Description:
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
Security Fix(es):
* kernel: net: bluetooth: type confusion while processing AMP packets
(CVE-2020-12351)
* kernel: net: bluetooth: information leak when processing certain AMP
packets (CVE-2020-12352)
* kernel: metadata validator in XFS may cause an inode with a valid,
user-creatable extended attribute to be flagged as corrupt (CVE-2020-14385)
* kernel: memory corruption in net/packet/af_packet.c leads to elevation of
privilege (CVE-2020-14386)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Bug Fix(es):
* NFS client autodisconnect timer may fire immediately after TCP connection
setup and may cause DoS type reconnect problem in complex network
environments (BZ#1873571)
* hang on full fs from trace_cmd (BZ#1875789)
* Secure boot key is not loaded with kernel-4.18.0-232.el8.x86_64 /
shim-x64-15-15 (BZ#1877527)
* [RHEL-8.3] Kdump failed to start when secure boot enabled:
kexec_file_load failed: Required key not available (BZ#1877529)
* [RHEL-8.3] Kdump/kexec kernel panicked on EFI boot: general protection
fault: 0000 [#1] SMP PTI (BZ#1879987)
* [conntrack] udp packet reverse NAT occasionally fail when race condition
request combination with the DNAT load balancing rules (BZ#1882096)
* [Regression] RHEL8.3 Beta – Do not initiate shutdown for
EPOW_SHUTDOWN_ON_UPS event (BZ#1882244)
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
5. Bugs fixed (https://bugzilla.redhat.com/):
1874800 – CVE-2020-14385 kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt
1875699 – CVE-2020-14386 kernel: memory corruption in net/packet/af_packet.c leads to elevation of privilege
1886521 – CVE-2020-12351 kernel: net: bluetooth: type confusion while processing AMP packets
1886529 – CVE-2020-12352 kernel: net: bluetooth: information leak when processing certain AMP packets
6. Package List:
Red Hat Enterprise Linux BaseOS EUS (v. 8.1):
Source:
kernel-4.18.0-147.32.1.el8_1.src.rpm
aarch64:
bpftool-4.18.0-147.32.1.el8_1.aarch64.rpm
bpftool-debuginfo-4.18.0-147.32.1.el8_1.aarch64.rpm
kernel-4.18.0-147.32.1.el8_1.aarch64.rpm
kernel-core-4.18.0-147.32.1.el8_1.aarch64.rpm
kernel-cross-headers-4.18.0-147.32.1.el8_1.aarch64.rpm
kernel-debug-4.18.0-147.32.1.el8_1.aarch64.rpm
kernel-debug-core-4.18.0-147.32.1.el8_1.aarch64.rpm
kernel-debug-debuginfo-4.18.0-147.32.1.el8_1.aarch64.rpm
kernel-debug-devel-4.18.0-147.32.1.el8_1.aarch64.rpm
kernel-debug-modules-4.18.0-147.32.1.el8_1.aarch64.rpm
kernel-debug-modules-extra-4.18.0-147.32.1.el8_1.aarch64.rpm
kernel-debuginfo-4.18.0-147.32.1.el8_1.aarch64.rpm
kernel-debuginfo-common-aarch64-4.18.0-147.32.1.el8_1.aarch64.rpm
kernel-devel-4.18.0-147.32.1.el8_1.aarch64.rpm
kernel-headers-4.18.0-147.32.1.el8_1.aarch64.rpm
kernel-modules-4.18.0-147.32.1.el8_1.aarch64.rpm
kernel-modules-extra-4.18.0-147.32.1.el8_1.aarch64.rpm
kernel-tools-4.18.0-147.32.1.el8_1.aarch64.rpm
kernel-tools-debuginfo-4.18.0-147.32.1.el8_1.aarch64.rpm
kernel-tools-libs-4.18.0-147.32.1.el8_1.aarch64.rpm
perf-4.18.0-147.32.1.el8_1.aarch64.rpm
perf-debuginfo-4.18.0-147.32.1.el8_1.aarch64.rpm
python3-perf-4.18.0-147.32.1.el8_1.aarch64.rpm
python3-perf-debuginfo-4.18.0-147.32.1.el8_1.aarch64.rpm
noarch:
kernel-abi-whitelists-4.18.0-147.32.1.el8_1.noarch.rpm
kernel-doc-4.18.0-147.32.1.el8_1.noarch.rpm
ppc64le:
bpftool-4.18.0-147.32.1.el8_1.ppc64le.rpm
bpftool-debuginfo-4.18.0-147.32.1.el8_1.ppc64le.rpm
kernel-4.18.0-147.32.1.el8_1.ppc64le.rpm
kernel-core-4.18.0-147.32.1.el8_1.ppc64le.rpm
kernel-cross-headers-4.18.0-147.32.1.el8_1.ppc64le.rpm
kernel-debug-4.18.0-147.32.1.el8_1.ppc64le.rpm
kernel-debug-core-4.18.0-147.32.1.el8_1.ppc64le.rpm
kernel-debug-debuginfo-4.18.0-147.32.1.el8_1.ppc64le.rpm
kernel-debug-devel-4.18.0-147.32.1.el8_1.ppc64le.rpm
kernel-debug-modules-4.18.0-147.32.1.el8_1.ppc64le.rpm
kernel-debug-modules-extra-4.18.0-147.32.1.el8_1.ppc64le.rpm
kernel-debuginfo-4.18.0-147.32.1.el8_1.ppc64le.rpm
kernel-debuginfo-common-ppc64le-4.18.0-147.32.1.el8_1.ppc64le.rpm
kernel-devel-4.18.0-147.32.1.el8_1.ppc64le.rpm
kernel-headers-4.18.0-147.32.1.el8_1.ppc64le.rpm
kernel-modules-4.18.0-147.32.1.el8_1.ppc64le.rpm
kernel-modules-extra-4.18.0-147.32.1.el8_1.ppc64le.rpm
kernel-tools-4.18.0-147.32.1.el8_1.ppc64le.rpm
kernel-tools-debuginfo-4.18.0-147.32.1.el8_1.ppc64le.rpm
kernel-tools-libs-4.18.0-147.32.1.el8_1.ppc64le.rpm
perf-4.18.0-147.32.1.el8_1.ppc64le.rpm
perf-debuginfo-4.18.0-147.32.1.el8_1.ppc64le.rpm
python3-perf-4.18.0-147.32.1.el8_1.ppc64le.rpm
python3-perf-debuginfo-4.18.0-147.32.1.el8_1.ppc64le.rpm
s390x:
bpftool-4.18.0-147.32.1.el8_1.s390x.rpm
bpftool-debuginfo-4.18.0-147.32.1.el8_1.s390x.rpm
kernel-4.18.0-147.32.1.el8_1.s390x.rpm
kernel-core-4.18.0-147.32.1.el8_1.s390x.rpm
kernel-cross-headers-4.18.0-147.32.1.el8_1.s390x.rpm
kernel-debug-4.18.0-147.32.1.el8_1.s390x.rpm
kernel-debug-core-4.18.0-147.32.1.el8_1.s390x.rpm
kernel-debug-debuginfo-4.18.0-147.32.1.el8_1.s390x.rpm
kernel-debug-devel-4.18.0-147.32.1.el8_1.s390x.rpm
kernel-debug-modules-4.18.0-147.32.1.el8_1.s390x.rpm
kernel-debug-modules-extra-4.18.0-147.32.1.el8_1.s390x.rpm
kernel-debuginfo-4.18.0-147.32.1.el8_1.s390x.rpm
kernel-debuginfo-common-s390x-4.18.0-147.32.1.el8_1.s390x.rpm
kernel-devel-4.18.0-147.32.1.el8_1.s390x.rpm
kernel-headers-4.18.0-147.32.1.el8_1.s390x.rpm
kernel-modules-4.18.0-147.32.1.el8_1.s390x.rpm
kernel-modules-extra-4.18.0-147.32.1.el8_1.s390x.rpm
kernel-tools-4.18.0-147.32.1.el8_1.s390x.rpm
kernel-tools-debuginfo-4.18.0-147.32.1.el8_1.s390x.rpm
kernel-zfcpdump-4.18.0-147.32.1.el8_1.s390x.rpm
kernel-zfcpdump-core-4.18.0-147.32.1.el8_1.s390x.rpm
kernel-zfcpdump-debuginfo-4.18.0-147.32.1.el8_1.s390x.rpm
kernel-zfcpdump-devel-4.18.0-147.32.1.el8_1.s390x.rpm
kernel-zfcpdump-modules-4.18.0-147.32.1.el8_1.s390x.rpm
kernel-zfcpdump-modules-extra-4.18.0-147.32.1.el8_1.s390x.rpm
perf-4.18.0-147.32.1.el8_1.s390x.rpm
perf-debuginfo-4.18.0-147.32.1.el8_1.s390x.rpm
python3-perf-4.18.0-147.32.1.el8_1.s390x.rpm
python3-perf-debuginfo-4.18.0-147.32.1.el8_1.s390x.rpm
x86_64:
bpftool-4.18.0-147.32.1.el8_1.x86_64.rpm
bpftool-debuginfo-4.18.0-147.32.1.el8_1.x86_64.rpm
kernel-4.18.0-147.32.1.el8_1.x86_64.rpm
kernel-core-4.18.0-147.32.1.el8_1.x86_64.rpm
kernel-cross-headers-4.18.0-147.32.1.el8_1.x86_64.rpm
kernel-debug-4.18.0-147.32.1.el8_1.x86_64.rpm
kernel-debug-core-4.18.0-147.32.1.el8_1.x86_64.rpm
kernel-debug-debuginfo-4.18.0-147.32.1.el8_1.x86_64.rpm
kernel-debug-devel-4.18.0-147.32.1.el8_1.x86_64.rpm
kernel-debug-modules-4.18.0-147.32.1.el8_1.x86_64.rpm
kernel-debug-modules-extra-4.18.0-147.32.1.el8_1.x86_64.rpm
kernel-debuginfo-4.18.0-147.32.1.el8_1.x86_64.rpm
kernel-debuginfo-common-x86_64-4.18.0-147.32.1.el8_1.x86_64.rpm
kernel-devel-4.18.0-147.32.1.el8_1.x86_64.rpm
kernel-headers-4.18.0-147.32.1.el8_1.x86_64.rpm
kernel-modules-4.18.0-147.32.1.el8_1.x86_64.rpm
kernel-modules-extra-4.18.0-147.32.1.el8_1.x86_64.rpm
kernel-tools-4.18.0-147.32.1.el8_1.x86_64.rpm
kernel-tools-debuginfo-4.18.0-147.32.1.el8_1.x86_64.rpm
kernel-tools-libs-4.18.0-147.32.1.el8_1.x86_64.rpm
perf-4.18.0-147.32.1.el8_1.x86_64.rpm
perf-debuginfo-4.18.0-147.32.1.el8_1.x86_64.rpm
python3-perf-4.18.0-147.32.1.el8_1.x86_64.rpm
python3-perf-debuginfo-4.18.0-147.32.1.el8_1.x86_64.rpm
Red Hat CodeReady Linux Builder EUS (v. 8.1):
aarch64:
bpftool-debuginfo-4.18.0-147.32.1.el8_1.aarch64.rpm
kernel-debug-debuginfo-4.18.0-147.32.1.el8_1.aarch64.rpm
kernel-debuginfo-4.18.0-147.32.1.el8_1.aarch64.rpm
kernel-debuginfo-common-aarch64-4.18.0-147.32.1.el8_1.aarch64.rpm
kernel-tools-debuginfo-4.18.0-147.32.1.el8_1.aarch64.rpm
kernel-tools-libs-devel-4.18.0-147.32.1.el8_1.aarch64.rpm
perf-debuginfo-4.18.0-147.32.1.el8_1.aarch64.rpm
python3-perf-debuginfo-4.18.0-147.32.1.el8_1.aarch64.rpm
ppc64le:
bpftool-debuginfo-4.18.0-147.32.1.el8_1.ppc64le.rpm
kernel-debug-debuginfo-4.18.0-147.32.1.el8_1.ppc64le.rpm
kernel-debuginfo-4.18.0-147.32.1.el8_1.ppc64le.rpm
kernel-debuginfo-common-ppc64le-4.18.0-147.32.1.el8_1.ppc64le.rpm
kernel-tools-debuginfo-4.18.0-147.32.1.el8_1.ppc64le.rpm
kernel-tools-libs-devel-4.18.0-147.32.1.el8_1.ppc64le.rpm
perf-debuginfo-4.18.0-147.32.1.el8_1.ppc64le.rpm
python3-perf-debuginfo-4.18.0-147.32.1.el8_1.ppc64le.rpm
x86_64:
bpftool-debuginfo-4.18.0-147.32.1.el8_1.x86_64.rpm
kernel-debug-debuginfo-4.18.0-147.32.1.el8_1.x86_64.rpm
kernel-debuginfo-4.18.0-147.32.1.el8_1.x86_64.rpm
kernel-debuginfo-common-x86_64-4.18.0-147.32.1.el8_1.x86_64.rpm
kernel-tools-debuginfo-4.18.0-147.32.1.el8_1.x86_64.rpm
kernel-tools-libs-devel-4.18.0-147.32.1.el8_1.x86_64.rpm
perf-debuginfo-4.18.0-147.32.1.el8_1.x86_64.rpm
python3-perf-debuginfo-4.18.0-147.32.1.el8_1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2020-12351
https://access.redhat.com/security/cve/CVE-2020-12352
https://access.redhat.com/security/cve/CVE-2020-14385
https://access.redhat.com/security/cve/CVE-2020-14386
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/security/vulnerabilities/BleedingTooth
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2020 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=W3dQ
—–END PGP SIGNATURE—–
—
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Important: kernel security update
Advisory ID: RHSA-2020:4288-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:4288
Issue date: 2020-10-20
CVE Names: CVE-2020-12351 CVE-2020-12352
=====================================================================
1. Summary:
An update for kernel is now available for Red Hat Enterprise Linux 8.0
Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux BaseOS E4S (v. 8.0) – aarch64, noarch, ppc64le, s390x, x86_64
3. Description:
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
Security Fix(es):
* kernel: net: bluetooth: type confusion while processing AMP packets
(CVE-2020-12351)
* kernel: net: bluetooth: information leak when processing certain AMP
packets (CVE-2020-12352)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
5. Bugs fixed (https://bugzilla.redhat.com/):
1886521 – CVE-2020-12351 kernel: net: bluetooth: type confusion while processing AMP packets
1886529 – CVE-2020-12352 kernel: net: bluetooth: information leak when processing certain AMP packets
6. Package List:
Red Hat Enterprise Linux BaseOS E4S (v. 8.0):
Source:
kernel-4.18.0-80.30.1.el8_0.src.rpm
aarch64:
bpftool-4.18.0-80.30.1.el8_0.aarch64.rpm
bpftool-debuginfo-4.18.0-80.30.1.el8_0.aarch64.rpm
kernel-4.18.0-80.30.1.el8_0.aarch64.rpm
kernel-core-4.18.0-80.30.1.el8_0.aarch64.rpm
kernel-cross-headers-4.18.0-80.30.1.el8_0.aarch64.rpm
kernel-debug-4.18.0-80.30.1.el8_0.aarch64.rpm
kernel-debug-core-4.18.0-80.30.1.el8_0.aarch64.rpm
kernel-debug-debuginfo-4.18.0-80.30.1.el8_0.aarch64.rpm
kernel-debug-devel-4.18.0-80.30.1.el8_0.aarch64.rpm
kernel-debug-modules-4.18.0-80.30.1.el8_0.aarch64.rpm
kernel-debug-modules-extra-4.18.0-80.30.1.el8_0.aarch64.rpm
kernel-debuginfo-4.18.0-80.30.1.el8_0.aarch64.rpm
kernel-debuginfo-common-aarch64-4.18.0-80.30.1.el8_0.aarch64.rpm
kernel-devel-4.18.0-80.30.1.el8_0.aarch64.rpm
kernel-headers-4.18.0-80.30.1.el8_0.aarch64.rpm
kernel-modules-4.18.0-80.30.1.el8_0.aarch64.rpm
kernel-modules-extra-4.18.0-80.30.1.el8_0.aarch64.rpm
kernel-tools-4.18.0-80.30.1.el8_0.aarch64.rpm
kernel-tools-debuginfo-4.18.0-80.30.1.el8_0.aarch64.rpm
kernel-tools-libs-4.18.0-80.30.1.el8_0.aarch64.rpm
perf-4.18.0-80.30.1.el8_0.aarch64.rpm
perf-debuginfo-4.18.0-80.30.1.el8_0.aarch64.rpm
python3-perf-4.18.0-80.30.1.el8_0.aarch64.rpm
python3-perf-debuginfo-4.18.0-80.30.1.el8_0.aarch64.rpm
noarch:
kernel-abi-whitelists-4.18.0-80.30.1.el8_0.noarch.rpm
kernel-doc-4.18.0-80.30.1.el8_0.noarch.rpm
ppc64le:
bpftool-4.18.0-80.30.1.el8_0.ppc64le.rpm
bpftool-debuginfo-4.18.0-80.30.1.el8_0.ppc64le.rpm
kernel-4.18.0-80.30.1.el8_0.ppc64le.rpm
kernel-core-4.18.0-80.30.1.el8_0.ppc64le.rpm
kernel-cross-headers-4.18.0-80.30.1.el8_0.ppc64le.rpm
kernel-debug-4.18.0-80.30.1.el8_0.ppc64le.rpm
kernel-debug-core-4.18.0-80.30.1.el8_0.ppc64le.rpm
kernel-debug-debuginfo-4.18.0-80.30.1.el8_0.ppc64le.rpm
kernel-debug-devel-4.18.0-80.30.1.el8_0.ppc64le.rpm
kernel-debug-modules-4.18.0-80.30.1.el8_0.ppc64le.rpm
kernel-debug-modules-extra-4.18.0-80.30.1.el8_0.ppc64le.rpm
kernel-debuginfo-4.18.0-80.30.1.el8_0.ppc64le.rpm
kernel-debuginfo-common-ppc64le-4.18.0-80.30.1.el8_0.ppc64le.rpm
kernel-devel-4.18.0-80.30.1.el8_0.ppc64le.rpm
kernel-headers-4.18.0-80.30.1.el8_0.ppc64le.rpm
kernel-modules-4.18.0-80.30.1.el8_0.ppc64le.rpm
kernel-modules-extra-4.18.0-80.30.1.el8_0.ppc64le.rpm
kernel-tools-4.18.0-80.30.1.el8_0.ppc64le.rpm
kernel-tools-debuginfo-4.18.0-80.30.1.el8_0.ppc64le.rpm
kernel-tools-libs-4.18.0-80.30.1.el8_0.ppc64le.rpm
perf-4.18.0-80.30.1.el8_0.ppc64le.rpm
perf-debuginfo-4.18.0-80.30.1.el8_0.ppc64le.rpm
python3-perf-4.18.0-80.30.1.el8_0.ppc64le.rpm
python3-perf-debuginfo-4.18.0-80.30.1.el8_0.ppc64le.rpm
s390x:
bpftool-4.18.0-80.30.1.el8_0.s390x.rpm
bpftool-debuginfo-4.18.0-80.30.1.el8_0.s390x.rpm
kernel-4.18.0-80.30.1.el8_0.s390x.rpm
kernel-core-4.18.0-80.30.1.el8_0.s390x.rpm
kernel-cross-headers-4.18.0-80.30.1.el8_0.s390x.rpm
kernel-debug-4.18.0-80.30.1.el8_0.s390x.rpm
kernel-debug-core-4.18.0-80.30.1.el8_0.s390x.rpm
kernel-debug-debuginfo-4.18.0-80.30.1.el8_0.s390x.rpm
kernel-debug-devel-4.18.0-80.30.1.el8_0.s390x.rpm
kernel-debug-modules-4.18.0-80.30.1.el8_0.s390x.rpm
kernel-debug-modules-extra-4.18.0-80.30.1.el8_0.s390x.rpm
kernel-debuginfo-4.18.0-80.30.1.el8_0.s390x.rpm
kernel-debuginfo-common-s390x-4.18.0-80.30.1.el8_0.s390x.rpm
kernel-devel-4.18.0-80.30.1.el8_0.s390x.rpm
kernel-headers-4.18.0-80.30.1.el8_0.s390x.rpm
kernel-modules-4.18.0-80.30.1.el8_0.s390x.rpm
kernel-modules-extra-4.18.0-80.30.1.el8_0.s390x.rpm
kernel-tools-4.18.0-80.30.1.el8_0.s390x.rpm
kernel-tools-debuginfo-4.18.0-80.30.1.el8_0.s390x.rpm
kernel-zfcpdump-4.18.0-80.30.1.el8_0.s390x.rpm
kernel-zfcpdump-core-4.18.0-80.30.1.el8_0.s390x.rpm
kernel-zfcpdump-debuginfo-4.18.0-80.30.1.el8_0.s390x.rpm
kernel-zfcpdump-devel-4.18.0-80.30.1.el8_0.s390x.rpm
kernel-zfcpdump-modules-4.18.0-80.30.1.el8_0.s390x.rpm
kernel-zfcpdump-modules-extra-4.18.0-80.30.1.el8_0.s390x.rpm
perf-4.18.0-80.30.1.el8_0.s390x.rpm
perf-debuginfo-4.18.0-80.30.1.el8_0.s390x.rpm
python3-perf-4.18.0-80.30.1.el8_0.s390x.rpm
python3-perf-debuginfo-4.18.0-80.30.1.el8_0.s390x.rpm
x86_64:
bpftool-4.18.0-80.30.1.el8_0.x86_64.rpm
bpftool-debuginfo-4.18.0-80.30.1.el8_0.x86_64.rpm
kernel-4.18.0-80.30.1.el8_0.x86_64.rpm
kernel-core-4.18.0-80.30.1.el8_0.x86_64.rpm
kernel-cross-headers-4.18.0-80.30.1.el8_0.x86_64.rpm
kernel-debug-4.18.0-80.30.1.el8_0.x86_64.rpm
kernel-debug-core-4.18.0-80.30.1.el8_0.x86_64.rpm
kernel-debug-debuginfo-4.18.0-80.30.1.el8_0.x86_64.rpm
kernel-debug-devel-4.18.0-80.30.1.el8_0.x86_64.rpm
kernel-debug-modules-4.18.0-80.30.1.el8_0.x86_64.rpm
kernel-debug-modules-extra-4.18.0-80.30.1.el8_0.x86_64.rpm
kernel-debuginfo-4.18.0-80.30.1.el8_0.x86_64.rpm
kernel-debuginfo-common-x86_64-4.18.0-80.30.1.el8_0.x86_64.rpm
kernel-devel-4.18.0-80.30.1.el8_0.x86_64.rpm
kernel-headers-4.18.0-80.30.1.el8_0.x86_64.rpm
kernel-modules-4.18.0-80.30.1.el8_0.x86_64.rpm
kernel-modules-extra-4.18.0-80.30.1.el8_0.x86_64.rpm
kernel-tools-4.18.0-80.30.1.el8_0.x86_64.rpm
kernel-tools-debuginfo-4.18.0-80.30.1.el8_0.x86_64.rpm
kernel-tools-libs-4.18.0-80.30.1.el8_0.x86_64.rpm
perf-4.18.0-80.30.1.el8_0.x86_64.rpm
perf-debuginfo-4.18.0-80.30.1.el8_0.x86_64.rpm
python3-perf-4.18.0-80.30.1.el8_0.x86_64.rpm
python3-perf-debuginfo-4.18.0-80.30.1.el8_0.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2020-12351
https://access.redhat.com/security/cve/CVE-2020-12352
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/security/vulnerabilities/BleedingTooth
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2020 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
iQIVAwUBX46gk9zjgjWX9erEAQjZfg//aaxNl91vj/tm1IpW+JZYQLa+vBHFD79U
s0QGJszf9ntn15BDGQdB8Dc0Wk4BmvdG7/UYLP+wk88F1kvUD2C1ToivmyiK3JHT
HrSxXXKZRz1RXf4+MTHidEy+tjLFWluH6hRiefVISTzYrzNsaM85l1/kBVd2uUkE
nJIs6E1NIHFNouwjGqptlFc5o1h5lQv4TP/8COTZcjRCzlqIS8kx9bYrz59k53Wq
5BTsj9sCEs4YgL/JsKsVpWZLihJ9CE7C4NX4qbCfAiSa30Bjcm1KJbcPQUkWvZSd
B7JVDWCRqHmTBc+jE5glC+A/eh25xnJrgLh7BA/2gqIHqTggr4p2xtw5k/JAg/9f
TJ8tJ6kgBz1LSCiQIGXTYgiLZjbRvMahqdLcXkCxqtuhL7mGmUvc1+HHOgw2xBqX
0YCYStkYxtLY8IgqMmhRZ6tX2bJvKfcpRL/OI/a2xhL6zSSmwYpyU3Ktjw1l5VzW
7yS8/JlBPnutwNI8+xqS/VpJRtydltEUXvpHEOBbn2LLi6y8jYjIewYMoHGOl2bo
40SwhMcuLwXn4twDJWw17OE6RRMO+cFV3yfnHcFJzeEZUMYjHMJZoqtQ8Rfb4zsl
XmNJAkPPEk4HP9g/lb9kOgAJa9SGi0hH1B47vJkhFHarV0w3RiLrgWM4C4l57iGS
NRXYV1ysO0w=
=JHrh
—–END PGP SIGNATURE—–
—
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Important: kernel security update
Advisory ID: RHSA-2020:4276-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:4276
Issue date: 2020-10-20
CVE Names: CVE-2020-12351 CVE-2020-12352
=====================================================================
1. Summary:
An update for kernel is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) – noarch, x86_64
Red Hat Enterprise Linux Client Optional (v. 7) – x86_64
Red Hat Enterprise Linux ComputeNode (v. 7) – noarch, x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) – x86_64
Red Hat Enterprise Linux Server (v. 7) – noarch, ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) – ppc64, ppc64le, x86_64
Red Hat Enterprise Linux Workstation (v. 7) – noarch, x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) – x86_64
3. Description:
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
Security Fix(es):
* kernel: net: bluetooth: type confusion while processing AMP packets
(CVE-2020-12351)
* kernel: net: bluetooth: information leak when processing certain AMP
packets (CVE-2020-12352)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
5. Bugs fixed (https://bugzilla.redhat.com/):
1886521 – CVE-2020-12351 kernel: net: bluetooth: type confusion while processing AMP packets
1886529 – CVE-2020-12352 kernel: net: bluetooth: information leak when processing certain AMP packets
6. Package List:
Red Hat Enterprise Linux Client (v. 7):
Source:
kernel-3.10.0-1160.2.2.el7.src.rpm
noarch:
kernel-abi-whitelists-3.10.0-1160.2.2.el7.noarch.rpm
kernel-doc-3.10.0-1160.2.2.el7.noarch.rpm
x86_64:
bpftool-3.10.0-1160.2.2.el7.x86_64.rpm
bpftool-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-debug-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-debug-devel-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-devel-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-headers-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-tools-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-tools-libs-3.10.0-1160.2.2.el7.x86_64.rpm
perf-3.10.0-1160.2.2.el7.x86_64.rpm
perf-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
python-perf-3.10.0-1160.2.2.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64:
bpftool-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-1160.2.2.el7.x86_64.rpm
perf-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source:
kernel-3.10.0-1160.2.2.el7.src.rpm
noarch:
kernel-abi-whitelists-3.10.0-1160.2.2.el7.noarch.rpm
kernel-doc-3.10.0-1160.2.2.el7.noarch.rpm
x86_64:
bpftool-3.10.0-1160.2.2.el7.x86_64.rpm
bpftool-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-debug-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-debug-devel-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-devel-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-headers-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-tools-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-tools-libs-3.10.0-1160.2.2.el7.x86_64.rpm
perf-3.10.0-1160.2.2.el7.x86_64.rpm
perf-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
python-perf-3.10.0-1160.2.2.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64:
bpftool-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-1160.2.2.el7.x86_64.rpm
perf-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source:
kernel-3.10.0-1160.2.2.el7.src.rpm
noarch:
kernel-abi-whitelists-3.10.0-1160.2.2.el7.noarch.rpm
kernel-doc-3.10.0-1160.2.2.el7.noarch.rpm
ppc64:
bpftool-3.10.0-1160.2.2.el7.ppc64.rpm
bpftool-debuginfo-3.10.0-1160.2.2.el7.ppc64.rpm
kernel-3.10.0-1160.2.2.el7.ppc64.rpm
kernel-bootwrapper-3.10.0-1160.2.2.el7.ppc64.rpm
kernel-debug-3.10.0-1160.2.2.el7.ppc64.rpm
kernel-debug-debuginfo-3.10.0-1160.2.2.el7.ppc64.rpm
kernel-debug-devel-3.10.0-1160.2.2.el7.ppc64.rpm
kernel-debuginfo-3.10.0-1160.2.2.el7.ppc64.rpm
kernel-debuginfo-common-ppc64-3.10.0-1160.2.2.el7.ppc64.rpm
kernel-devel-3.10.0-1160.2.2.el7.ppc64.rpm
kernel-headers-3.10.0-1160.2.2.el7.ppc64.rpm
kernel-tools-3.10.0-1160.2.2.el7.ppc64.rpm
kernel-tools-debuginfo-3.10.0-1160.2.2.el7.ppc64.rpm
kernel-tools-libs-3.10.0-1160.2.2.el7.ppc64.rpm
perf-3.10.0-1160.2.2.el7.ppc64.rpm
perf-debuginfo-3.10.0-1160.2.2.el7.ppc64.rpm
python-perf-3.10.0-1160.2.2.el7.ppc64.rpm
python-perf-debuginfo-3.10.0-1160.2.2.el7.ppc64.rpm
ppc64le:
bpftool-3.10.0-1160.2.2.el7.ppc64le.rpm
bpftool-debuginfo-3.10.0-1160.2.2.el7.ppc64le.rpm
kernel-3.10.0-1160.2.2.el7.ppc64le.rpm
kernel-bootwrapper-3.10.0-1160.2.2.el7.ppc64le.rpm
kernel-debug-3.10.0-1160.2.2.el7.ppc64le.rpm
kernel-debug-debuginfo-3.10.0-1160.2.2.el7.ppc64le.rpm
kernel-debuginfo-3.10.0-1160.2.2.el7.ppc64le.rpm
kernel-debuginfo-common-ppc64le-3.10.0-1160.2.2.el7.ppc64le.rpm
kernel-devel-3.10.0-1160.2.2.el7.ppc64le.rpm
kernel-headers-3.10.0-1160.2.2.el7.ppc64le.rpm
kernel-tools-3.10.0-1160.2.2.el7.ppc64le.rpm
kernel-tools-debuginfo-3.10.0-1160.2.2.el7.ppc64le.rpm
kernel-tools-libs-3.10.0-1160.2.2.el7.ppc64le.rpm
perf-3.10.0-1160.2.2.el7.ppc64le.rpm
perf-debuginfo-3.10.0-1160.2.2.el7.ppc64le.rpm
python-perf-3.10.0-1160.2.2.el7.ppc64le.rpm
python-perf-debuginfo-3.10.0-1160.2.2.el7.ppc64le.rpm
s390x:
bpftool-3.10.0-1160.2.2.el7.s390x.rpm
bpftool-debuginfo-3.10.0-1160.2.2.el7.s390x.rpm
kernel-3.10.0-1160.2.2.el7.s390x.rpm
kernel-debug-3.10.0-1160.2.2.el7.s390x.rpm
kernel-debug-debuginfo-3.10.0-1160.2.2.el7.s390x.rpm
kernel-debug-devel-3.10.0-1160.2.2.el7.s390x.rpm
kernel-debuginfo-3.10.0-1160.2.2.el7.s390x.rpm
kernel-debuginfo-common-s390x-3.10.0-1160.2.2.el7.s390x.rpm
kernel-devel-3.10.0-1160.2.2.el7.s390x.rpm
kernel-headers-3.10.0-1160.2.2.el7.s390x.rpm
kernel-kdump-3.10.0-1160.2.2.el7.s390x.rpm
kernel-kdump-debuginfo-3.10.0-1160.2.2.el7.s390x.rpm
kernel-kdump-devel-3.10.0-1160.2.2.el7.s390x.rpm
perf-3.10.0-1160.2.2.el7.s390x.rpm
perf-debuginfo-3.10.0-1160.2.2.el7.s390x.rpm
python-perf-3.10.0-1160.2.2.el7.s390x.rpm
python-perf-debuginfo-3.10.0-1160.2.2.el7.s390x.rpm
x86_64:
bpftool-3.10.0-1160.2.2.el7.x86_64.rpm
bpftool-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-debug-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-debug-devel-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-devel-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-headers-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-tools-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-tools-libs-3.10.0-1160.2.2.el7.x86_64.rpm
perf-3.10.0-1160.2.2.el7.x86_64.rpm
perf-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
python-perf-3.10.0-1160.2.2.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64:
bpftool-debuginfo-3.10.0-1160.2.2.el7.ppc64.rpm
kernel-debug-debuginfo-3.10.0-1160.2.2.el7.ppc64.rpm
kernel-debuginfo-3.10.0-1160.2.2.el7.ppc64.rpm
kernel-debuginfo-common-ppc64-3.10.0-1160.2.2.el7.ppc64.rpm
kernel-tools-debuginfo-3.10.0-1160.2.2.el7.ppc64.rpm
kernel-tools-libs-devel-3.10.0-1160.2.2.el7.ppc64.rpm
perf-debuginfo-3.10.0-1160.2.2.el7.ppc64.rpm
python-perf-debuginfo-3.10.0-1160.2.2.el7.ppc64.rpm
ppc64le:
bpftool-debuginfo-3.10.0-1160.2.2.el7.ppc64le.rpm
kernel-debug-debuginfo-3.10.0-1160.2.2.el7.ppc64le.rpm
kernel-debug-devel-3.10.0-1160.2.2.el7.ppc64le.rpm
kernel-debuginfo-3.10.0-1160.2.2.el7.ppc64le.rpm
kernel-debuginfo-common-ppc64le-3.10.0-1160.2.2.el7.ppc64le.rpm
kernel-tools-debuginfo-3.10.0-1160.2.2.el7.ppc64le.rpm
kernel-tools-libs-devel-3.10.0-1160.2.2.el7.ppc64le.rpm
perf-debuginfo-3.10.0-1160.2.2.el7.ppc64le.rpm
python-perf-debuginfo-3.10.0-1160.2.2.el7.ppc64le.rpm
x86_64:
bpftool-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-1160.2.2.el7.x86_64.rpm
perf-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source:
kernel-3.10.0-1160.2.2.el7.src.rpm
noarch:
kernel-abi-whitelists-3.10.0-1160.2.2.el7.noarch.rpm
kernel-doc-3.10.0-1160.2.2.el7.noarch.rpm
x86_64:
bpftool-3.10.0-1160.2.2.el7.x86_64.rpm
bpftool-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-debug-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-debug-devel-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-devel-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-headers-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-tools-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-tools-libs-3.10.0-1160.2.2.el7.x86_64.rpm
perf-3.10.0-1160.2.2.el7.x86_64.rpm
perf-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
python-perf-3.10.0-1160.2.2.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64:
bpftool-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-1160.2.2.el7.x86_64.rpm
perf-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-1160.2.2.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2020-12351
https://access.redhat.com/security/cve/CVE-2020-12352
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/security/vulnerabilities/BleedingTooth
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2020 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=/n4W
—–END PGP SIGNATURE—–
—
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce