You are here
Home > Preporuke > Sigurnosni nedostaci jezgre operacijskog sustava

Sigurnosni nedostaci jezgre operacijskog sustava

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: kernel-rt security and bug fix update
Advisory ID: RHSA-2020:4609-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:4609
Issue date: 2020-11-03
CVE Names: CVE-2019-9455 CVE-2019-9458 CVE-2019-15917
CVE-2019-15925 CVE-2019-16231 CVE-2019-16233
CVE-2019-18808 CVE-2019-18809 CVE-2019-19046
CVE-2019-19056 CVE-2019-19062 CVE-2019-19063
CVE-2019-19068 CVE-2019-19072 CVE-2019-19319
CVE-2019-19332 CVE-2019-19447 CVE-2019-19524
CVE-2019-19533 CVE-2019-19537 CVE-2019-19543
CVE-2019-19767 CVE-2019-19770 CVE-2019-20054
CVE-2019-20636 CVE-2020-0305 CVE-2020-8647
CVE-2020-8648 CVE-2020-8649 CVE-2020-10732
CVE-2020-10751 CVE-2020-10774 CVE-2020-10942
CVE-2020-11565 CVE-2020-11668 CVE-2020-12655
CVE-2020-12659 CVE-2020-12770 CVE-2020-12826
CVE-2020-14381 CVE-2020-25641
=====================================================================

1. Summary:

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Real Time (v. 8) – x86_64
Red Hat Enterprise Linux Real Time for NFV (v. 8) – x86_64

3. Description:

The kernel-rt packages provide the Real Time Linux Kernel, which enables
fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

* kernel: use after free due to race condition in the video driver leads to
local privilege escalation (CVE-2019-9458)

* kernel: use-after-free in drivers/bluetooth/hci_ldisc.c (CVE-2019-15917)

* kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg
(CVE-2019-15925)

* kernel: memory leak in ccp_run_sha_cmd() (CVE-2019-18808)

* kernel: Denial Of Service in the __ipmi_bmc_register() (CVE-2019-19046)

* kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c
(CVE-2019-19319)

* Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid
(CVE-2019-19332)

* kernel: use-after-free in ext4_put_super (CVE-2019-19447)

* kernel: a malicious USB device in the drivers/input/ff-memless.c leads to
use-after-free (CVE-2019-19524)

* kernel: race condition caused by a malicious USB device in the USB
character device driver layer (CVE-2019-19537)

* kernel: use-after-free in serial_ir_init_module() (CVE-2019-19543)

* kernel: use-after-free in __ext4_expand_extra_isize and
ext4_xattr_set_entry (CVE-2019-19767)

* kernel: use-after-free in debugfs_remove (CVE-2019-19770)

* kernel: out-of-bounds write via crafted keycode table (CVE-2019-20636)

* kernel: possible use-after-free due to a race condition in cdev_get of
char_dev.c (CVE-2020-0305)

* kernel: out-of-bounds read in in vc_do_resize (CVE-2020-8647)

* kernel: use-after-free in n_tty_receive_buf_common (CVE-2020-8648)

* kernel: invalid read location in vgacon_invert_region (CVE-2020-8649)

* kernel: uninitialized kernel data leak in userspace coredumps
(CVE-2020-10732)

* kernel: SELinux netlink permission check bypass (CVE-2020-10751)

* kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c
(CVE-2020-11565)

* kernel: mishandles invalid descriptors in
drivers/media/usb/gspca/xirlink_cit.c (CVE-2020-11668)

* kernel: out-of-bounds write in xdp_umem_reg (CVE-2020-12659)

* kernel: sg_write function lacks an sg_remove_request call in a certain
failure case (CVE-2020-12770)

* kernel: possible to send arbitrary signals to a privileged (suidroot)
parent process (CVE-2020-12826)

* kernel: referencing inode of removed superblock in get_futex_key() causes
UAF (CVE-2020-14381)

* kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in
DoS (CVE-2020-25641)

* kernel: kernel pointer leak due to WARN_ON statement in video driver
leads to local information disclosure (CVE-2019-9455)

* kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c
(CVE-2019-16231)

* kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c
(CVE-2019-16233)

* kernel: memory leak in af9005_identify_state() function in
drivers/media/usb/dvb-usb/af9005.c (CVE-2019-18809)

* kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf()
(CVE-2019-19056)

* kernel: memory leak in the crypto_report() function in
crypto/crypto_user_base.c allows for DoS (CVE-2019-19062)

* kernel: Two memory leaks in the rtl_usb_probe() (CVE-2019-19063)

* kernel: A memory leak in the rtl8xxxu_submit_int_urb() (CVE-2019-19068)

* kernel: A memory leak in the predicate_parse() function in
kernel/trace/trace_events_filter.c allows for a DoS (CVE-2019-19072)

* kernel: information leak bug caused by a malicious USB device in the
drivers/media/usb/ttusb-dec/ttusb_dec.c (CVE-2019-19533)

* kernel: Null pointer dereference in drop_sysctl_table() in
fs/proc/proc_sysctl.c (CVE-2019-20054)

* kernel: possibility of memory disclosure when reading the file
/proc/sys/kernel/rh_features (CVE-2020-10774)

* kernel: vhost-net: stack overflow in get_raw_socket while checking
sk_family field (CVE-2020-10942)

* kernel: sync of excessive duration via an XFS v5 image with crafted
metadata (CVE-2020-12655)

4. Solution:

For detailed information on changes in this release, see the Red Hat
Enterprise Linux 8.3 Release Notes linked from the References section.

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1733495 – BUG: sleeping function called from invalid context at kernel/locking/rtmutex.c:974
1759052 – CVE-2019-15925 kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg
1760100 – CVE-2019-15917 kernel: use-after-free in drivers/bluetooth/hci_ldisc.c
1760310 – CVE-2019-16231 kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c
1760420 – CVE-2019-16233 kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c
1774946 – CVE-2019-19072 kernel: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c allows for a DoS
1774963 – CVE-2019-19068 kernel: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c allows for a DoS
1774988 – CVE-2019-19046 kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c
1775015 – CVE-2019-19063 kernel: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c allow for a DoS
1775021 – CVE-2019-19062 kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS
1775097 – CVE-2019-19056 kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows to cause DoS
1777418 – CVE-2019-18808 kernel: memory leak in ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c
1777449 – CVE-2019-18809 kernel: memory leak in af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c
1779046 – RT host hang with Call Trace “WARNING: CPU: 16 PID: 153 at kernel/smp.c:333 smp_call_function_single_async+0x7a/”
1779594 – CVE-2019-19332 Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid
1781679 – CVE-2019-19447 kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c
1781810 – CVE-2019-19543 kernel: use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c
1783459 – CVE-2019-19524 kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free
1783534 – CVE-2019-19533 kernel: information leak bug caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c
1783561 – CVE-2019-19537 kernel: race condition caused by a malicious USB device in the USB character device driver layer
1784130 – CVE-2019-19319 kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c
1786160 – CVE-2019-19767 kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry related to fs/ext4/inode.c and fs/ext4/super.c
1786179 – CVE-2019-19770 kernel: use-after-free in debugfs_remove in fs/debugfs/inode.c
1790063 – CVE-2019-20054 kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c
1802555 – CVE-2020-8649 kernel: invalid read location in vgacon_invert_region function in drivers/video/console/vgacon.c
1802559 – CVE-2020-8648 kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c
1802563 – CVE-2020-8647 kernel: out-of-bounds read in in vc_do_resize function in drivers/tty/vt/vt.c
1817718 – CVE-2020-10942 kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field
1819377 – CVE-2019-9458 kernel: use after free due to race condition in the video driver leads to local privilege escalation
1819399 – CVE-2019-9455 kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure
1822077 – CVE-2020-12826 kernel: possible to send arbitrary signals to a privileged (suidroot) parent process
1824059 – CVE-2019-20636 kernel: out-of-bounds write via crafted keycode table
1824792 – CVE-2020-11668 kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c
1824918 – CVE-2020-11565 kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c
1831399 – CVE-2020-10732 kernel: uninitialized kernel data leak in userspace coredumps
1832543 – CVE-2020-12655 kernel: sync of excessive duration via an XFS v5 image with crafted metadata
1832876 – CVE-2020-12659 kernel: xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write which could result in crash and data coruption
1833196 – adaptive-tick appears to not be functioning as expected on RHEL 8.2 RT
1834845 – CVE-2020-12770 kernel: sg_write function lacks an sg_remove_request call in a certain failure case
1839634 – CVE-2020-10751 kernel: SELinux netlink permission check bypass
1843410 – RT guest get Call Trace “INFO: task ld:274531 blocked for more than 600 seconds.”
1846964 – CVE-2020-10774 kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features
1852298 – Install VM fails and RT host get Call Trace “WARNING: CPU: 18 PID: 2947 at fs/eventfd.c:68 eventfd_signal+0x7e/0x90”
1859590 – [efi]RT kernel crash with “rcu: INFO: rcu_preempt detected stalls on CPUs/tasks”
1860065 – CVE-2020-0305 kernel: possible use-after-free due to a race condition in cdev_get of char_dev.c
1874311 – CVE-2020-14381 kernel: referencing inode of removed superblock in get_futex_key() causes UAF
1881424 – CVE-2020-25641 kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS

6. Package List:

Red Hat Enterprise Linux Real Time for NFV (v. 8):

Source:
kernel-rt-4.18.0-240.rt7.54.el8.src.rpm

x86_64:
kernel-rt-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-core-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-debug-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-debug-core-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-debug-debuginfo-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-debug-devel-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-debug-kvm-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-debug-modules-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-debug-modules-extra-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-debuginfo-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-debuginfo-common-x86_64-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-devel-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-kvm-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-modules-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-modules-extra-4.18.0-240.rt7.54.el8.x86_64.rpm

Red Hat Enterprise Linux Real Time (v. 8):

Source:
kernel-rt-4.18.0-240.rt7.54.el8.src.rpm

x86_64:
kernel-rt-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-core-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-debug-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-debug-core-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-debug-debuginfo-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-debug-devel-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-debug-modules-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-debug-modules-extra-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-debuginfo-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-debuginfo-common-x86_64-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-devel-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-modules-4.18.0-240.rt7.54.el8.x86_64.rpm
kernel-rt-modules-extra-4.18.0-240.rt7.54.el8.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-9455
https://access.redhat.com/security/cve/CVE-2019-9458
https://access.redhat.com/security/cve/CVE-2019-15917
https://access.redhat.com/security/cve/CVE-2019-15925
https://access.redhat.com/security/cve/CVE-2019-16231
https://access.redhat.com/security/cve/CVE-2019-16233
https://access.redhat.com/security/cve/CVE-2019-18808
https://access.redhat.com/security/cve/CVE-2019-18809
https://access.redhat.com/security/cve/CVE-2019-19046
https://access.redhat.com/security/cve/CVE-2019-19056
https://access.redhat.com/security/cve/CVE-2019-19062
https://access.redhat.com/security/cve/CVE-2019-19063
https://access.redhat.com/security/cve/CVE-2019-19068
https://access.redhat.com/security/cve/CVE-2019-19072
https://access.redhat.com/security/cve/CVE-2019-19319
https://access.redhat.com/security/cve/CVE-2019-19332
https://access.redhat.com/security/cve/CVE-2019-19447
https://access.redhat.com/security/cve/CVE-2019-19524
https://access.redhat.com/security/cve/CVE-2019-19533
https://access.redhat.com/security/cve/CVE-2019-19537
https://access.redhat.com/security/cve/CVE-2019-19543
https://access.redhat.com/security/cve/CVE-2019-19767
https://access.redhat.com/security/cve/CVE-2019-19770
https://access.redhat.com/security/cve/CVE-2019-20054
https://access.redhat.com/security/cve/CVE-2019-20636
https://access.redhat.com/security/cve/CVE-2020-0305
https://access.redhat.com/security/cve/CVE-2020-8647
https://access.redhat.com/security/cve/CVE-2020-8648
https://access.redhat.com/security/cve/CVE-2020-8649
https://access.redhat.com/security/cve/CVE-2020-10732
https://access.redhat.com/security/cve/CVE-2020-10751
https://access.redhat.com/security/cve/CVE-2020-10774
https://access.redhat.com/security/cve/CVE-2020-10942
https://access.redhat.com/security/cve/CVE-2020-11565
https://access.redhat.com/security/cve/CVE-2020-11668
https://access.redhat.com/security/cve/CVE-2020-12655
https://protect2.fireeye.com/v1/url?k=6e7bb5b2-31e7afac-6e7c287e-000babd90757-d8da30dbf9f1eb16&q=1&e=7869ec6b-6c5e-4d6d-9039-7739b0938468&u=https%3A%2F%2Faccess.redhat.com%2Fsecurity%2Fcve%2FCVE-2020-12659
https://protect2.fireeye.com/v1/url?k=dc623486-83fe2e98-dc65a94a-000babd90757-cd9fde14dbcd70de&q=1&e=7869ec6b-6c5e-4d6d-9039-7739b0938468&u=https%3A%2F%2Faccess.redhat.com%2Fsecurity%2Fcve%2FCVE-2020-12770
https://protect2.fireeye.com/v1/url?k=4edb0c65-1147167b-4edc91a9-000babd90757-717fce7244649659&q=1&e=7869ec6b-6c5e-4d6d-9039-7739b0938468&u=https%3A%2F%2Faccess.redhat.com%2Fsecurity%2Fcve%2FCVE-2020-12826
https://protect2.fireeye.com/v1/url?k=adedbc2d-f271a633-adea21e1-000babd90757-16923485bdab76e6&q=1&e=7869ec6b-6c5e-4d6d-9039-7739b0938468&u=https%3A%2F%2Faccess.redhat.com%2Fsecurity%2Fcve%2FCVE-2020-14381
https://protect2.fireeye.com/v1/url?k=eaace568-b530ff76-eaab78a4-000babd90757-16ae798f83b42c71&q=1&e=7869ec6b-6c5e-4d6d-9039-7739b0938468&u=https%3A%2F%2Faccess.redhat.com%2Fsecurity%2Fcve%2FCVE-2020-25641
https://protect2.fireeye.com/v1/url?k=3a044d49-65985757-3a03d085-000babd90757-f8276374be600f3e&q=1&e=7869ec6b-6c5e-4d6d-9039-7739b0938468&u=https%3A%2F%2Faccess.redhat.com%2Fsecurity%2Fupdates%2Fclassification%2F%23moderate
https://protect2.fireeye.com/v1/url?k=7d9b51ff-22074be1-7d9ccc33-000babd90757-0bfc055aabdf6b7b&q=1&e=7869ec6b-6c5e-4d6d-9039-7739b0938468&u=https%3A%2F%2Faccess.redhat.com%2Fdocumentation%2Fen-us%2Fred_hat_enterprise_linux%2F8%2Fhtml%2F8.3_release_notes%2Findex

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://protect2.fireeye.com/v1/url?k=8290212c-dd0c3b32-8297bce0-000babd90757-e61d8d794b5d61f7&q=1&e=7869ec6b-6c5e-4d6d-9039-7739b0938468&u=https%3A%2F%2Faccess.redhat.com%2Fsecurity%2Fteam%2Fcontact%2F

Copyright 2020 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1

iQIVAwUBX6Ix3tzjgjWX9erEAQhuhA//a3kyZ3P1p93nmvAK2wc/XwfSmfbbsS+s
y0dn5nE50gzW25KWjE1VM4VL05krjT5VWwQOBBm7VtUHWWgaBYiHjdBhSEQWvIZQ
A6MHe7DQX34wMr4cdCVlp/yPSls8ePGYiRv/kce0DH+xhMYbgqGQghJmtHNvvXKe
Og5fxcm31kBYpQQ0fCL44ohpoAZkJfzkhss9vi+OMFU/k6F2CbpPy7ky21Qv21Vn
ly48OWJ0I7B9am1yxZRXd8og2/54h53shTWysGO/pQMKpdVCqCEVmfMOXx48fxQY
KFTkZaZQsj1ki0pJ4pKb9iF5Q6c6k0mJawvxaBFY5WPupB5Zc3X2yclksYrAfimz
Ld8ikUu1COTaO7PdRhbC0dBlGslifUK9V4XUfB/YySN8Qzsl4fpOLZgLCHSfOcls
uWq/XwXwKJ8QB9dY23RIrDtHPptg77WuHetf+z6uAI877OmYkHR2vBxQYmcXeL6w
8VjhZmJskP8IxNpyCCfUQSjGiAVQ/GWg1qPrNqP3fooVqu72LWKmNWj27VHT5zTY
SZLWxT4/T5d44HE8NzrH6PXRi2ZDyW6Qqomvnclo0XyihxQq9mug/7bvRk0LkynW
Hg3CUlOQp4/7CPqnZf7kP1mO+PNLALMGqDTutDjIBSXnI+zU6dEXousc8Ab1u+QM
9VOGjB3/K08=
=LBP3
—–END PGP SIGNATURE—–


RHSA-announce mailing list
RHSA-announce@redhat.com
https://protect2.fireeye.com/v1/url?k=99cd4c80-c651569e-99cad14c-000babd90757-36f2b272343fc119&q=1&e=7869ec6b-6c5e-4d6d-9039-7739b0938468&u=https%3A%2F%2Fwww.redhat.com%2Fmailman%2Flistinfo%2Frhsa-announce

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Important: kernel-rt security update
Advisory ID: RHSA-2020:4686-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:4686
Issue date: 2020-11-04
CVE Names: CVE-2020-24490 CVE-2020-25661 CVE-2020-25662
=====================================================================

1. Summary:

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Real Time (v. 8) – x86_64
Red Hat Enterprise Linux Real Time for NFV (v. 8) – x86_64

3. Description:

The kernel-rt packages provide the Real Time Linux Kernel, which enables
fine-tuning for systems with extremely high determinism requirements.

Security Fix(es):

* kernel: net: bluetooth: heap buffer overflow when processing extended
advertising report events (CVE-2020-24490)

* kernel: Red Hat only CVE-2020-12351 regression (CVE-2020-25661)

* kernel: Red Hat only CVE-2020-12352 regression (CVE-2020-25662)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1888449 – CVE-2020-24490 kernel: net: bluetooth: heap buffer overflow when processing extended advertising report events
1891483 – CVE-2020-25661 kernel: Red Hat only CVE-2020-12351 regression
1891484 – CVE-2020-25662 kernel: Red Hat only CVE-2020-12352 regression

6. Package List:

Red Hat Enterprise Linux Real Time for NFV (v. 8):

Source:
kernel-rt-4.18.0-240.1.1.rt7.55.el8_3.src.rpm

x86_64:
kernel-rt-4.18.0-240.1.1.rt7.55.el8_3.x86_64.rpm
kernel-rt-core-4.18.0-240.1.1.rt7.55.el8_3.x86_64.rpm
kernel-rt-debug-4.18.0-240.1.1.rt7.55.el8_3.x86_64.rpm
kernel-rt-debug-core-4.18.0-240.1.1.rt7.55.el8_3.x86_64.rpm
kernel-rt-debug-debuginfo-4.18.0-240.1.1.rt7.55.el8_3.x86_64.rpm
kernel-rt-debug-devel-4.18.0-240.1.1.rt7.55.el8_3.x86_64.rpm
kernel-rt-debug-kvm-4.18.0-240.1.1.rt7.55.el8_3.x86_64.rpm
kernel-rt-debug-modules-4.18.0-240.1.1.rt7.55.el8_3.x86_64.rpm
kernel-rt-debug-modules-extra-4.18.0-240.1.1.rt7.55.el8_3.x86_64.rpm
kernel-rt-debuginfo-4.18.0-240.1.1.rt7.55.el8_3.x86_64.rpm
kernel-rt-debuginfo-common-x86_64-4.18.0-240.1.1.rt7.55.el8_3.x86_64.rpm
kernel-rt-devel-4.18.0-240.1.1.rt7.55.el8_3.x86_64.rpm
kernel-rt-kvm-4.18.0-240.1.1.rt7.55.el8_3.x86_64.rpm
kernel-rt-modules-4.18.0-240.1.1.rt7.55.el8_3.x86_64.rpm
kernel-rt-modules-extra-4.18.0-240.1.1.rt7.55.el8_3.x86_64.rpm

Red Hat Enterprise Linux Real Time (v. 8):

Source:
kernel-rt-4.18.0-240.1.1.rt7.55.el8_3.src.rpm

x86_64:
kernel-rt-4.18.0-240.1.1.rt7.55.el8_3.x86_64.rpm
kernel-rt-core-4.18.0-240.1.1.rt7.55.el8_3.x86_64.rpm
kernel-rt-debug-4.18.0-240.1.1.rt7.55.el8_3.x86_64.rpm
kernel-rt-debug-core-4.18.0-240.1.1.rt7.55.el8_3.x86_64.rpm
kernel-rt-debug-debuginfo-4.18.0-240.1.1.rt7.55.el8_3.x86_64.rpm
kernel-rt-debug-devel-4.18.0-240.1.1.rt7.55.el8_3.x86_64.rpm
kernel-rt-debug-modules-4.18.0-240.1.1.rt7.55.el8_3.x86_64.rpm
kernel-rt-debug-modules-extra-4.18.0-240.1.1.rt7.55.el8_3.x86_64.rpm
kernel-rt-debuginfo-4.18.0-240.1.1.rt7.55.el8_3.x86_64.rpm
kernel-rt-debuginfo-common-x86_64-4.18.0-240.1.1.rt7.55.el8_3.x86_64.rpm
kernel-rt-devel-4.18.0-240.1.1.rt7.55.el8_3.x86_64.rpm
kernel-rt-modules-4.18.0-240.1.1.rt7.55.el8_3.x86_64.rpm
kernel-rt-modules-extra-4.18.0-240.1.1.rt7.55.el8_3.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2020-24490
https://access.redhat.com/security/cve/CVE-2020-25661
https://access.redhat.com/security/cve/CVE-2020-25662
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/security/vulnerabilities/BleedingTooth

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1

iQIVAwUBX6I1NNzjgjWX9erEAQgdWg//QzvQsRlm6ShrTbonr0u75p+LuhR3myib
vOZgnh0mEJF/wPgGcVgDrIQoUfW0NhdFvZ53dghVSS/XE6q0M56T9HbSzlB7m7nZ
wqDu+LTklBqGY4DptliOHr53FRKe2dKJofanNZ8ELGoxOSw1ZfPLy2rfgMEg2mRQ
2XrnzlixBa2zTt8aI3oLEG4LyaZkC04XBw33S65kGD/OwsZ67VtxVJjo3hYdnXZY
7JVfXyh9hS0g+Oi+/BNTnDjEEY+rO0zzZAM88Iy68gQRhIg016mbgyEonOVsKguj
BCteB/27iIlGjTt84psABXtqilZTqkzIUAn73IWC0zANaj4PFiqeOyza6qEk1AY6
XkoD55uMsxROKQwqPkGSN+khVcUss5F7TsYYQwHb3ctS3DR1yI6yHS6ntiAxC6Cv
PBRs9xOeXmfhqR4vrWbeLulTx2o4geh59deTLsDrmVnbwSNvHZEr9jgpbGDqaPte
Y8gDoU5+usB3rvUG0LTtiTAMFnPivIWx5pk1ZhqkjS8JikOoRsbo6KCFeO5kAr0Z
FM2N3tTocFio5qcuvdni7GN+qxxmdJ5LKDGJyBB52DonKSD9eCRb1okTKKed7lRn
gtOudr1cg4Q5pkyx6VFn+DKNRm5/mJs3oCVAu/Wq/1DMbfDutrwmMqeDutAedEKV
KTzbCJXTqw0=
=0J/O
—–END PGP SIGNATURE—–


RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: kernel security, bug fix, and enhancement update
Advisory ID: RHSA-2020:4431-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:4431
Issue date: 2020-11-03
CVE Names: CVE-2019-9455 CVE-2019-9458 CVE-2019-12614
CVE-2019-15917 CVE-2019-15925 CVE-2019-16231
CVE-2019-16233 CVE-2019-18808 CVE-2019-18809
CVE-2019-19046 CVE-2019-19056 CVE-2019-19062
CVE-2019-19063 CVE-2019-19068 CVE-2019-19072
CVE-2019-19319 CVE-2019-19332 CVE-2019-19447
CVE-2019-19524 CVE-2019-19533 CVE-2019-19537
CVE-2019-19543 CVE-2019-19767 CVE-2019-19770
CVE-2019-20054 CVE-2019-20636 CVE-2020-0305
CVE-2020-8647 CVE-2020-8648 CVE-2020-8649
CVE-2020-10732 CVE-2020-10751 CVE-2020-10773
CVE-2020-10774 CVE-2020-10942 CVE-2020-11565
CVE-2020-11668 CVE-2020-12465 CVE-2020-12655
CVE-2020-12659 CVE-2020-12770 CVE-2020-12826
CVE-2020-14381 CVE-2020-25641
=====================================================================

1. Summary:

An update for kernel is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat CodeReady Linux Builder (v. 8) – aarch64, ppc64le, x86_64
Red Hat Enterprise Linux BaseOS (v. 8) – aarch64, noarch, ppc64le, s390x, x86_64

3. Description:

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security Fix(es):

* kernel: use after free in the video driver leads to local privilege
escalation (CVE-2019-9458)

* kernel: use-after-free in drivers/bluetooth/hci_ldisc.c (CVE-2019-15917)

* kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg
(CVE-2019-15925)

* kernel: memory leak in ccp_run_sha_cmd() (CVE-2019-18808)

* kernel: Denial Of Service in the __ipmi_bmc_register() (CVE-2019-19046)

* kernel: out-of-bounds write in ext4_xattr_set_entry (CVE-2019-19319)

* Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid
(CVE-2019-19332)

* kernel: use-after-free in ext4_put_super (CVE-2019-19447)

* kernel: a malicious USB device in the drivers/input/ff-memless.c leads to
use-after-free (CVE-2019-19524)

* kernel: race condition caused by a malicious USB device in the USB
character device driver layer (CVE-2019-19537)

* kernel: use-after-free in serial_ir_init_module() (CVE-2019-19543)

* kernel: use-after-free in __ext4_expand_extra_isize and
ext4_xattr_set_entry (CVE-2019-19767)

* kernel: use-after-free in debugfs_remove (CVE-2019-19770)

* kernel: out-of-bounds write via crafted keycode table (CVE-2019-20636)

* kernel: possible use-after-free due to a race condition in cdev_get
(CVE-2020-0305)

* kernel: out-of-bounds read in in vc_do_resize function (CVE-2020-8647)

* kernel: use-after-free in n_tty_receive_buf_common function
(CVE-2020-8648)

* kernel: invalid read location in vgacon_invert_region function
(CVE-2020-8649)

* kernel: uninitialized kernel data leak in userspace coredumps
(CVE-2020-10732)

* kernel: SELinux netlink permission check bypass (CVE-2020-10751)

* kernel: out-of-bounds write in mpol_parse_str (CVE-2020-11565)

* kernel: mishandles invalid descriptors in
drivers/media/usb/gspca/xirlink_cit.c (CVE-2020-11668)

* kernel: buffer overflow in mt76_add_fragment function (CVE-2020-12465)

* kernel: xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write
which could result in crash and data coruption (CVE-2020-12659)

* kernel: sg_write function lacks an sg_remove_request call in a certain
failure case (CVE-2020-12770)

* kernel: possible to send arbitrary signals to a privileged (suidroot)
parent process (CVE-2020-12826)

* kernel: referencing inode of removed superblock in get_futex_key() causes
UAF (CVE-2020-14381)

* kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in
DoS (CVE-2020-25641)

* kernel: kernel pointer leak due to WARN_ON statement in video driver
leads to local information disclosure (CVE-2019-9455)

* kernel: null pointer dereference in dlpar_parse_cc_property
(CVE-2019-12614)

* kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c
(CVE-2019-16231)

* kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c
(CVE-2019-16233)

* kernel: memory leak in af9005_identify_state() function (CVE-2019-18809)

* kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function
(CVE-2019-19056)

* kernel: memory leak in the crypto_report() function (CVE-2019-19062)

* kernel: Two memory leaks in the rtl_usb_probe() function (CVE-2019-19063)

* kernel: A memory leak in the rtl8xxxu_submit_int_urb() function
(CVE-2019-19068)

* kernel: A memory leak in the predicate_parse() function (CVE-2019-19072)

* kernel: information leak bug caused by a malicious USB device in the
drivers/media/usb/ttusb-dec/ttusb_dec.c (CVE-2019-19533)

* kernel: Null pointer dereference in drop_sysctl_table() (CVE-2019-20054)

* kernel: kernel stack information leak on s390/s390x (CVE-2020-10773)

* kernel: possibility of memory disclosure when reading the file
/proc/sys/kernel/rh_features (CVE-2020-10774)

* kernel: vhost-net: stack overflow in get_raw_socket while checking
sk_family field (CVE-2020-10942)

* kernel: sync of excessive duration via an XFS v5 image with crafted
metadata (CVE-2020-12655)

4. Solution:

For detailed information on changes in this release, see the Red Hat
Enterprise Linux 8.3 Release Notes linked from the References section.

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1660798 – NFSv4.2: security label of mount point shows as “unlabeled_t” for ~30 seconds after mounting
1718176 – CVE-2019-12614 kernel: null pointer dereference in dlpar_parse_cc_property in arch/powerrc/platforms/pseries/dlpar.c causing denial of service
1759052 – CVE-2019-15925 kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg
1760100 – CVE-2019-15917 kernel: use-after-free in drivers/bluetooth/hci_ldisc.c
1760310 – CVE-2019-16231 kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c
1760420 – CVE-2019-16233 kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c
1774946 – CVE-2019-19072 kernel: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c allows for a DoS
1774963 – CVE-2019-19068 kernel: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c allows for a DoS
1774988 – CVE-2019-19046 kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c
1775015 – CVE-2019-19063 kernel: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c allow for a DoS
1775021 – CVE-2019-19062 kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS
1775097 – CVE-2019-19056 kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows to cause DoS
1777418 – CVE-2019-18808 kernel: memory leak in ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c
1777449 – CVE-2019-18809 kernel: memory leak in af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c
1778762 – Please backport Jitter Entropy patches
1779594 – CVE-2019-19332 Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid
1781679 – CVE-2019-19447 kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c
1781810 – CVE-2019-19543 kernel: use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c
1783459 – CVE-2019-19524 kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free
1783534 – CVE-2019-19533 kernel: information leak bug caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c
1783561 – CVE-2019-19537 kernel: race condition caused by a malicious USB device in the USB character device driver layer
1784130 – CVE-2019-19319 kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c
1786160 – CVE-2019-19767 kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry related to fs/ext4/inode.c and fs/ext4/super.c
1786179 – CVE-2019-19770 kernel: use-after-free in debugfs_remove in fs/debugfs/inode.c
1790063 – CVE-2019-20054 kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c
1802555 – CVE-2020-8649 kernel: invalid read location in vgacon_invert_region function in drivers/video/console/vgacon.c
1802559 – CVE-2020-8648 kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c
1802563 – CVE-2020-8647 kernel: out-of-bounds read in in vc_do_resize function in drivers/tty/vt/vt.c
1817718 – CVE-2020-10942 kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field
1819377 – CVE-2019-9458 kernel: use after free due to race condition in the video driver leads to local privilege escalation
1819399 – CVE-2019-9455 kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure
1820402 – Sometimes hit “error: kvm run failed Bad address” when launching a guest on Power8
1822077 – CVE-2020-12826 kernel: possible to send arbitrary signals to a privileged (suidroot) parent process
1823764 – RFE: Enable genfs+xattr labeling for CephFS
1824059 – CVE-2019-20636 kernel: out-of-bounds write via crafted keycode table
1824792 – CVE-2020-11668 kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c
1824918 – CVE-2020-11565 kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c
1830280 – Please enable CONFIG_RANDOM_TRUST_CPU
1831399 – CVE-2020-10732 kernel: uninitialized kernel data leak in userspace coredumps
1831699 – CVE-2020-12465 kernel: buffer overflow in mt76_add_fragment function in drivers/net/wireless/mediatek/mt76/dma.c
1832543 – CVE-2020-12655 kernel: sync of excessive duration via an XFS v5 image with crafted metadata
1832876 – CVE-2020-12659 kernel: xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write which could result in crash and data coruption
1834845 – CVE-2020-12770 kernel: sg_write function lacks an sg_remove_request call in a certain failure case
1839634 – CVE-2020-10751 kernel: SELinux netlink permission check bypass
1844520 – Incorrect pinning of IRQ threads on isolated CPUs by drivers that use cpumask_local_spread()
1846380 – CVE-2020-10773 kernel: kernel stack information leak on s390/s390x
1846964 – CVE-2020-10774 kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features
1853447 – Guest IA32_SPEC_CTRL wrmsr failure on AMD processors that support STIBP but don’t support for IBRS
1856588 – Guest crashed and hung when hot unplug vcpus
1860065 – CVE-2020-0305 kernel: possible use-after-free due to a race condition in cdev_get of char_dev.c
1874311 – CVE-2020-14381 kernel: referencing inode of removed superblock in get_futex_key() causes UAF
1881424 – CVE-2020-25641 kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS

6. Package List:

Red Hat Enterprise Linux BaseOS (v. 8):

Source:
kernel-4.18.0-240.el8.src.rpm

aarch64:
bpftool-4.18.0-240.el8.aarch64.rpm
bpftool-debuginfo-4.18.0-240.el8.aarch64.rpm
kernel-4.18.0-240.el8.aarch64.rpm
kernel-core-4.18.0-240.el8.aarch64.rpm
kernel-cross-headers-4.18.0-240.el8.aarch64.rpm
kernel-debug-4.18.0-240.el8.aarch64.rpm
kernel-debug-core-4.18.0-240.el8.aarch64.rpm
kernel-debug-debuginfo-4.18.0-240.el8.aarch64.rpm
kernel-debug-devel-4.18.0-240.el8.aarch64.rpm
kernel-debug-modules-4.18.0-240.el8.aarch64.rpm
kernel-debug-modules-extra-4.18.0-240.el8.aarch64.rpm
kernel-debuginfo-4.18.0-240.el8.aarch64.rpm
kernel-debuginfo-common-aarch64-4.18.0-240.el8.aarch64.rpm
kernel-devel-4.18.0-240.el8.aarch64.rpm
kernel-headers-4.18.0-240.el8.aarch64.rpm
kernel-modules-4.18.0-240.el8.aarch64.rpm
kernel-modules-extra-4.18.0-240.el8.aarch64.rpm
kernel-tools-4.18.0-240.el8.aarch64.rpm
kernel-tools-debuginfo-4.18.0-240.el8.aarch64.rpm
kernel-tools-libs-4.18.0-240.el8.aarch64.rpm
perf-4.18.0-240.el8.aarch64.rpm
perf-debuginfo-4.18.0-240.el8.aarch64.rpm
python3-perf-4.18.0-240.el8.aarch64.rpm
python3-perf-debuginfo-4.18.0-240.el8.aarch64.rpm

noarch:
kernel-abi-whitelists-4.18.0-240.el8.noarch.rpm
kernel-doc-4.18.0-240.el8.noarch.rpm

ppc64le:
bpftool-4.18.0-240.el8.ppc64le.rpm
bpftool-debuginfo-4.18.0-240.el8.ppc64le.rpm
kernel-4.18.0-240.el8.ppc64le.rpm
kernel-core-4.18.0-240.el8.ppc64le.rpm
kernel-cross-headers-4.18.0-240.el8.ppc64le.rpm
kernel-debug-4.18.0-240.el8.ppc64le.rpm
kernel-debug-core-4.18.0-240.el8.ppc64le.rpm
kernel-debug-debuginfo-4.18.0-240.el8.ppc64le.rpm
kernel-debug-devel-4.18.0-240.el8.ppc64le.rpm
kernel-debug-modules-4.18.0-240.el8.ppc64le.rpm
kernel-debug-modules-extra-4.18.0-240.el8.ppc64le.rpm
kernel-debuginfo-4.18.0-240.el8.ppc64le.rpm
kernel-debuginfo-common-ppc64le-4.18.0-240.el8.ppc64le.rpm
kernel-devel-4.18.0-240.el8.ppc64le.rpm
kernel-headers-4.18.0-240.el8.ppc64le.rpm
kernel-modules-4.18.0-240.el8.ppc64le.rpm
kernel-modules-extra-4.18.0-240.el8.ppc64le.rpm
kernel-tools-4.18.0-240.el8.ppc64le.rpm
kernel-tools-debuginfo-4.18.0-240.el8.ppc64le.rpm
kernel-tools-libs-4.18.0-240.el8.ppc64le.rpm
perf-4.18.0-240.el8.ppc64le.rpm
perf-debuginfo-4.18.0-240.el8.ppc64le.rpm
python3-perf-4.18.0-240.el8.ppc64le.rpm
python3-perf-debuginfo-4.18.0-240.el8.ppc64le.rpm

s390x:
bpftool-4.18.0-240.el8.s390x.rpm
bpftool-debuginfo-4.18.0-240.el8.s390x.rpm
kernel-4.18.0-240.el8.s390x.rpm
kernel-core-4.18.0-240.el8.s390x.rpm
kernel-cross-headers-4.18.0-240.el8.s390x.rpm
kernel-debug-4.18.0-240.el8.s390x.rpm
kernel-debug-core-4.18.0-240.el8.s390x.rpm
kernel-debug-debuginfo-4.18.0-240.el8.s390x.rpm
kernel-debug-devel-4.18.0-240.el8.s390x.rpm
kernel-debug-modules-4.18.0-240.el8.s390x.rpm
kernel-debug-modules-extra-4.18.0-240.el8.s390x.rpm
kernel-debuginfo-4.18.0-240.el8.s390x.rpm
kernel-debuginfo-common-s390x-4.18.0-240.el8.s390x.rpm
kernel-devel-4.18.0-240.el8.s390x.rpm
kernel-headers-4.18.0-240.el8.s390x.rpm
kernel-modules-4.18.0-240.el8.s390x.rpm
kernel-modules-extra-4.18.0-240.el8.s390x.rpm
kernel-tools-4.18.0-240.el8.s390x.rpm
kernel-tools-debuginfo-4.18.0-240.el8.s390x.rpm
kernel-zfcpdump-4.18.0-240.el8.s390x.rpm
kernel-zfcpdump-core-4.18.0-240.el8.s390x.rpm
kernel-zfcpdump-debuginfo-4.18.0-240.el8.s390x.rpm
kernel-zfcpdump-devel-4.18.0-240.el8.s390x.rpm
kernel-zfcpdump-modules-4.18.0-240.el8.s390x.rpm
kernel-zfcpdump-modules-extra-4.18.0-240.el8.s390x.rpm
perf-4.18.0-240.el8.s390x.rpm
perf-debuginfo-4.18.0-240.el8.s390x.rpm
python3-perf-4.18.0-240.el8.s390x.rpm
python3-perf-debuginfo-4.18.0-240.el8.s390x.rpm

x86_64:
bpftool-4.18.0-240.el8.x86_64.rpm
bpftool-debuginfo-4.18.0-240.el8.x86_64.rpm
kernel-4.18.0-240.el8.x86_64.rpm
kernel-core-4.18.0-240.el8.x86_64.rpm
kernel-cross-headers-4.18.0-240.el8.x86_64.rpm
kernel-debug-4.18.0-240.el8.x86_64.rpm
kernel-debug-core-4.18.0-240.el8.x86_64.rpm
kernel-debug-debuginfo-4.18.0-240.el8.x86_64.rpm
kernel-debug-devel-4.18.0-240.el8.x86_64.rpm
kernel-debug-modules-4.18.0-240.el8.x86_64.rpm
kernel-debug-modules-extra-4.18.0-240.el8.x86_64.rpm
kernel-debuginfo-4.18.0-240.el8.x86_64.rpm
kernel-debuginfo-common-x86_64-4.18.0-240.el8.x86_64.rpm
kernel-devel-4.18.0-240.el8.x86_64.rpm
kernel-headers-4.18.0-240.el8.x86_64.rpm
kernel-modules-4.18.0-240.el8.x86_64.rpm
kernel-modules-extra-4.18.0-240.el8.x86_64.rpm
kernel-tools-4.18.0-240.el8.x86_64.rpm
kernel-tools-debuginfo-4.18.0-240.el8.x86_64.rpm
kernel-tools-libs-4.18.0-240.el8.x86_64.rpm
perf-4.18.0-240.el8.x86_64.rpm
perf-debuginfo-4.18.0-240.el8.x86_64.rpm
python3-perf-4.18.0-240.el8.x86_64.rpm
python3-perf-debuginfo-4.18.0-240.el8.x86_64.rpm

Red Hat CodeReady Linux Builder (v. 8):

aarch64:
bpftool-debuginfo-4.18.0-240.el8.aarch64.rpm
kernel-debug-debuginfo-4.18.0-240.el8.aarch64.rpm
kernel-debuginfo-4.18.0-240.el8.aarch64.rpm
kernel-debuginfo-common-aarch64-4.18.0-240.el8.aarch64.rpm
kernel-tools-debuginfo-4.18.0-240.el8.aarch64.rpm
kernel-tools-libs-devel-4.18.0-240.el8.aarch64.rpm
perf-debuginfo-4.18.0-240.el8.aarch64.rpm
python3-perf-debuginfo-4.18.0-240.el8.aarch64.rpm

ppc64le:
bpftool-debuginfo-4.18.0-240.el8.ppc64le.rpm
kernel-debug-debuginfo-4.18.0-240.el8.ppc64le.rpm
kernel-debuginfo-4.18.0-240.el8.ppc64le.rpm
kernel-debuginfo-common-ppc64le-4.18.0-240.el8.ppc64le.rpm
kernel-tools-debuginfo-4.18.0-240.el8.ppc64le.rpm
kernel-tools-libs-devel-4.18.0-240.el8.ppc64le.rpm
perf-debuginfo-4.18.0-240.el8.ppc64le.rpm
python3-perf-debuginfo-4.18.0-240.el8.ppc64le.rpm

x86_64:
bpftool-debuginfo-4.18.0-240.el8.x86_64.rpm
kernel-debug-debuginfo-4.18.0-240.el8.x86_64.rpm
kernel-debuginfo-4.18.0-240.el8.x86_64.rpm
kernel-debuginfo-common-x86_64-4.18.0-240.el8.x86_64.rpm
kernel-tools-debuginfo-4.18.0-240.el8.x86_64.rpm
kernel-tools-libs-devel-4.18.0-240.el8.x86_64.rpm
perf-debuginfo-4.18.0-240.el8.x86_64.rpm
python3-perf-debuginfo-4.18.0-240.el8.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-9455
https://access.redhat.com/security/cve/CVE-2019-9458
https://access.redhat.com/security/cve/CVE-2019-12614
https://access.redhat.com/security/cve/CVE-2019-15917
https://access.redhat.com/security/cve/CVE-2019-15925
https://access.redhat.com/security/cve/CVE-2019-16231
https://access.redhat.com/security/cve/CVE-2019-16233
https://access.redhat.com/security/cve/CVE-2019-18808
https://access.redhat.com/security/cve/CVE-2019-18809
https://access.redhat.com/security/cve/CVE-2019-19046
https://access.redhat.com/security/cve/CVE-2019-19056
https://access.redhat.com/security/cve/CVE-2019-19062
https://access.redhat.com/security/cve/CVE-2019-19063
https://access.redhat.com/security/cve/CVE-2019-19068
https://access.redhat.com/security/cve/CVE-2019-19072
https://access.redhat.com/security/cve/CVE-2019-19319
https://access.redhat.com/security/cve/CVE-2019-19332
https://access.redhat.com/security/cve/CVE-2019-19447
https://access.redhat.com/security/cve/CVE-2019-19524
https://access.redhat.com/security/cve/CVE-2019-19533
https://access.redhat.com/security/cve/CVE-2019-19537
https://access.redhat.com/security/cve/CVE-2019-19543
https://access.redhat.com/security/cve/CVE-2019-19767
https://access.redhat.com/security/cve/CVE-2019-19770
https://access.redhat.com/security/cve/CVE-2019-20054
https://access.redhat.com/security/cve/CVE-2019-20636
https://access.redhat.com/security/cve/CVE-2020-0305
https://access.redhat.com/security/cve/CVE-2020-8647
https://access.redhat.com/security/cve/CVE-2020-8648
https://access.redhat.com/security/cve/CVE-2020-8649
https://access.redhat.com/security/cve/CVE-2020-10732
https://access.redhat.com/security/cve/CVE-2020-10751
https://access.redhat.com/security/cve/CVE-2020-10773
https://access.redhat.com/security/cve/CVE-2020-10774
https://access.redhat.com/security/cve/CVE-2020-10942
https://access.redhat.com/security/cve/CVE-2020-11565
https://protect2.fireeye.com/v1/url?k=a4724815-fbee520b-a475d5d9-000babd90757-f1ad31ab1ca38939&q=1&e=d4c24d53-13eb-419f-ad11-c273070515ac&u=https%3A%2F%2Faccess.redhat.com%2Fsecurity%2Fcve%2FCVE-2020-11668
https://protect2.fireeye.com/v1/url?k=5025ee55-0fb9f44b-50227399-000babd90757-762bdef1f206657c&q=1&e=d4c24d53-13eb-419f-ad11-c273070515ac&u=https%3A%2F%2Faccess.redhat.com%2Fsecurity%2Fcve%2FCVE-2020-12465
https://protect2.fireeye.com/v1/url?k=3d9fc4fd-6203dee3-3d985931-000babd90757-762f07207448e60d&q=1&e=d4c24d53-13eb-419f-ad11-c273070515ac&u=https%3A%2F%2Faccess.redhat.com%2Fsecurity%2Fcve%2FCVE-2020-12655
https://protect2.fireeye.com/v1/url?k=3644d26e-69d8c870-36434fa2-000babd90757-cb9b758c0bdfa324&q=1&e=d4c24d53-13eb-419f-ad11-c273070515ac&u=https%3A%2F%2Faccess.redhat.com%2Fsecurity%2Fcve%2FCVE-2020-12659
https://protect2.fireeye.com/v1/url?k=d73d6198-88a17b86-d73afc54-000babd90757-45ed4bb2b1fc6ce4&q=1&e=d4c24d53-13eb-419f-ad11-c273070515ac&u=https%3A%2F%2Faccess.redhat.com%2Fsecurity%2Fcve%2FCVE-2020-12770
https://protect2.fireeye.com/v1/url?k=8aeaf9f6-d576e3e8-8aed643a-000babd90757-224c144f69dcb998&q=1&e=d4c24d53-13eb-419f-ad11-c273070515ac&u=https%3A%2F%2Faccess.redhat.com%2Fsecurity%2Fcve%2FCVE-2020-12826
https://protect2.fireeye.com/v1/url?k=161b28c6-498732d8-161cb50a-000babd90757-843d7025f7d0edcf&q=1&e=d4c24d53-13eb-419f-ad11-c273070515ac&u=https%3A%2F%2Faccess.redhat.com%2Fsecurity%2Fcve%2FCVE-2020-14381
https://protect2.fireeye.com/v1/url?k=7fa56a5f-20397041-7fa2f793-000babd90757-29ee99db823cc915&q=1&e=d4c24d53-13eb-419f-ad11-c273070515ac&u=https%3A%2F%2Faccess.redhat.com%2Fsecurity%2Fcve%2FCVE-2020-25641
https://protect2.fireeye.com/v1/url?k=25cb7aef-7a5760f1-25cce723-000babd90757-b55c9068236dea3b&q=1&e=d4c24d53-13eb-419f-ad11-c273070515ac&u=https%3A%2F%2Faccess.redhat.com%2Fsecurity%2Fupdates%2Fclassification%2F%23moderate
https://protect2.fireeye.com/v1/url?k=dcead00e-8376ca10-dced4dc2-000babd90757-c9903e72e2ec00f0&q=1&e=d4c24d53-13eb-419f-ad11-c273070515ac&u=https%3A%2F%2Faccess.redhat.com%2Fdocumentation%2Fen-us%2Fred_hat_enterprise_linux%2F8%2Fhtml%2F8.3_release_notes%2Findex

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://protect2.fireeye.com/v1/url?k=81b29a36-de2e8028-81b507fa-000babd90757-0b65446e94e47589&q=1&e=d4c24d53-13eb-419f-ad11-c273070515ac&u=https%3A%2F%2Faccess.redhat.com%2Fsecurity%2Fteam%2Fcontact%2F

Copyright 2020 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1

iQIVAwUBX6Iw6tzjgjWX9erEAQi7jhAAqAD5idr03mUL/Nl0AwEHPknqIPF47O1v
m7oVULhBTXqJSPeitjYyS6caTXOmDru9kYcN+Mw13dH5migTiBZ4lu6NINxc+G43
5cBZq6K1ikQyTHDB4JDHZOA04wgNoxCPpKx1bYwuSP+Zqpp/NgvrnZucJ0ypr5L5
I3X0Pim9bJnQvBLrbbds8txxT3PhwwG61/Rqu4fDwI2+yooEGV0q/Hy0M6rdPMtH
7R/mp/kNwenx/qzlrw2kruzZ1NWs14bPic5oNHp9Xy36KuAB15zvvO4Z4N/Da746
4QY/QZgfRbnTyl3lGbWuF5hScDq6Ahnvjmhf5KKN68nikU8kDndBpTWnQz1/O0wU
+dUbDfQerQiwh+8QgJVLnzovAJR3DRa0SQ2mbgb6JT49unE/+6/bK1L/IXAIrWh5
6Upyr/X1YZ8n54Gu9Qj0iE59UzWp7bZCkGtyFWX0Lw5YWYCMdmmmKKzlZGI8dnXr
TByVyEoDwhEhu5zLib4z4kXdcy49vqWhwhMXlbjW75NQZjQOuki6M+N/utW217Mt
PwWJ/rRcwIiP5WtBrhXlk++EfifE2JbczbdjPFN54t0rAR+9ToOipueXGO4VBM35
gjYAs5mfsjI4+Z+gVklBKRpneo0OF3QE+uYpZINkOTX0iSRhMb7wHVdIbBD++7k9
fUncNDMm2kw=
=uR38
—–END PGP SIGNATURE—–


RHSA-announce mailing list
RHSA-announce@redhat.com
https://protect2.fireeye.com/v1/url?k=fc7cfd29-a3e0e737-fc7b60e5-000babd90757-9d0ecc832a15a2f6&q=1&e=d4c24d53-13eb-419f-ad11-c273070515ac&u=https%3A%2F%2Fwww.redhat.com%2Fmailman%2Flistinfo%2Frhsa-announce

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Important: kernel security update
Advisory ID: RHSA-2020:4685-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:4685
Issue date: 2020-11-04
CVE Names: CVE-2020-24490 CVE-2020-25661 CVE-2020-25662
=====================================================================

1. Summary:

An update for kernel is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat CodeReady Linux Builder (v. 8) – aarch64, ppc64le, x86_64
Red Hat Enterprise Linux BaseOS (v. 8) – aarch64, noarch, ppc64le, s390x, x86_64

3. Description:

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security Fix(es):

* kernel: net: bluetooth: heap buffer overflow when processing extended
advertising report events (CVE-2020-24490)

* kernel: Red Hat only CVE-2020-12351 regression (CVE-2020-25661)

* kernel: Red Hat only CVE-2020-12352 regression (CVE-2020-25662)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1888449 – CVE-2020-24490 kernel: net: bluetooth: heap buffer overflow when processing extended advertising report events
1891483 – CVE-2020-25661 kernel: Red Hat only CVE-2020-12351 regression
1891484 – CVE-2020-25662 kernel: Red Hat only CVE-2020-12352 regression

6. Package List:

Red Hat Enterprise Linux BaseOS (v. 8):

Source:
kernel-4.18.0-240.1.1.el8_3.src.rpm

aarch64:
bpftool-4.18.0-240.1.1.el8_3.aarch64.rpm
bpftool-debuginfo-4.18.0-240.1.1.el8_3.aarch64.rpm
kernel-4.18.0-240.1.1.el8_3.aarch64.rpm
kernel-core-4.18.0-240.1.1.el8_3.aarch64.rpm
kernel-cross-headers-4.18.0-240.1.1.el8_3.aarch64.rpm
kernel-debug-4.18.0-240.1.1.el8_3.aarch64.rpm
kernel-debug-core-4.18.0-240.1.1.el8_3.aarch64.rpm
kernel-debug-debuginfo-4.18.0-240.1.1.el8_3.aarch64.rpm
kernel-debug-devel-4.18.0-240.1.1.el8_3.aarch64.rpm
kernel-debug-modules-4.18.0-240.1.1.el8_3.aarch64.rpm
kernel-debug-modules-extra-4.18.0-240.1.1.el8_3.aarch64.rpm
kernel-debuginfo-4.18.0-240.1.1.el8_3.aarch64.rpm
kernel-debuginfo-common-aarch64-4.18.0-240.1.1.el8_3.aarch64.rpm
kernel-devel-4.18.0-240.1.1.el8_3.aarch64.rpm
kernel-headers-4.18.0-240.1.1.el8_3.aarch64.rpm
kernel-modules-4.18.0-240.1.1.el8_3.aarch64.rpm
kernel-modules-extra-4.18.0-240.1.1.el8_3.aarch64.rpm
kernel-tools-4.18.0-240.1.1.el8_3.aarch64.rpm
kernel-tools-debuginfo-4.18.0-240.1.1.el8_3.aarch64.rpm
kernel-tools-libs-4.18.0-240.1.1.el8_3.aarch64.rpm
perf-4.18.0-240.1.1.el8_3.aarch64.rpm
perf-debuginfo-4.18.0-240.1.1.el8_3.aarch64.rpm
python3-perf-4.18.0-240.1.1.el8_3.aarch64.rpm
python3-perf-debuginfo-4.18.0-240.1.1.el8_3.aarch64.rpm

noarch:
kernel-abi-whitelists-4.18.0-240.1.1.el8_3.noarch.rpm
kernel-doc-4.18.0-240.1.1.el8_3.noarch.rpm

ppc64le:
bpftool-4.18.0-240.1.1.el8_3.ppc64le.rpm
bpftool-debuginfo-4.18.0-240.1.1.el8_3.ppc64le.rpm
kernel-4.18.0-240.1.1.el8_3.ppc64le.rpm
kernel-core-4.18.0-240.1.1.el8_3.ppc64le.rpm
kernel-cross-headers-4.18.0-240.1.1.el8_3.ppc64le.rpm
kernel-debug-4.18.0-240.1.1.el8_3.ppc64le.rpm
kernel-debug-core-4.18.0-240.1.1.el8_3.ppc64le.rpm
kernel-debug-debuginfo-4.18.0-240.1.1.el8_3.ppc64le.rpm
kernel-debug-devel-4.18.0-240.1.1.el8_3.ppc64le.rpm
kernel-debug-modules-4.18.0-240.1.1.el8_3.ppc64le.rpm
kernel-debug-modules-extra-4.18.0-240.1.1.el8_3.ppc64le.rpm
kernel-debuginfo-4.18.0-240.1.1.el8_3.ppc64le.rpm
kernel-debuginfo-common-ppc64le-4.18.0-240.1.1.el8_3.ppc64le.rpm
kernel-devel-4.18.0-240.1.1.el8_3.ppc64le.rpm
kernel-headers-4.18.0-240.1.1.el8_3.ppc64le.rpm
kernel-modules-4.18.0-240.1.1.el8_3.ppc64le.rpm
kernel-modules-extra-4.18.0-240.1.1.el8_3.ppc64le.rpm
kernel-tools-4.18.0-240.1.1.el8_3.ppc64le.rpm
kernel-tools-debuginfo-4.18.0-240.1.1.el8_3.ppc64le.rpm
kernel-tools-libs-4.18.0-240.1.1.el8_3.ppc64le.rpm
perf-4.18.0-240.1.1.el8_3.ppc64le.rpm
perf-debuginfo-4.18.0-240.1.1.el8_3.ppc64le.rpm
python3-perf-4.18.0-240.1.1.el8_3.ppc64le.rpm
python3-perf-debuginfo-4.18.0-240.1.1.el8_3.ppc64le.rpm

s390x:
bpftool-4.18.0-240.1.1.el8_3.s390x.rpm
bpftool-debuginfo-4.18.0-240.1.1.el8_3.s390x.rpm
kernel-4.18.0-240.1.1.el8_3.s390x.rpm
kernel-core-4.18.0-240.1.1.el8_3.s390x.rpm
kernel-cross-headers-4.18.0-240.1.1.el8_3.s390x.rpm
kernel-debug-4.18.0-240.1.1.el8_3.s390x.rpm
kernel-debug-core-4.18.0-240.1.1.el8_3.s390x.rpm
kernel-debug-debuginfo-4.18.0-240.1.1.el8_3.s390x.rpm
kernel-debug-devel-4.18.0-240.1.1.el8_3.s390x.rpm
kernel-debug-modules-4.18.0-240.1.1.el8_3.s390x.rpm
kernel-debug-modules-extra-4.18.0-240.1.1.el8_3.s390x.rpm
kernel-debuginfo-4.18.0-240.1.1.el8_3.s390x.rpm
kernel-debuginfo-common-s390x-4.18.0-240.1.1.el8_3.s390x.rpm
kernel-devel-4.18.0-240.1.1.el8_3.s390x.rpm
kernel-headers-4.18.0-240.1.1.el8_3.s390x.rpm
kernel-modules-4.18.0-240.1.1.el8_3.s390x.rpm
kernel-modules-extra-4.18.0-240.1.1.el8_3.s390x.rpm
kernel-tools-4.18.0-240.1.1.el8_3.s390x.rpm
kernel-tools-debuginfo-4.18.0-240.1.1.el8_3.s390x.rpm
kernel-zfcpdump-4.18.0-240.1.1.el8_3.s390x.rpm
kernel-zfcpdump-core-4.18.0-240.1.1.el8_3.s390x.rpm
kernel-zfcpdump-debuginfo-4.18.0-240.1.1.el8_3.s390x.rpm
kernel-zfcpdump-devel-4.18.0-240.1.1.el8_3.s390x.rpm
kernel-zfcpdump-modules-4.18.0-240.1.1.el8_3.s390x.rpm
kernel-zfcpdump-modules-extra-4.18.0-240.1.1.el8_3.s390x.rpm
perf-4.18.0-240.1.1.el8_3.s390x.rpm
perf-debuginfo-4.18.0-240.1.1.el8_3.s390x.rpm
python3-perf-4.18.0-240.1.1.el8_3.s390x.rpm
python3-perf-debuginfo-4.18.0-240.1.1.el8_3.s390x.rpm

x86_64:
bpftool-4.18.0-240.1.1.el8_3.x86_64.rpm
bpftool-debuginfo-4.18.0-240.1.1.el8_3.x86_64.rpm
kernel-4.18.0-240.1.1.el8_3.x86_64.rpm
kernel-core-4.18.0-240.1.1.el8_3.x86_64.rpm
kernel-cross-headers-4.18.0-240.1.1.el8_3.x86_64.rpm
kernel-debug-4.18.0-240.1.1.el8_3.x86_64.rpm
kernel-debug-core-4.18.0-240.1.1.el8_3.x86_64.rpm
kernel-debug-debuginfo-4.18.0-240.1.1.el8_3.x86_64.rpm
kernel-debug-devel-4.18.0-240.1.1.el8_3.x86_64.rpm
kernel-debug-modules-4.18.0-240.1.1.el8_3.x86_64.rpm
kernel-debug-modules-extra-4.18.0-240.1.1.el8_3.x86_64.rpm
kernel-debuginfo-4.18.0-240.1.1.el8_3.x86_64.rpm
kernel-debuginfo-common-x86_64-4.18.0-240.1.1.el8_3.x86_64.rpm
kernel-devel-4.18.0-240.1.1.el8_3.x86_64.rpm
kernel-headers-4.18.0-240.1.1.el8_3.x86_64.rpm
kernel-modules-4.18.0-240.1.1.el8_3.x86_64.rpm
kernel-modules-extra-4.18.0-240.1.1.el8_3.x86_64.rpm
kernel-tools-4.18.0-240.1.1.el8_3.x86_64.rpm
kernel-tools-debuginfo-4.18.0-240.1.1.el8_3.x86_64.rpm
kernel-tools-libs-4.18.0-240.1.1.el8_3.x86_64.rpm
perf-4.18.0-240.1.1.el8_3.x86_64.rpm
perf-debuginfo-4.18.0-240.1.1.el8_3.x86_64.rpm
python3-perf-4.18.0-240.1.1.el8_3.x86_64.rpm
python3-perf-debuginfo-4.18.0-240.1.1.el8_3.x86_64.rpm

Red Hat CodeReady Linux Builder (v. 8):

aarch64:
bpftool-debuginfo-4.18.0-240.1.1.el8_3.aarch64.rpm
kernel-debug-debuginfo-4.18.0-240.1.1.el8_3.aarch64.rpm
kernel-debuginfo-4.18.0-240.1.1.el8_3.aarch64.rpm
kernel-debuginfo-common-aarch64-4.18.0-240.1.1.el8_3.aarch64.rpm
kernel-tools-debuginfo-4.18.0-240.1.1.el8_3.aarch64.rpm
kernel-tools-libs-devel-4.18.0-240.1.1.el8_3.aarch64.rpm
perf-debuginfo-4.18.0-240.1.1.el8_3.aarch64.rpm
python3-perf-debuginfo-4.18.0-240.1.1.el8_3.aarch64.rpm

ppc64le:
bpftool-debuginfo-4.18.0-240.1.1.el8_3.ppc64le.rpm
kernel-debug-debuginfo-4.18.0-240.1.1.el8_3.ppc64le.rpm
kernel-debuginfo-4.18.0-240.1.1.el8_3.ppc64le.rpm
kernel-debuginfo-common-ppc64le-4.18.0-240.1.1.el8_3.ppc64le.rpm
kernel-tools-debuginfo-4.18.0-240.1.1.el8_3.ppc64le.rpm
kernel-tools-libs-devel-4.18.0-240.1.1.el8_3.ppc64le.rpm
perf-debuginfo-4.18.0-240.1.1.el8_3.ppc64le.rpm
python3-perf-debuginfo-4.18.0-240.1.1.el8_3.ppc64le.rpm

x86_64:
bpftool-debuginfo-4.18.0-240.1.1.el8_3.x86_64.rpm
kernel-debug-debuginfo-4.18.0-240.1.1.el8_3.x86_64.rpm
kernel-debuginfo-4.18.0-240.1.1.el8_3.x86_64.rpm
kernel-debuginfo-common-x86_64-4.18.0-240.1.1.el8_3.x86_64.rpm
kernel-tools-debuginfo-4.18.0-240.1.1.el8_3.x86_64.rpm
kernel-tools-libs-devel-4.18.0-240.1.1.el8_3.x86_64.rpm
perf-debuginfo-4.18.0-240.1.1.el8_3.x86_64.rpm
python3-perf-debuginfo-4.18.0-240.1.1.el8_3.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2020-24490
https://access.redhat.com/security/cve/CVE-2020-25661
https://access.redhat.com/security/cve/CVE-2020-25662
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/security/vulnerabilities/BleedingTooth

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=Z49d
—–END PGP SIGNATURE—–


RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

Top
More in Preporuke
Sigurnosni nedostatak programa bluez

Otkriven je sigurnosni nedostatak u programskom paketu bluez za operacijski sustav RHEL. Otkriveni nedostatak potencijalnim napadačima omogućuje stjecanje uvećanih ovlasti...

Close