Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2020.3888 kernel security, bug fix, and enhancement update 6 November 2020 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: kernel and kernel-rt Publisher: Red Hat Operating System: Red Hat Impact/Access: Execute Arbitrary Code/Commands -- Existing Account Increased Privileges -- Existing Account Access Privileged Data -- Existing Account Access Confidential Data -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2020-25641 CVE-2020-14381 CVE-2020-12826 CVE-2020-12770 CVE-2020-12659 CVE-2020-12655 CVE-2020-12465 CVE-2020-11668 CVE-2020-11565 CVE-2020-10942 CVE-2020-10774 CVE-2020-10773 CVE-2020-10751 CVE-2020-10732 CVE-2020-8649 CVE-2020-8648 CVE-2020-8647 CVE-2020-0305 CVE-2019-20636 CVE-2019-20054 CVE-2019-19770 CVE-2019-19767 CVE-2019-19543 CVE-2019-19537 CVE-2019-19533 CVE-2019-19524 CVE-2019-19447 CVE-2019-19332 CVE-2019-19319 CVE-2019-19072 CVE-2019-19068 CVE-2019-19063 CVE-2019-19062 CVE-2019-19056 CVE-2019-19046 CVE-2019-18809 CVE-2019-18808 CVE-2019-16233 CVE-2019-16231 CVE-2019-15925 CVE-2019-15917 CVE-2019-12614 CVE-2019-9458 CVE-2019-9455 Reference: ESB-2020.3346 Original Bulletin: https://access.redhat.com/errata/RHSA-2020:4431 https://access.redhat.com/errata/RHSA-2020:4609 Comment: This bulletin contains two (2) Red Hat security advisories. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: kernel security, bug fix, and enhancement update Advisory ID: RHSA-2020:4431-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2020:4431 Issue date: 2020-11-03 CVE Names: CVE-2019-9455 CVE-2019-9458 CVE-2019-12614 CVE-2019-15917 CVE-2019-15925 CVE-2019-16231 CVE-2019-16233 CVE-2019-18808 CVE-2019-18809 CVE-2019-19046 CVE-2019-19056 CVE-2019-19062 CVE-2019-19063 CVE-2019-19068 CVE-2019-19072 CVE-2019-19319 CVE-2019-19332 CVE-2019-19447 CVE-2019-19524 CVE-2019-19533 CVE-2019-19537 CVE-2019-19543 CVE-2019-19767 CVE-2019-19770 CVE-2019-20054 CVE-2019-20636 CVE-2020-0305 CVE-2020-8647 CVE-2020-8648 CVE-2020-8649 CVE-2020-10732 CVE-2020-10751 CVE-2020-10773 CVE-2020-10774 CVE-2020-10942 CVE-2020-11565 CVE-2020-11668 CVE-2020-12465 CVE-2020-12655 CVE-2020-12659 CVE-2020-12770 CVE-2020-12826 CVE-2020-14381 CVE-2020-25641 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat CodeReady Linux Builder (v. 8) - aarch64, ppc64le, x86_64 Red Hat Enterprise Linux BaseOS (v. 8) - aarch64, noarch, ppc64le, s390x, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: use after free in the video driver leads to local privilege escalation (CVE-2019-9458) * kernel: use-after-free in drivers/bluetooth/hci_ldisc.c (CVE-2019-15917) * kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg (CVE-2019-15925) * kernel: memory leak in ccp_run_sha_cmd() (CVE-2019-18808) * kernel: Denial Of Service in the __ipmi_bmc_register() (CVE-2019-19046) * kernel: out-of-bounds write in ext4_xattr_set_entry (CVE-2019-19319) * Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid (CVE-2019-19332) * kernel: use-after-free in ext4_put_super (CVE-2019-19447) * kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free (CVE-2019-19524) * kernel: race condition caused by a malicious USB device in the USB character device driver layer (CVE-2019-19537) * kernel: use-after-free in serial_ir_init_module() (CVE-2019-19543) * kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry (CVE-2019-19767) * kernel: use-after-free in debugfs_remove (CVE-2019-19770) * kernel: out-of-bounds write via crafted keycode table (CVE-2019-20636) * kernel: possible use-after-free due to a race condition in cdev_get (CVE-2020-0305) * kernel: out-of-bounds read in in vc_do_resize function (CVE-2020-8647) * kernel: use-after-free in n_tty_receive_buf_common function (CVE-2020-8648) * kernel: invalid read location in vgacon_invert_region function (CVE-2020-8649) * kernel: uninitialized kernel data leak in userspace coredumps (CVE-2020-10732) * kernel: SELinux netlink permission check bypass (CVE-2020-10751) * kernel: out-of-bounds write in mpol_parse_str (CVE-2020-11565) * kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c (CVE-2020-11668) * kernel: buffer overflow in mt76_add_fragment function (CVE-2020-12465) * kernel: xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write which could result in crash and data coruption (CVE-2020-12659) * kernel: sg_write function lacks an sg_remove_request call in a certain failure case (CVE-2020-12770) * kernel: possible to send arbitrary signals to a privileged (suidroot) parent process (CVE-2020-12826) * kernel: referencing inode of removed superblock in get_futex_key() causes UAF (CVE-2020-14381) * kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS (CVE-2020-25641) * kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure (CVE-2019-9455) * kernel: null pointer dereference in dlpar_parse_cc_property (CVE-2019-12614) * kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c (CVE-2019-16231) * kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c (CVE-2019-16233) * kernel: memory leak in af9005_identify_state() function (CVE-2019-18809) * kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function (CVE-2019-19056) * kernel: memory leak in the crypto_report() function (CVE-2019-19062) * kernel: Two memory leaks in the rtl_usb_probe() function (CVE-2019-19063) * kernel: A memory leak in the rtl8xxxu_submit_int_urb() function (CVE-2019-19068) * kernel: A memory leak in the predicate_parse() function (CVE-2019-19072) * kernel: information leak bug caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c (CVE-2019-19533) * kernel: Null pointer dereference in drop_sysctl_table() (CVE-2019-20054) * kernel: kernel stack information leak on s390/s390x (CVE-2020-10773) * kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features (CVE-2020-10774) * kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field (CVE-2020-10942) * kernel: sync of excessive duration via an XFS v5 image with crafted metadata (CVE-2020-12655) 4. Solution: For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section. For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1660798 - NFSv4.2: security label of mount point shows as "unlabeled_t" for ~30 seconds after mounting 1718176 - CVE-2019-12614 kernel: null pointer dereference in dlpar_parse_cc_property in arch/powerrc/platforms/pseries/dlpar.c causing denial of service 1759052 - CVE-2019-15925 kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg 1760100 - CVE-2019-15917 kernel: use-after-free in drivers/bluetooth/hci_ldisc.c 1760310 - CVE-2019-16231 kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c 1760420 - CVE-2019-16233 kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c 1774946 - CVE-2019-19072 kernel: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c allows for a DoS 1774963 - CVE-2019-19068 kernel: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c allows for a DoS 1774988 - CVE-2019-19046 kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c 1775015 - CVE-2019-19063 kernel: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c allow for a DoS 1775021 - CVE-2019-19062 kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS 1775097 - CVE-2019-19056 kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows to cause DoS 1777418 - CVE-2019-18808 kernel: memory leak in ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c 1777449 - CVE-2019-18809 kernel: memory leak in af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c 1778762 - Please backport Jitter Entropy patches 1779594 - CVE-2019-19332 Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid 1781679 - CVE-2019-19447 kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c 1781810 - CVE-2019-19543 kernel: use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c 1783459 - CVE-2019-19524 kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free 1783534 - CVE-2019-19533 kernel: information leak bug caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c 1783561 - CVE-2019-19537 kernel: race condition caused by a malicious USB device in the USB character device driver layer 1784130 - CVE-2019-19319 kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c 1786160 - CVE-2019-19767 kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry related to fs/ext4/inode.c and fs/ext4/super.c 1786179 - CVE-2019-19770 kernel: use-after-free in debugfs_remove in fs/debugfs/inode.c 1790063 - CVE-2019-20054 kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c 1802555 - CVE-2020-8649 kernel: invalid read location in vgacon_invert_region function in drivers/video/console/vgacon.c 1802559 - CVE-2020-8648 kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c 1802563 - CVE-2020-8647 kernel: out-of-bounds read in in vc_do_resize function in drivers/tty/vt/vt.c 1817718 - CVE-2020-10942 kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field 1819377 - CVE-2019-9458 kernel: use after free due to race condition in the video driver leads to local privilege escalation 1819399 - CVE-2019-9455 kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure 1820402 - Sometimes hit "error: kvm run failed Bad address" when launching a guest on Power8 1822077 - CVE-2020-12826 kernel: possible to send arbitrary signals to a privileged (suidroot) parent process 1823764 - RFE: Enable genfs+xattr labeling for CephFS 1824059 - CVE-2019-20636 kernel: out-of-bounds write via crafted keycode table 1824792 - CVE-2020-11668 kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c 1824918 - CVE-2020-11565 kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c 1830280 - Please enable CONFIG_RANDOM_TRUST_CPU 1831399 - CVE-2020-10732 kernel: uninitialized kernel data leak in userspace coredumps 1831699 - CVE-2020-12465 kernel: buffer overflow in mt76_add_fragment function in drivers/net/wireless/mediatek/mt76/dma.c 1832543 - CVE-2020-12655 kernel: sync of excessive duration via an XFS v5 image with crafted metadata 1832876 - CVE-2020-12659 kernel: xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write which could result in crash and data coruption 1834845 - CVE-2020-12770 kernel: sg_write function lacks an sg_remove_request call in a certain failure case 1839634 - CVE-2020-10751 kernel: SELinux netlink permission check bypass 1844520 - Incorrect pinning of IRQ threads on isolated CPUs by drivers that use cpumask_local_spread() 1846380 - CVE-2020-10773 kernel: kernel stack information leak on s390/s390x 1846964 - CVE-2020-10774 kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features 1853447 - Guest IA32_SPEC_CTRL wrmsr failure on AMD processors that support STIBP but don't support for IBRS 1856588 - Guest crashed and hung when hot unplug vcpus 1860065 - CVE-2020-0305 kernel: possible use-after-free due to a race condition in cdev_get of char_dev.c 1874311 - CVE-2020-14381 kernel: referencing inode of removed superblock in get_futex_key() causes UAF 1881424 - CVE-2020-25641 kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS 6. Package List: Red Hat Enterprise Linux BaseOS (v. 8): Source: kernel-4.18.0-240.el8.src.rpm aarch64: bpftool-4.18.0-240.el8.aarch64.rpm bpftool-debuginfo-4.18.0-240.el8.aarch64.rpm kernel-4.18.0-240.el8.aarch64.rpm kernel-core-4.18.0-240.el8.aarch64.rpm kernel-cross-headers-4.18.0-240.el8.aarch64.rpm kernel-debug-4.18.0-240.el8.aarch64.rpm kernel-debug-core-4.18.0-240.el8.aarch64.rpm kernel-debug-debuginfo-4.18.0-240.el8.aarch64.rpm kernel-debug-devel-4.18.0-240.el8.aarch64.rpm kernel-debug-modules-4.18.0-240.el8.aarch64.rpm kernel-debug-modules-extra-4.18.0-240.el8.aarch64.rpm kernel-debuginfo-4.18.0-240.el8.aarch64.rpm kernel-debuginfo-common-aarch64-4.18.0-240.el8.aarch64.rpm kernel-devel-4.18.0-240.el8.aarch64.rpm kernel-headers-4.18.0-240.el8.aarch64.rpm kernel-modules-4.18.0-240.el8.aarch64.rpm kernel-modules-extra-4.18.0-240.el8.aarch64.rpm kernel-tools-4.18.0-240.el8.aarch64.rpm kernel-tools-debuginfo-4.18.0-240.el8.aarch64.rpm kernel-tools-libs-4.18.0-240.el8.aarch64.rpm perf-4.18.0-240.el8.aarch64.rpm perf-debuginfo-4.18.0-240.el8.aarch64.rpm python3-perf-4.18.0-240.el8.aarch64.rpm python3-perf-debuginfo-4.18.0-240.el8.aarch64.rpm noarch: kernel-abi-whitelists-4.18.0-240.el8.noarch.rpm kernel-doc-4.18.0-240.el8.noarch.rpm ppc64le: bpftool-4.18.0-240.el8.ppc64le.rpm bpftool-debuginfo-4.18.0-240.el8.ppc64le.rpm kernel-4.18.0-240.el8.ppc64le.rpm kernel-core-4.18.0-240.el8.ppc64le.rpm kernel-cross-headers-4.18.0-240.el8.ppc64le.rpm kernel-debug-4.18.0-240.el8.ppc64le.rpm kernel-debug-core-4.18.0-240.el8.ppc64le.rpm kernel-debug-debuginfo-4.18.0-240.el8.ppc64le.rpm kernel-debug-devel-4.18.0-240.el8.ppc64le.rpm kernel-debug-modules-4.18.0-240.el8.ppc64le.rpm kernel-debug-modules-extra-4.18.0-240.el8.ppc64le.rpm kernel-debuginfo-4.18.0-240.el8.ppc64le.rpm kernel-debuginfo-common-ppc64le-4.18.0-240.el8.ppc64le.rpm kernel-devel-4.18.0-240.el8.ppc64le.rpm kernel-headers-4.18.0-240.el8.ppc64le.rpm kernel-modules-4.18.0-240.el8.ppc64le.rpm kernel-modules-extra-4.18.0-240.el8.ppc64le.rpm kernel-tools-4.18.0-240.el8.ppc64le.rpm kernel-tools-debuginfo-4.18.0-240.el8.ppc64le.rpm kernel-tools-libs-4.18.0-240.el8.ppc64le.rpm perf-4.18.0-240.el8.ppc64le.rpm perf-debuginfo-4.18.0-240.el8.ppc64le.rpm python3-perf-4.18.0-240.el8.ppc64le.rpm python3-perf-debuginfo-4.18.0-240.el8.ppc64le.rpm s390x: bpftool-4.18.0-240.el8.s390x.rpm bpftool-debuginfo-4.18.0-240.el8.s390x.rpm kernel-4.18.0-240.el8.s390x.rpm kernel-core-4.18.0-240.el8.s390x.rpm kernel-cross-headers-4.18.0-240.el8.s390x.rpm kernel-debug-4.18.0-240.el8.s390x.rpm kernel-debug-core-4.18.0-240.el8.s390x.rpm kernel-debug-debuginfo-4.18.0-240.el8.s390x.rpm kernel-debug-devel-4.18.0-240.el8.s390x.rpm kernel-debug-modules-4.18.0-240.el8.s390x.rpm kernel-debug-modules-extra-4.18.0-240.el8.s390x.rpm kernel-debuginfo-4.18.0-240.el8.s390x.rpm kernel-debuginfo-common-s390x-4.18.0-240.el8.s390x.rpm kernel-devel-4.18.0-240.el8.s390x.rpm kernel-headers-4.18.0-240.el8.s390x.rpm kernel-modules-4.18.0-240.el8.s390x.rpm kernel-modules-extra-4.18.0-240.el8.s390x.rpm kernel-tools-4.18.0-240.el8.s390x.rpm kernel-tools-debuginfo-4.18.0-240.el8.s390x.rpm kernel-zfcpdump-4.18.0-240.el8.s390x.rpm kernel-zfcpdump-core-4.18.0-240.el8.s390x.rpm kernel-zfcpdump-debuginfo-4.18.0-240.el8.s390x.rpm kernel-zfcpdump-devel-4.18.0-240.el8.s390x.rpm kernel-zfcpdump-modules-4.18.0-240.el8.s390x.rpm kernel-zfcpdump-modules-extra-4.18.0-240.el8.s390x.rpm perf-4.18.0-240.el8.s390x.rpm perf-debuginfo-4.18.0-240.el8.s390x.rpm python3-perf-4.18.0-240.el8.s390x.rpm python3-perf-debuginfo-4.18.0-240.el8.s390x.rpm x86_64: bpftool-4.18.0-240.el8.x86_64.rpm bpftool-debuginfo-4.18.0-240.el8.x86_64.rpm kernel-4.18.0-240.el8.x86_64.rpm kernel-core-4.18.0-240.el8.x86_64.rpm kernel-cross-headers-4.18.0-240.el8.x86_64.rpm kernel-debug-4.18.0-240.el8.x86_64.rpm kernel-debug-core-4.18.0-240.el8.x86_64.rpm kernel-debug-debuginfo-4.18.0-240.el8.x86_64.rpm kernel-debug-devel-4.18.0-240.el8.x86_64.rpm kernel-debug-modules-4.18.0-240.el8.x86_64.rpm kernel-debug-modules-extra-4.18.0-240.el8.x86_64.rpm kernel-debuginfo-4.18.0-240.el8.x86_64.rpm kernel-debuginfo-common-x86_64-4.18.0-240.el8.x86_64.rpm kernel-devel-4.18.0-240.el8.x86_64.rpm kernel-headers-4.18.0-240.el8.x86_64.rpm kernel-modules-4.18.0-240.el8.x86_64.rpm kernel-modules-extra-4.18.0-240.el8.x86_64.rpm kernel-tools-4.18.0-240.el8.x86_64.rpm kernel-tools-debuginfo-4.18.0-240.el8.x86_64.rpm kernel-tools-libs-4.18.0-240.el8.x86_64.rpm perf-4.18.0-240.el8.x86_64.rpm perf-debuginfo-4.18.0-240.el8.x86_64.rpm python3-perf-4.18.0-240.el8.x86_64.rpm python3-perf-debuginfo-4.18.0-240.el8.x86_64.rpm Red Hat CodeReady Linux Builder (v. 8): aarch64: bpftool-debuginfo-4.18.0-240.el8.aarch64.rpm kernel-debug-debuginfo-4.18.0-240.el8.aarch64.rpm kernel-debuginfo-4.18.0-240.el8.aarch64.rpm kernel-debuginfo-common-aarch64-4.18.0-240.el8.aarch64.rpm kernel-tools-debuginfo-4.18.0-240.el8.aarch64.rpm kernel-tools-libs-devel-4.18.0-240.el8.aarch64.rpm perf-debuginfo-4.18.0-240.el8.aarch64.rpm python3-perf-debuginfo-4.18.0-240.el8.aarch64.rpm ppc64le: bpftool-debuginfo-4.18.0-240.el8.ppc64le.rpm kernel-debug-debuginfo-4.18.0-240.el8.ppc64le.rpm kernel-debuginfo-4.18.0-240.el8.ppc64le.rpm kernel-debuginfo-common-ppc64le-4.18.0-240.el8.ppc64le.rpm kernel-tools-debuginfo-4.18.0-240.el8.ppc64le.rpm kernel-tools-libs-devel-4.18.0-240.el8.ppc64le.rpm perf-debuginfo-4.18.0-240.el8.ppc64le.rpm python3-perf-debuginfo-4.18.0-240.el8.ppc64le.rpm x86_64: bpftool-debuginfo-4.18.0-240.el8.x86_64.rpm kernel-debug-debuginfo-4.18.0-240.el8.x86_64.rpm kernel-debuginfo-4.18.0-240.el8.x86_64.rpm kernel-debuginfo-common-x86_64-4.18.0-240.el8.x86_64.rpm kernel-tools-debuginfo-4.18.0-240.el8.x86_64.rpm kernel-tools-libs-devel-4.18.0-240.el8.x86_64.rpm perf-debuginfo-4.18.0-240.el8.x86_64.rpm python3-perf-debuginfo-4.18.0-240.el8.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2019-9455 https://access.redhat.com/security/cve/CVE-2019-9458 https://access.redhat.com/security/cve/CVE-2019-12614 https://access.redhat.com/security/cve/CVE-2019-15917 https://access.redhat.com/security/cve/CVE-2019-15925 https://access.redhat.com/security/cve/CVE-2019-16231 https://access.redhat.com/security/cve/CVE-2019-16233 https://access.redhat.com/security/cve/CVE-2019-18808 https://access.redhat.com/security/cve/CVE-2019-18809 https://access.redhat.com/security/cve/CVE-2019-19046 https://access.redhat.com/security/cve/CVE-2019-19056 https://access.redhat.com/security/cve/CVE-2019-19062 https://access.redhat.com/security/cve/CVE-2019-19063 https://access.redhat.com/security/cve/CVE-2019-19068 https://access.redhat.com/security/cve/CVE-2019-19072 https://access.redhat.com/security/cve/CVE-2019-19319 https://access.redhat.com/security/cve/CVE-2019-19332 https://access.redhat.com/security/cve/CVE-2019-19447 https://access.redhat.com/security/cve/CVE-2019-19524 https://access.redhat.com/security/cve/CVE-2019-19533 https://access.redhat.com/security/cve/CVE-2019-19537 https://access.redhat.com/security/cve/CVE-2019-19543 https://access.redhat.com/security/cve/CVE-2019-19767 https://access.redhat.com/security/cve/CVE-2019-19770 https://access.redhat.com/security/cve/CVE-2019-20054 https://access.redhat.com/security/cve/CVE-2019-20636 https://access.redhat.com/security/cve/CVE-2020-0305 https://access.redhat.com/security/cve/CVE-2020-8647 https://access.redhat.com/security/cve/CVE-2020-8648 https://access.redhat.com/security/cve/CVE-2020-8649 https://access.redhat.com/security/cve/CVE-2020-10732 https://access.redhat.com/security/cve/CVE-2020-10751 https://access.redhat.com/security/cve/CVE-2020-10773 https://access.redhat.com/security/cve/CVE-2020-10774 https://access.redhat.com/security/cve/CVE-2020-10942 https://access.redhat.com/security/cve/CVE-2020-11565 https://access.redhat.com/security/cve/CVE-2020-11668 https://access.redhat.com/security/cve/CVE-2020-12465 https://access.redhat.com/security/cve/CVE-2020-12655 https://access.redhat.com/security/cve/CVE-2020-12659 https://access.redhat.com/security/cve/CVE-2020-12770 https://access.redhat.com/security/cve/CVE-2020-12826 https://access.redhat.com/security/cve/CVE-2020-14381 https://access.redhat.com/security/cve/CVE-2020-25641 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/index 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2020 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBX6Iw6tzjgjWX9erEAQi7jhAAqAD5idr03mUL/Nl0AwEHPknqIPF47O1v m7oVULhBTXqJSPeitjYyS6caTXOmDru9kYcN+Mw13dH5migTiBZ4lu6NINxc+G43 5cBZq6K1ikQyTHDB4JDHZOA04wgNoxCPpKx1bYwuSP+Zqpp/NgvrnZucJ0ypr5L5 I3X0Pim9bJnQvBLrbbds8txxT3PhwwG61/Rqu4fDwI2+yooEGV0q/Hy0M6rdPMtH 7R/mp/kNwenx/qzlrw2kruzZ1NWs14bPic5oNHp9Xy36KuAB15zvvO4Z4N/Da746 4QY/QZgfRbnTyl3lGbWuF5hScDq6Ahnvjmhf5KKN68nikU8kDndBpTWnQz1/O0wU +dUbDfQerQiwh+8QgJVLnzovAJR3DRa0SQ2mbgb6JT49unE/+6/bK1L/IXAIrWh5 6Upyr/X1YZ8n54Gu9Qj0iE59UzWp7bZCkGtyFWX0Lw5YWYCMdmmmKKzlZGI8dnXr TByVyEoDwhEhu5zLib4z4kXdcy49vqWhwhMXlbjW75NQZjQOuki6M+N/utW217Mt PwWJ/rRcwIiP5WtBrhXlk++EfifE2JbczbdjPFN54t0rAR+9ToOipueXGO4VBM35 gjYAs5mfsjI4+Z+gVklBKRpneo0OF3QE+uYpZINkOTX0iSRhMb7wHVdIbBD++7k9 fUncNDMm2kw= =uR38 - -----END PGP SIGNATURE----- - ------------------------------------------------------------------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: kernel-rt security and bug fix update Advisory ID: RHSA-2020:4609-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2020:4609 Issue date: 2020-11-03 CVE Names: CVE-2019-9455 CVE-2019-9458 CVE-2019-15917 CVE-2019-15925 CVE-2019-16231 CVE-2019-16233 CVE-2019-18808 CVE-2019-18809 CVE-2019-19046 CVE-2019-19056 CVE-2019-19062 CVE-2019-19063 CVE-2019-19068 CVE-2019-19072 CVE-2019-19319 CVE-2019-19332 CVE-2019-19447 CVE-2019-19524 CVE-2019-19533 CVE-2019-19537 CVE-2019-19543 CVE-2019-19767 CVE-2019-19770 CVE-2019-20054 CVE-2019-20636 CVE-2020-0305 CVE-2020-8647 CVE-2020-8648 CVE-2020-8649 CVE-2020-10732 CVE-2020-10751 CVE-2020-10774 CVE-2020-10942 CVE-2020-11565 CVE-2020-11668 CVE-2020-12655 CVE-2020-12659 CVE-2020-12770 CVE-2020-12826 CVE-2020-14381 CVE-2020-25641 ===================================================================== 1. Summary: An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Real Time (v. 8) - x86_64 Red Hat Enterprise Linux Real Time for NFV (v. 8) - x86_64 3. Description: The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * kernel: use after free due to race condition in the video driver leads to local privilege escalation (CVE-2019-9458) * kernel: use-after-free in drivers/bluetooth/hci_ldisc.c (CVE-2019-15917) * kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg (CVE-2019-15925) * kernel: memory leak in ccp_run_sha_cmd() (CVE-2019-18808) * kernel: Denial Of Service in the __ipmi_bmc_register() (CVE-2019-19046) * kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c (CVE-2019-19319) * Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid (CVE-2019-19332) * kernel: use-after-free in ext4_put_super (CVE-2019-19447) * kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free (CVE-2019-19524) * kernel: race condition caused by a malicious USB device in the USB character device driver layer (CVE-2019-19537) * kernel: use-after-free in serial_ir_init_module() (CVE-2019-19543) * kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry (CVE-2019-19767) * kernel: use-after-free in debugfs_remove (CVE-2019-19770) * kernel: out-of-bounds write via crafted keycode table (CVE-2019-20636) * kernel: possible use-after-free due to a race condition in cdev_get of char_dev.c (CVE-2020-0305) * kernel: out-of-bounds read in in vc_do_resize (CVE-2020-8647) * kernel: use-after-free in n_tty_receive_buf_common (CVE-2020-8648) * kernel: invalid read location in vgacon_invert_region (CVE-2020-8649) * kernel: uninitialized kernel data leak in userspace coredumps (CVE-2020-10732) * kernel: SELinux netlink permission check bypass (CVE-2020-10751) * kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c (CVE-2020-11565) * kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c (CVE-2020-11668) * kernel: out-of-bounds write in xdp_umem_reg (CVE-2020-12659) * kernel: sg_write function lacks an sg_remove_request call in a certain failure case (CVE-2020-12770) * kernel: possible to send arbitrary signals to a privileged (suidroot) parent process (CVE-2020-12826) * kernel: referencing inode of removed superblock in get_futex_key() causes UAF (CVE-2020-14381) * kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS (CVE-2020-25641) * kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure (CVE-2019-9455) * kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c (CVE-2019-16231) * kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c (CVE-2019-16233) * kernel: memory leak in af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c (CVE-2019-18809) * kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() (CVE-2019-19056) * kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS (CVE-2019-19062) * kernel: Two memory leaks in the rtl_usb_probe() (CVE-2019-19063) * kernel: A memory leak in the rtl8xxxu_submit_int_urb() (CVE-2019-19068) * kernel: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c allows for a DoS (CVE-2019-19072) * kernel: information leak bug caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c (CVE-2019-19533) * kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c (CVE-2019-20054) * kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features (CVE-2020-10774) * kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field (CVE-2020-10942) * kernel: sync of excessive duration via an XFS v5 image with crafted metadata (CVE-2020-12655) 4. Solution: For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section. For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1733495 - BUG: sleeping function called from invalid context at kernel/locking/rtmutex.c:974 1759052 - CVE-2019-15925 kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg 1760100 - CVE-2019-15917 kernel: use-after-free in drivers/bluetooth/hci_ldisc.c 1760310 - CVE-2019-16231 kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c 1760420 - CVE-2019-16233 kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c 1774946 - CVE-2019-19072 kernel: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c allows for a DoS 1774963 - CVE-2019-19068 kernel: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c allows for a DoS 1774988 - CVE-2019-19046 kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c 1775015 - CVE-2019-19063 kernel: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c allow for a DoS 1775021 - CVE-2019-19062 kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS 1775097 - CVE-2019-19056 kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows to cause DoS 1777418 - CVE-2019-18808 kernel: memory leak in ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c 1777449 - CVE-2019-18809 kernel: memory leak in af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c 1779046 - RT host hang with Call Trace "WARNING: CPU: 16 PID: 153 at kernel/smp.c:333 smp_call_function_single_async+0x7a/" 1779594 - CVE-2019-19332 Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid 1781679 - CVE-2019-19447 kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c 1781810 - CVE-2019-19543 kernel: use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c 1783459 - CVE-2019-19524 kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free 1783534 - CVE-2019-19533 kernel: information leak bug caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c 1783561 - CVE-2019-19537 kernel: race condition caused by a malicious USB device in the USB character device driver layer 1784130 - CVE-2019-19319 kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c 1786160 - CVE-2019-19767 kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry related to fs/ext4/inode.c and fs/ext4/super.c 1786179 - CVE-2019-19770 kernel: use-after-free in debugfs_remove in fs/debugfs/inode.c 1790063 - CVE-2019-20054 kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c 1802555 - CVE-2020-8649 kernel: invalid read location in vgacon_invert_region function in drivers/video/console/vgacon.c 1802559 - CVE-2020-8648 kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c 1802563 - CVE-2020-8647 kernel: out-of-bounds read in in vc_do_resize function in drivers/tty/vt/vt.c 1817718 - CVE-2020-10942 kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field 1819377 - CVE-2019-9458 kernel: use after free due to race condition in the video driver leads to local privilege escalation 1819399 - CVE-2019-9455 kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure 1822077 - CVE-2020-12826 kernel: possible to send arbitrary signals to a privileged (suidroot) parent process 1824059 - CVE-2019-20636 kernel: out-of-bounds write via crafted keycode table 1824792 - CVE-2020-11668 kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c 1824918 - CVE-2020-11565 kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c 1831399 - CVE-2020-10732 kernel: uninitialized kernel data leak in userspace coredumps 1832543 - CVE-2020-12655 kernel: sync of excessive duration via an XFS v5 image with crafted metadata 1832876 - CVE-2020-12659 kernel: xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write which could result in crash and data coruption 1833196 - adaptive-tick appears to not be functioning as expected on RHEL 8.2 RT 1834845 - CVE-2020-12770 kernel: sg_write function lacks an sg_remove_request call in a certain failure case 1839634 - CVE-2020-10751 kernel: SELinux netlink permission check bypass 1843410 - RT guest get Call Trace "INFO: task ld:274531 blocked for more than 600 seconds." 1846964 - CVE-2020-10774 kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features 1852298 - Install VM fails and RT host get Call Trace "WARNING: CPU: 18 PID: 2947 at fs/eventfd.c:68 eventfd_signal+0x7e/0x90" 1859590 - [efi]RT kernel crash with "rcu: INFO: rcu_preempt detected stalls on CPUs/tasks" 1860065 - CVE-2020-0305 kernel: possible use-after-free due to a race condition in cdev_get of char_dev.c 1874311 - CVE-2020-14381 kernel: referencing inode of removed superblock in get_futex_key() causes UAF 1881424 - CVE-2020-25641 kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS 6. Package List: Red Hat Enterprise Linux Real Time for NFV (v. 8): Source: kernel-rt-4.18.0-240.rt7.54.el8.src.rpm x86_64: kernel-rt-4.18.0-240.rt7.54.el8.x86_64.rpm kernel-rt-core-4.18.0-240.rt7.54.el8.x86_64.rpm kernel-rt-debug-4.18.0-240.rt7.54.el8.x86_64.rpm kernel-rt-debug-core-4.18.0-240.rt7.54.el8.x86_64.rpm kernel-rt-debug-debuginfo-4.18.0-240.rt7.54.el8.x86_64.rpm kernel-rt-debug-devel-4.18.0-240.rt7.54.el8.x86_64.rpm kernel-rt-debug-kvm-4.18.0-240.rt7.54.el8.x86_64.rpm kernel-rt-debug-modules-4.18.0-240.rt7.54.el8.x86_64.rpm kernel-rt-debug-modules-extra-4.18.0-240.rt7.54.el8.x86_64.rpm kernel-rt-debuginfo-4.18.0-240.rt7.54.el8.x86_64.rpm kernel-rt-debuginfo-common-x86_64-4.18.0-240.rt7.54.el8.x86_64.rpm kernel-rt-devel-4.18.0-240.rt7.54.el8.x86_64.rpm kernel-rt-kvm-4.18.0-240.rt7.54.el8.x86_64.rpm kernel-rt-modules-4.18.0-240.rt7.54.el8.x86_64.rpm kernel-rt-modules-extra-4.18.0-240.rt7.54.el8.x86_64.rpm Red Hat Enterprise Linux Real Time (v. 8): Source: kernel-rt-4.18.0-240.rt7.54.el8.src.rpm x86_64: kernel-rt-4.18.0-240.rt7.54.el8.x86_64.rpm kernel-rt-core-4.18.0-240.rt7.54.el8.x86_64.rpm kernel-rt-debug-4.18.0-240.rt7.54.el8.x86_64.rpm kernel-rt-debug-core-4.18.0-240.rt7.54.el8.x86_64.rpm kernel-rt-debug-debuginfo-4.18.0-240.rt7.54.el8.x86_64.rpm kernel-rt-debug-devel-4.18.0-240.rt7.54.el8.x86_64.rpm kernel-rt-debug-modules-4.18.0-240.rt7.54.el8.x86_64.rpm kernel-rt-debug-modules-extra-4.18.0-240.rt7.54.el8.x86_64.rpm kernel-rt-debuginfo-4.18.0-240.rt7.54.el8.x86_64.rpm kernel-rt-debuginfo-common-x86_64-4.18.0-240.rt7.54.el8.x86_64.rpm kernel-rt-devel-4.18.0-240.rt7.54.el8.x86_64.rpm kernel-rt-modules-4.18.0-240.rt7.54.el8.x86_64.rpm kernel-rt-modules-extra-4.18.0-240.rt7.54.el8.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2019-9455 https://access.redhat.com/security/cve/CVE-2019-9458 https://access.redhat.com/security/cve/CVE-2019-15917 https://access.redhat.com/security/cve/CVE-2019-15925 https://access.redhat.com/security/cve/CVE-2019-16231 https://access.redhat.com/security/cve/CVE-2019-16233 https://access.redhat.com/security/cve/CVE-2019-18808 https://access.redhat.com/security/cve/CVE-2019-18809 https://access.redhat.com/security/cve/CVE-2019-19046 https://access.redhat.com/security/cve/CVE-2019-19056 https://access.redhat.com/security/cve/CVE-2019-19062 https://access.redhat.com/security/cve/CVE-2019-19063 https://access.redhat.com/security/cve/CVE-2019-19068 https://access.redhat.com/security/cve/CVE-2019-19072 https://access.redhat.com/security/cve/CVE-2019-19319 https://access.redhat.com/security/cve/CVE-2019-19332 https://access.redhat.com/security/cve/CVE-2019-19447 https://access.redhat.com/security/cve/CVE-2019-19524 https://access.redhat.com/security/cve/CVE-2019-19533 https://access.redhat.com/security/cve/CVE-2019-19537 https://access.redhat.com/security/cve/CVE-2019-19543 https://access.redhat.com/security/cve/CVE-2019-19767 https://access.redhat.com/security/cve/CVE-2019-19770 https://access.redhat.com/security/cve/CVE-2019-20054 https://access.redhat.com/security/cve/CVE-2019-20636 https://access.redhat.com/security/cve/CVE-2020-0305 https://access.redhat.com/security/cve/CVE-2020-8647 https://access.redhat.com/security/cve/CVE-2020-8648 https://access.redhat.com/security/cve/CVE-2020-8649 https://access.redhat.com/security/cve/CVE-2020-10732 https://access.redhat.com/security/cve/CVE-2020-10751 https://access.redhat.com/security/cve/CVE-2020-10774 https://access.redhat.com/security/cve/CVE-2020-10942 https://access.redhat.com/security/cve/CVE-2020-11565 https://access.redhat.com/security/cve/CVE-2020-11668 https://access.redhat.com/security/cve/CVE-2020-12655 https://access.redhat.com/security/cve/CVE-2020-12659 https://access.redhat.com/security/cve/CVE-2020-12770 https://access.redhat.com/security/cve/CVE-2020-12826 https://access.redhat.com/security/cve/CVE-2020-14381 https://access.redhat.com/security/cve/CVE-2020-25641 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/index 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2020 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBX6Ix3tzjgjWX9erEAQhuhA//a3kyZ3P1p93nmvAK2wc/XwfSmfbbsS+s y0dn5nE50gzW25KWjE1VM4VL05krjT5VWwQOBBm7VtUHWWgaBYiHjdBhSEQWvIZQ A6MHe7DQX34wMr4cdCVlp/yPSls8ePGYiRv/kce0DH+xhMYbgqGQghJmtHNvvXKe Og5fxcm31kBYpQQ0fCL44ohpoAZkJfzkhss9vi+OMFU/k6F2CbpPy7ky21Qv21Vn ly48OWJ0I7B9am1yxZRXd8og2/54h53shTWysGO/pQMKpdVCqCEVmfMOXx48fxQY KFTkZaZQsj1ki0pJ4pKb9iF5Q6c6k0mJawvxaBFY5WPupB5Zc3X2yclksYrAfimz Ld8ikUu1COTaO7PdRhbC0dBlGslifUK9V4XUfB/YySN8Qzsl4fpOLZgLCHSfOcls uWq/XwXwKJ8QB9dY23RIrDtHPptg77WuHetf+z6uAI877OmYkHR2vBxQYmcXeL6w 8VjhZmJskP8IxNpyCCfUQSjGiAVQ/GWg1qPrNqP3fooVqu72LWKmNWj27VHT5zTY SZLWxT4/T5d44HE8NzrH6PXRi2ZDyW6Qqomvnclo0XyihxQq9mug/7bvRk0LkynW Hg3CUlOQp4/7CPqnZf7kP1mO+PNLALMGqDTutDjIBSXnI+zU6dEXousc8Ab1u+QM 9VOGjB3/K08= =LBP3 - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBX6SqwuNLKJtyKPYoAQgq9w/+PxZr6PKnGitEy169LFqb/EIUq+igxMOv VJMc2S5oTlbSHNNOom22DsF7Dc8QFE6mjuFZ1KvLMMChTUyxkqYS1MJqv/8akFgA RtAmhNJHoBH3U3dAOkA2DOKPqR1csneP2MKy7pr7IhYvxuBmIrfWuvMUaum1ZMub UZXp3h1NStCTaIS+Un32Pq11wJX8k4/4CmjnP63tzyZZMc1qx8S8irh9HEQQ09G4 gVVhPzHPJUeJYPMJLmr5VR5p9dBNj+eKnbLT7j3BVMpLpeCv7Zd3kO+/FP7s49Kg ryMRnj+siOwsaSf5sSS17so0bU80m4WPNslOJGkKIyA5bq0nCpzle/5Hu6EygAiI 7xvoTWs9tuX0eM16dj0VIa1MbfYCf9WEZ++MJEhijBGAZ73DW8nRKy52Kn7fLO3k 8vdKdjbA1xwp5fqHeBFrYaD+0OZHCP3PDthXEjrjZXITr1k6Vy2/WG2iJzF4vtz7 iDlTlGjFXfMSTUxQ1HBEgox/G1syzd5zRnDT3Qo6iuSrDse1ocdU9gp7fhLd5gJ/ Dgz/OKUyt4vWZdjaSq+GOqwEmcAJMSV997AF4yqTLhmMdiVkRurXyLm1hTRxd3zs 0EgeF0EEP6D+elLYqjL5ODAi/xauVGVzc8D777zCL2JmoLDdwIh2cuYBDAdEqtDX 7AxuDDiTyhM= =cHLv -----END PGP SIGNATURE-----