Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2020.2180 kernel security and bug fix update 24 June 2020 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: kernel Publisher: Red Hat Operating System: Red Hat UNIX variants (UNIX, Linux, OSX) Impact/Access: Access Privileged Data -- Existing Account Denial of Service -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2020-12888 CVE-2020-0543 Reference: ESB-2020.2011 Original Bulletin: https://access.redhat.com/errata/RHSA-2020:2664 https://access.redhat.com/errata/RHSA-2020:2665 Comment: This advisory references vulnerabilities in the Linux kernel that also affect distributions other than Red Hat. It is recommended that administrators running Linux check for an updated version of the kernel for their system. This bulletin contains two (2) Red Hat security advisories. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2020:2664-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2020:2664 Issue date: 2020-06-23 CVE Names: CVE-2020-12888 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario (CVE-2020-12888) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * kernel: hw: provide reporting and microcode mitigation toggle for CVE-2020-0543 / Special Register Buffer Data Sampling (SRBDS) (BZ#1827187) * kernel BUG at fs/fscache/operation.c:70! FS-Cache: 4 == 5 is false - current state is FSCACHE_OP_ST_COMPLETE but should be FSCACHE_OP_CANCELLED in fscache_enqueue_operation (BZ#1839757) * Deadlock condition grabbing ssb_state lock (BZ#1841121) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1836244 - CVE-2020-12888 Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: kernel-3.10.0-1127.13.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-1127.13.1.el7.noarch.rpm kernel-doc-3.10.0-1127.13.1.el7.noarch.rpm x86_64: bpftool-3.10.0-1127.13.1.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm kernel-3.10.0-1127.13.1.el7.x86_64.rpm kernel-debug-3.10.0-1127.13.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1127.13.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1127.13.1.el7.x86_64.rpm kernel-devel-3.10.0-1127.13.1.el7.x86_64.rpm kernel-headers-3.10.0-1127.13.1.el7.x86_64.rpm kernel-tools-3.10.0-1127.13.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1127.13.1.el7.x86_64.rpm perf-3.10.0-1127.13.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm python-perf-3.10.0-1127.13.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: bpftool-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1127.13.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1127.13.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: kernel-3.10.0-1127.13.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-1127.13.1.el7.noarch.rpm kernel-doc-3.10.0-1127.13.1.el7.noarch.rpm x86_64: bpftool-3.10.0-1127.13.1.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm kernel-3.10.0-1127.13.1.el7.x86_64.rpm kernel-debug-3.10.0-1127.13.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1127.13.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1127.13.1.el7.x86_64.rpm kernel-devel-3.10.0-1127.13.1.el7.x86_64.rpm kernel-headers-3.10.0-1127.13.1.el7.x86_64.rpm kernel-tools-3.10.0-1127.13.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1127.13.1.el7.x86_64.rpm perf-3.10.0-1127.13.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm python-perf-3.10.0-1127.13.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: bpftool-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1127.13.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1127.13.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: kernel-3.10.0-1127.13.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-1127.13.1.el7.noarch.rpm kernel-doc-3.10.0-1127.13.1.el7.noarch.rpm ppc64: bpftool-3.10.0-1127.13.1.el7.ppc64.rpm bpftool-debuginfo-3.10.0-1127.13.1.el7.ppc64.rpm kernel-3.10.0-1127.13.1.el7.ppc64.rpm kernel-bootwrapper-3.10.0-1127.13.1.el7.ppc64.rpm kernel-debug-3.10.0-1127.13.1.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-1127.13.1.el7.ppc64.rpm kernel-debug-devel-3.10.0-1127.13.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-1127.13.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-1127.13.1.el7.ppc64.rpm kernel-devel-3.10.0-1127.13.1.el7.ppc64.rpm kernel-headers-3.10.0-1127.13.1.el7.ppc64.rpm kernel-tools-3.10.0-1127.13.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-1127.13.1.el7.ppc64.rpm kernel-tools-libs-3.10.0-1127.13.1.el7.ppc64.rpm perf-3.10.0-1127.13.1.el7.ppc64.rpm perf-debuginfo-3.10.0-1127.13.1.el7.ppc64.rpm python-perf-3.10.0-1127.13.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-1127.13.1.el7.ppc64.rpm ppc64le: bpftool-3.10.0-1127.13.1.el7.ppc64le.rpm bpftool-debuginfo-3.10.0-1127.13.1.el7.ppc64le.rpm kernel-3.10.0-1127.13.1.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-1127.13.1.el7.ppc64le.rpm kernel-debug-3.10.0-1127.13.1.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-1127.13.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-1127.13.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-1127.13.1.el7.ppc64le.rpm kernel-devel-3.10.0-1127.13.1.el7.ppc64le.rpm kernel-headers-3.10.0-1127.13.1.el7.ppc64le.rpm kernel-tools-3.10.0-1127.13.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-1127.13.1.el7.ppc64le.rpm kernel-tools-libs-3.10.0-1127.13.1.el7.ppc64le.rpm perf-3.10.0-1127.13.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-1127.13.1.el7.ppc64le.rpm python-perf-3.10.0-1127.13.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-1127.13.1.el7.ppc64le.rpm s390x: bpftool-3.10.0-1127.13.1.el7.s390x.rpm bpftool-debuginfo-3.10.0-1127.13.1.el7.s390x.rpm kernel-3.10.0-1127.13.1.el7.s390x.rpm kernel-debug-3.10.0-1127.13.1.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-1127.13.1.el7.s390x.rpm kernel-debug-devel-3.10.0-1127.13.1.el7.s390x.rpm kernel-debuginfo-3.10.0-1127.13.1.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-1127.13.1.el7.s390x.rpm kernel-devel-3.10.0-1127.13.1.el7.s390x.rpm kernel-headers-3.10.0-1127.13.1.el7.s390x.rpm kernel-kdump-3.10.0-1127.13.1.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-1127.13.1.el7.s390x.rpm kernel-kdump-devel-3.10.0-1127.13.1.el7.s390x.rpm perf-3.10.0-1127.13.1.el7.s390x.rpm perf-debuginfo-3.10.0-1127.13.1.el7.s390x.rpm python-perf-3.10.0-1127.13.1.el7.s390x.rpm python-perf-debuginfo-3.10.0-1127.13.1.el7.s390x.rpm x86_64: bpftool-3.10.0-1127.13.1.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm kernel-3.10.0-1127.13.1.el7.x86_64.rpm kernel-debug-3.10.0-1127.13.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1127.13.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1127.13.1.el7.x86_64.rpm kernel-devel-3.10.0-1127.13.1.el7.x86_64.rpm kernel-headers-3.10.0-1127.13.1.el7.x86_64.rpm kernel-tools-3.10.0-1127.13.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1127.13.1.el7.x86_64.rpm perf-3.10.0-1127.13.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm python-perf-3.10.0-1127.13.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: bpftool-debuginfo-3.10.0-1127.13.1.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-1127.13.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-1127.13.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-1127.13.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-1127.13.1.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-1127.13.1.el7.ppc64.rpm perf-debuginfo-3.10.0-1127.13.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-1127.13.1.el7.ppc64.rpm ppc64le: bpftool-debuginfo-3.10.0-1127.13.1.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-1127.13.1.el7.ppc64le.rpm kernel-debug-devel-3.10.0-1127.13.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-1127.13.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-1127.13.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-1127.13.1.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-1127.13.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-1127.13.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-1127.13.1.el7.ppc64le.rpm x86_64: bpftool-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1127.13.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1127.13.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: kernel-3.10.0-1127.13.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-1127.13.1.el7.noarch.rpm kernel-doc-3.10.0-1127.13.1.el7.noarch.rpm x86_64: bpftool-3.10.0-1127.13.1.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm kernel-3.10.0-1127.13.1.el7.x86_64.rpm kernel-debug-3.10.0-1127.13.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1127.13.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1127.13.1.el7.x86_64.rpm kernel-devel-3.10.0-1127.13.1.el7.x86_64.rpm kernel-headers-3.10.0-1127.13.1.el7.x86_64.rpm kernel-tools-3.10.0-1127.13.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1127.13.1.el7.x86_64.rpm perf-3.10.0-1127.13.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm python-perf-3.10.0-1127.13.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: bpftool-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1127.13.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1127.13.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1127.13.1.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2020-12888 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/solutions/5142691 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2020 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXvH1QtzjgjWX9erEAQiTJBAAo1fD6P6gICp3rV9uGKJ2CGIYKAovpBih 03WEXucMq0qQYrNS4lFE+3n0yTvyCC7e0d4r5vEOd0m9GYoKa/upSTbG+GteGJGo d5DO6Xog+6pFOranCPMsJsjybjtXL1AuVEZ/PazHequnwqBbY/Bz95t35dfJSQOG 8XTj54VjOZG16lbT5z9CScHyBCDPFNTCcZ9mXguGhBTLL5HbnXtck5QBM5sjiBl0 3vkGZxZSitsPQqimXohPclvg95COYpyhPgugAIzp5yqhjUMKcJWDoL4mDohG6BEl ij6MJ+yRrp7eaui6wAHnGfMCY3pTA2c6I7EDk5IJ2qhFl0wV2oXsRZ1ebIMsBYO4 4O4PLaePNiYM0hWWYv2W4+BtZDr8qztXQQA7s9ia8VcKJuIRdL8xpawytAxRbn4/ rN78NeaAqXYK6muLI5gB2jPg11i1QsSY2e3ZSgmJ9iBhSEwEdkC1kmP+tbLoGOnT 6YNt182a8aq5wJwVF9oAe9Z0dEOMFZ3IfLJ3sBdruyPMbyqSPRt+dZ3rRW3TNjKB QOvL+tC1LjKFExHmg1NfekwCExmmpYMSZaMZ5x54uKa/M6sPZDw6kb2fFGJxREVt Tn2JS710moO6Cop6xsuB3HnNZRPEK5qPg/d/LXKN6Qzc2vtt6hgRvEBj1G97zSw+ GUXBW/cr89g= =XmFq - -----END PGP SIGNATURE----- - ------------------------------------------------------------------------------ - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel-rt security and bug fix update Advisory ID: RHSA-2020:2665-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2020:2665 Issue date: 2020-06-23 CVE Names: CVE-2020-12888 ===================================================================== 1. Summary: An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Realtime (v. 7) - noarch, x86_64 Red Hat Enterprise Linux for Real Time for NFV (v. 7) - noarch, x86_64 3. Description: The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario (CVE-2020-12888) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * kernel: hw: provide reporting and microcode mitigation toggle for CVE-2020-0543 / Special Register Buffer Data Sampling (SRBDS) (BZ#1827198) * kernel-rt: update to the latest RHEL7.8.z source tree (BZ#1844620) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1836244 - CVE-2020-12888 Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario 6. Package List: Red Hat Enterprise Linux for Real Time for NFV (v. 7): Source: kernel-rt-3.10.0-1127.13.1.rt56.1110.el7.src.rpm noarch: kernel-rt-doc-3.10.0-1127.13.1.rt56.1110.el7.noarch.rpm x86_64: kernel-rt-3.10.0-1127.13.1.rt56.1110.el7.x86_64.rpm kernel-rt-debug-3.10.0-1127.13.1.rt56.1110.el7.x86_64.rpm kernel-rt-debug-debuginfo-3.10.0-1127.13.1.rt56.1110.el7.x86_64.rpm kernel-rt-debug-devel-3.10.0-1127.13.1.rt56.1110.el7.x86_64.rpm kernel-rt-debug-kvm-3.10.0-1127.13.1.rt56.1110.el7.x86_64.rpm kernel-rt-debug-kvm-debuginfo-3.10.0-1127.13.1.rt56.1110.el7.x86_64.rpm kernel-rt-debuginfo-3.10.0-1127.13.1.rt56.1110.el7.x86_64.rpm kernel-rt-debuginfo-common-x86_64-3.10.0-1127.13.1.rt56.1110.el7.x86_64.rpm kernel-rt-devel-3.10.0-1127.13.1.rt56.1110.el7.x86_64.rpm kernel-rt-kvm-3.10.0-1127.13.1.rt56.1110.el7.x86_64.rpm kernel-rt-kvm-debuginfo-3.10.0-1127.13.1.rt56.1110.el7.x86_64.rpm kernel-rt-trace-3.10.0-1127.13.1.rt56.1110.el7.x86_64.rpm kernel-rt-trace-debuginfo-3.10.0-1127.13.1.rt56.1110.el7.x86_64.rpm kernel-rt-trace-devel-3.10.0-1127.13.1.rt56.1110.el7.x86_64.rpm kernel-rt-trace-kvm-3.10.0-1127.13.1.rt56.1110.el7.x86_64.rpm kernel-rt-trace-kvm-debuginfo-3.10.0-1127.13.1.rt56.1110.el7.x86_64.rpm Red Hat Enterprise Linux Realtime (v. 7): Source: kernel-rt-3.10.0-1127.13.1.rt56.1110.el7.src.rpm noarch: kernel-rt-doc-3.10.0-1127.13.1.rt56.1110.el7.noarch.rpm x86_64: kernel-rt-3.10.0-1127.13.1.rt56.1110.el7.x86_64.rpm kernel-rt-debug-3.10.0-1127.13.1.rt56.1110.el7.x86_64.rpm kernel-rt-debug-debuginfo-3.10.0-1127.13.1.rt56.1110.el7.x86_64.rpm kernel-rt-debug-devel-3.10.0-1127.13.1.rt56.1110.el7.x86_64.rpm kernel-rt-debug-kvm-debuginfo-3.10.0-1127.13.1.rt56.1110.el7.x86_64.rpm kernel-rt-debuginfo-3.10.0-1127.13.1.rt56.1110.el7.x86_64.rpm kernel-rt-debuginfo-common-x86_64-3.10.0-1127.13.1.rt56.1110.el7.x86_64.rpm kernel-rt-devel-3.10.0-1127.13.1.rt56.1110.el7.x86_64.rpm kernel-rt-kvm-debuginfo-3.10.0-1127.13.1.rt56.1110.el7.x86_64.rpm kernel-rt-trace-3.10.0-1127.13.1.rt56.1110.el7.x86_64.rpm kernel-rt-trace-debuginfo-3.10.0-1127.13.1.rt56.1110.el7.x86_64.rpm kernel-rt-trace-devel-3.10.0-1127.13.1.rt56.1110.el7.x86_64.rpm kernel-rt-trace-kvm-debuginfo-3.10.0-1127.13.1.rt56.1110.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2020-12888 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/solutions/5142691 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2020 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXvH1XdzjgjWX9erEAQgMdw//ZAnClI4mkHKPN68AL2t+F9hBk+wHaD1d NcMPZZxBihbaoffzJPX92QMnmrjI165m8g8VJ6OO7lAyZ2HbeaULtow3WfV+UISN nJyaQIk2llrBd5YUCztPmsYcp//xUwcDgIuc/VLhOjVJwj9kLmYBx0s/ni5wuKaR y5ZTNhCVNBtzQagII4hzq7lvFarqzTlWzCQusLppCiZYo8O5W7/tlCzfC95QoaR2 vpYZmZxSim4CgKx4KBTEIoSBX7wss+Et5RvjC0QNjxMFxaorS0UKe9yNF7xPs1th 6ZtR02JPiafbk30B4BiyCASDSDH79tISDr+obfFf2B4Fhg2PXvtyltyuL+X9lqil eUbZedKbV4bKZCuGKiil4TeTPiclUDpo7own83obJo/8HXppY4I+4At52ThFHOEq eJD1Xn3Q2IWfbDE5YuOOZDzgevS3VKKnE+wagQGiyF+JMfs+h3HtFeXhzI7yOwPp vDBjFzf+O+CCKKGDGpTki6yxMPq3X9Yu10dEN18y5OrFT+R6B7+6+vnKqssbVIPk KuZwiMjBi93w73C2UsDyI3FgToeYrSCxj5/AWML49SOhE1xg1zrppA5gqOu7B1fl nS9IAr4PPJvAXY2eFm6S6gBmXJXelzyrz1mz+NLJI6+GdmXpvqwnwAfkG1BZnHVL GDWaGJtmmt4= =CPgb - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXvKSteNLKJtyKPYoAQglMBAAma13gcX80FslIcEuYWg8hRxytbd937SN v3P03iAjF9wbU5ADA6h4eRBn9YcIR2s3UuR2z2d9GCS2K6Iuf70x8xpgqX2INL26 LQWreMJWlL2u8YT8UKCXN7G50/ZCeaj6FCJ3R58kI0Aj7oq8aEX/ATDAyGpCxdr4 a943UbpYaOWfGRb9Q4DSVQATUC8Jx08VGnY8bqrgKjjMtH4y4E+hE/C44GtYXDWz DqAn48NY67LILJCUaSNB15sgQkcTRjO+UTIKioDX4PO3nwEFgZBnwWwx3GT1532o FXT6Hc/dX5+u9bzD+eauEtRHaPOsGsQTDzsvh8D7ZhBRsYnCOb6kTwi0//yMdOdv CmjHHNjYBp/V5mIayA7rC+6u6TM33UUj/kjTNcB5YedELJ3H3IRLZHwB29p3nnxR K21DcdTQTeAzX31yA6cPddEB/wDQ1TST1nEHxtthP1Fgs+fVt4BCKHygIPmX/oeM rn5SPAk1ENB1jt7ksbZAr8Ih6/VXym043DjuB9uOs7qU72doX6CZLnLBKS/HrMgb 88wbEQR9Zkf6WbTvAGqOfDZRL1zom4vITugAc/+FPEBL8G8VXSLLZ3VcUpbkoQPN VI0aC7mboqwj+6awwpkkThjnmeZpL8cdGaAYxLN3Q8BGv930lVsolHmATd5ea6to BnRvDP79vuk= =jEhy -----END PGP SIGNATURE-----