Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.2461 kernel security update 21 July 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: kernel Publisher: Red Hat Operating System: Red Hat Impact/Access: Root Compromise -- Existing Account Execute Arbitrary Code/Commands -- Existing Account Denial of Service -- Existing Account Access Confidential Data -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2021-33909 CVE-2021-33034 CVE-2021-33033 CVE-2020-11668 CVE-2019-20934 Reference: ESB-2021.2453 ESB-2021.2452 ESB-2021.2439 ESB-2021.2437 Original Bulletin: https://access.redhat.com/errata/RHSA-2021:2728 https://access.redhat.com/errata/RHSA-2021:2725 Comment: This bulletin contains two (2) Red Hat security advisories. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security update Advisory ID: RHSA-2021:2728-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:2728 Issue date: 2021-07-20 CVE Names: CVE-2021-33034 CVE-2021-33909 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 7.7 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux ComputeNode EUS (v. 7.7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7) - x86_64 Red Hat Enterprise Linux Server EUS (v. 7.7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 7.7) - ppc64, ppc64le, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909) * kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1961305 - CVE-2021-33034 kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan 1970273 - CVE-2021-33909 kernel: size_t-to-int conversion vulnerability in the filesystem layer 6. Package List: Red Hat Enterprise Linux ComputeNode EUS (v. 7.7): Source: kernel-3.10.0-1062.52.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-1062.52.2.el7.noarch.rpm kernel-doc-3.10.0-1062.52.2.el7.noarch.rpm x86_64: bpftool-3.10.0-1062.52.2.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1062.52.2.el7.x86_64.rpm kernel-3.10.0-1062.52.2.el7.x86_64.rpm kernel-debug-3.10.0-1062.52.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1062.52.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-1062.52.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-1062.52.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1062.52.2.el7.x86_64.rpm kernel-devel-3.10.0-1062.52.2.el7.x86_64.rpm kernel-headers-3.10.0-1062.52.2.el7.x86_64.rpm kernel-tools-3.10.0-1062.52.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1062.52.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-1062.52.2.el7.x86_64.rpm perf-3.10.0-1062.52.2.el7.x86_64.rpm perf-debuginfo-3.10.0-1062.52.2.el7.x86_64.rpm python-perf-3.10.0-1062.52.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1062.52.2.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.7): x86_64: bpftool-debuginfo-3.10.0-1062.52.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1062.52.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-1062.52.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1062.52.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1062.52.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1062.52.2.el7.x86_64.rpm perf-debuginfo-3.10.0-1062.52.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1062.52.2.el7.x86_64.rpm Red Hat Enterprise Linux Server EUS (v. 7.7): Source: kernel-3.10.0-1062.52.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-1062.52.2.el7.noarch.rpm kernel-doc-3.10.0-1062.52.2.el7.noarch.rpm ppc64: bpftool-3.10.0-1062.52.2.el7.ppc64.rpm bpftool-debuginfo-3.10.0-1062.52.2.el7.ppc64.rpm kernel-3.10.0-1062.52.2.el7.ppc64.rpm kernel-bootwrapper-3.10.0-1062.52.2.el7.ppc64.rpm kernel-debug-3.10.0-1062.52.2.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-1062.52.2.el7.ppc64.rpm kernel-debug-devel-3.10.0-1062.52.2.el7.ppc64.rpm kernel-debuginfo-3.10.0-1062.52.2.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-1062.52.2.el7.ppc64.rpm kernel-devel-3.10.0-1062.52.2.el7.ppc64.rpm kernel-headers-3.10.0-1062.52.2.el7.ppc64.rpm kernel-tools-3.10.0-1062.52.2.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-1062.52.2.el7.ppc64.rpm kernel-tools-libs-3.10.0-1062.52.2.el7.ppc64.rpm perf-3.10.0-1062.52.2.el7.ppc64.rpm perf-debuginfo-3.10.0-1062.52.2.el7.ppc64.rpm python-perf-3.10.0-1062.52.2.el7.ppc64.rpm python-perf-debuginfo-3.10.0-1062.52.2.el7.ppc64.rpm ppc64le: bpftool-3.10.0-1062.52.2.el7.ppc64le.rpm bpftool-debuginfo-3.10.0-1062.52.2.el7.ppc64le.rpm kernel-3.10.0-1062.52.2.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-1062.52.2.el7.ppc64le.rpm kernel-debug-3.10.0-1062.52.2.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-1062.52.2.el7.ppc64le.rpm kernel-debuginfo-3.10.0-1062.52.2.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-1062.52.2.el7.ppc64le.rpm kernel-devel-3.10.0-1062.52.2.el7.ppc64le.rpm kernel-headers-3.10.0-1062.52.2.el7.ppc64le.rpm kernel-tools-3.10.0-1062.52.2.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-1062.52.2.el7.ppc64le.rpm kernel-tools-libs-3.10.0-1062.52.2.el7.ppc64le.rpm perf-3.10.0-1062.52.2.el7.ppc64le.rpm perf-debuginfo-3.10.0-1062.52.2.el7.ppc64le.rpm python-perf-3.10.0-1062.52.2.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-1062.52.2.el7.ppc64le.rpm s390x: bpftool-3.10.0-1062.52.2.el7.s390x.rpm bpftool-debuginfo-3.10.0-1062.52.2.el7.s390x.rpm kernel-3.10.0-1062.52.2.el7.s390x.rpm kernel-debug-3.10.0-1062.52.2.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-1062.52.2.el7.s390x.rpm kernel-debug-devel-3.10.0-1062.52.2.el7.s390x.rpm kernel-debuginfo-3.10.0-1062.52.2.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-1062.52.2.el7.s390x.rpm kernel-devel-3.10.0-1062.52.2.el7.s390x.rpm kernel-headers-3.10.0-1062.52.2.el7.s390x.rpm kernel-kdump-3.10.0-1062.52.2.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-1062.52.2.el7.s390x.rpm kernel-kdump-devel-3.10.0-1062.52.2.el7.s390x.rpm perf-3.10.0-1062.52.2.el7.s390x.rpm perf-debuginfo-3.10.0-1062.52.2.el7.s390x.rpm python-perf-3.10.0-1062.52.2.el7.s390x.rpm python-perf-debuginfo-3.10.0-1062.52.2.el7.s390x.rpm x86_64: bpftool-3.10.0-1062.52.2.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1062.52.2.el7.x86_64.rpm kernel-3.10.0-1062.52.2.el7.x86_64.rpm kernel-debug-3.10.0-1062.52.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1062.52.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-1062.52.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-1062.52.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1062.52.2.el7.x86_64.rpm kernel-devel-3.10.0-1062.52.2.el7.x86_64.rpm kernel-headers-3.10.0-1062.52.2.el7.x86_64.rpm kernel-tools-3.10.0-1062.52.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1062.52.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-1062.52.2.el7.x86_64.rpm perf-3.10.0-1062.52.2.el7.x86_64.rpm perf-debuginfo-3.10.0-1062.52.2.el7.x86_64.rpm python-perf-3.10.0-1062.52.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1062.52.2.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional EUS (v. 7.7): ppc64: bpftool-debuginfo-3.10.0-1062.52.2.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-1062.52.2.el7.ppc64.rpm kernel-debuginfo-3.10.0-1062.52.2.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-1062.52.2.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-1062.52.2.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-1062.52.2.el7.ppc64.rpm perf-debuginfo-3.10.0-1062.52.2.el7.ppc64.rpm python-perf-debuginfo-3.10.0-1062.52.2.el7.ppc64.rpm ppc64le: bpftool-debuginfo-3.10.0-1062.52.2.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-1062.52.2.el7.ppc64le.rpm kernel-debug-devel-3.10.0-1062.52.2.el7.ppc64le.rpm kernel-debuginfo-3.10.0-1062.52.2.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-1062.52.2.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-1062.52.2.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-1062.52.2.el7.ppc64le.rpm perf-debuginfo-3.10.0-1062.52.2.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-1062.52.2.el7.ppc64le.rpm x86_64: bpftool-debuginfo-3.10.0-1062.52.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1062.52.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-1062.52.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1062.52.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1062.52.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1062.52.2.el7.x86_64.rpm perf-debuginfo-3.10.0-1062.52.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1062.52.2.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2021-33034 https://access.redhat.com/security/cve/CVE-2021-33909 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/vulnerabilities/RHSB-2021-006 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYPd0n9zjgjWX9erEAQjyFw//eZFbE4Q7HT2jtEnBnQcFcGFOiMZoW03y uGpduhJPgVG5AOwzajmfkkSZyKdeY7YysC8U6BoGASR8cAPH3kNkZ7qmOj3d8pGg wHbh3Gz56SEurZTFIorFC9bZ0vV7sEMrglC3IdAqWAskGUIpK+B+nfY0Y9G1SQ4p EgDwgVMHUzEW/0devQxHRX9CdZqX7LqEVOaDDQxcrQhNItnCT909HJkDKqgzlAMs L0b0be5/kUn7u+az1Jf5tca++2UCiCgAOM0LRfpLEl7GnLu0or+0mXWJCNGc8roh +V4qelfr0bTxAvt29/uh6jvIQyV5RBu0IWSaDcZHVkCSEKcjXGkej8V7f6fCNpON tmVqJOLUQ2revoMu71JZNhHPSgPmTxizn26qmo/dhLv3P8/c94oJX0TluTl7jugu IwcjqxsJlmr2ecYckIQ8t9vx5/2F3Dv5eg7iBNI8jHxyRutnp9wrDagjs7p0okfk M112IawtnXaJs4+Qh3SWxgdXDZfJlmwF4FKZlaiKj13Suea+rHjoAtykSCJKp77G P8FDudRFpc6w4ORaupsX5cJu7ojyfVgWZpbAOMFDh/N8bn/TdG4HM5Ni4gWIoXJ3 f4QsD9oLsBemb5WQNIjio7L1WkyN5masSFEH0g5voaVmDm+rSg26m5T8U/HTyq0l hgJo2YKtOhs= =Pa6j - -----END PGP SIGNATURE----- - -------------------------------------------------------------------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2021:2725-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:2725 Issue date: 2021-07-20 CVE Names: CVE-2019-20934 CVE-2020-11668 CVE-2021-33033 CVE-2021-33034 CVE-2021-33909 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909) * kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034) * kernel: use-after-free in show_numa_stats function (CVE-2019-20934) * kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c (CVE-2020-11668) * kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c (CVE-2021-33033) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * [RHEL7.9.z] n_tty_open: "BUG: unable to handle kernel paging request" (BZ#1872778) * [ESXi][RHEL7.8]"qp_alloc_hypercall result = -20" / "Could not attach to queue pair with -20" with vSphere Fault Tolerance enabled (BZ#1892237) * [RHEL7.9][s390x][Regression] Sino Nomine swapgen IBM z/VM emulated DASD with DIAG driver returns EOPNOTSUPP (BZ#1910395) * False-positive hard lockup detected while processing the thread state information (SysRq-T) (BZ#1912221) * RHEL7.9 zstream - s390x LPAR with NVMe SSD will panic when it has 32 or more IFL (pci) (BZ#1917943) * The NMI watchdog detected a hard lockup while printing RCU CPU stall warning messages to the serial console (BZ#1924688) * nvme hangs when trying to allocate reserved tag (BZ#1926825) * [REGRESSION] "call into AER handling regardless of severity" triggers do_recovery() unnecessarily on correctable PCIe errors (BZ#1933663) * Module nvme_core: A double free of the kmalloc-512 cache between nvme_trans_log_temperature() and nvme_get_log_page(). (BZ#1946793) * sctp - SCTP_CMD_TIMER_START queues active timer kernel BUG at kernel/timer.c:1000! (BZ#1953052) * [Hyper-V][RHEL-7]When CONFIG_NET_POLL_CONTROLLER is set, mainline commit 2a7f8c3b1d3fee is needed (BZ#1953075) * Kernel panic at cgroup_is_descendant (BZ#1957719) * [Hyper-V][RHEL-7]Commits To Fix Kdump Failures (BZ#1957803) * IGMPv2 JOIN packets incorrectly routed to loopback (BZ#1958339) * [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1960193) * mlx4: Fix memory allocation in mlx4_buddy_init needed (BZ#1962406) * incorrect assertion on pi_state->pi_mutex.wait_lock from pi_state_update_owner() (BZ#1965495) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1824792 - CVE-2020-11668 kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c 1902788 - CVE-2019-20934 kernel: use-after-free in show_numa_stats function 1961300 - CVE-2021-33033 kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c 1961305 - CVE-2021-33034 kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan 1970273 - CVE-2021-33909 kernel: size_t-to-int conversion vulnerability in the filesystem layer 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: kernel-3.10.0-1160.36.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-1160.36.2.el7.noarch.rpm kernel-doc-3.10.0-1160.36.2.el7.noarch.rpm x86_64: bpftool-3.10.0-1160.36.2.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.36.2.el7.x86_64.rpm kernel-devel-3.10.0-1160.36.2.el7.x86_64.rpm kernel-headers-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.36.2.el7.x86_64.rpm perf-3.10.0-1160.36.2.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm python-perf-3.10.0-1160.36.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: bpftool-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1160.36.2.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: kernel-3.10.0-1160.36.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-1160.36.2.el7.noarch.rpm kernel-doc-3.10.0-1160.36.2.el7.noarch.rpm x86_64: bpftool-3.10.0-1160.36.2.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.36.2.el7.x86_64.rpm kernel-devel-3.10.0-1160.36.2.el7.x86_64.rpm kernel-headers-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.36.2.el7.x86_64.rpm perf-3.10.0-1160.36.2.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm python-perf-3.10.0-1160.36.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: bpftool-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1160.36.2.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: kernel-3.10.0-1160.36.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-1160.36.2.el7.noarch.rpm kernel-doc-3.10.0-1160.36.2.el7.noarch.rpm ppc64: bpftool-3.10.0-1160.36.2.el7.ppc64.rpm bpftool-debuginfo-3.10.0-1160.36.2.el7.ppc64.rpm kernel-3.10.0-1160.36.2.el7.ppc64.rpm kernel-bootwrapper-3.10.0-1160.36.2.el7.ppc64.rpm kernel-debug-3.10.0-1160.36.2.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-1160.36.2.el7.ppc64.rpm kernel-debug-devel-3.10.0-1160.36.2.el7.ppc64.rpm kernel-debuginfo-3.10.0-1160.36.2.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-1160.36.2.el7.ppc64.rpm kernel-devel-3.10.0-1160.36.2.el7.ppc64.rpm kernel-headers-3.10.0-1160.36.2.el7.ppc64.rpm kernel-tools-3.10.0-1160.36.2.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-1160.36.2.el7.ppc64.rpm kernel-tools-libs-3.10.0-1160.36.2.el7.ppc64.rpm perf-3.10.0-1160.36.2.el7.ppc64.rpm perf-debuginfo-3.10.0-1160.36.2.el7.ppc64.rpm python-perf-3.10.0-1160.36.2.el7.ppc64.rpm python-perf-debuginfo-3.10.0-1160.36.2.el7.ppc64.rpm ppc64le: bpftool-3.10.0-1160.36.2.el7.ppc64le.rpm bpftool-debuginfo-3.10.0-1160.36.2.el7.ppc64le.rpm kernel-3.10.0-1160.36.2.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-1160.36.2.el7.ppc64le.rpm kernel-debug-3.10.0-1160.36.2.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-1160.36.2.el7.ppc64le.rpm kernel-debuginfo-3.10.0-1160.36.2.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-1160.36.2.el7.ppc64le.rpm kernel-devel-3.10.0-1160.36.2.el7.ppc64le.rpm kernel-headers-3.10.0-1160.36.2.el7.ppc64le.rpm kernel-tools-3.10.0-1160.36.2.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-1160.36.2.el7.ppc64le.rpm kernel-tools-libs-3.10.0-1160.36.2.el7.ppc64le.rpm perf-3.10.0-1160.36.2.el7.ppc64le.rpm perf-debuginfo-3.10.0-1160.36.2.el7.ppc64le.rpm python-perf-3.10.0-1160.36.2.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-1160.36.2.el7.ppc64le.rpm s390x: bpftool-3.10.0-1160.36.2.el7.s390x.rpm bpftool-debuginfo-3.10.0-1160.36.2.el7.s390x.rpm kernel-3.10.0-1160.36.2.el7.s390x.rpm kernel-debug-3.10.0-1160.36.2.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-1160.36.2.el7.s390x.rpm kernel-debug-devel-3.10.0-1160.36.2.el7.s390x.rpm kernel-debuginfo-3.10.0-1160.36.2.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-1160.36.2.el7.s390x.rpm kernel-devel-3.10.0-1160.36.2.el7.s390x.rpm kernel-headers-3.10.0-1160.36.2.el7.s390x.rpm kernel-kdump-3.10.0-1160.36.2.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-1160.36.2.el7.s390x.rpm kernel-kdump-devel-3.10.0-1160.36.2.el7.s390x.rpm perf-3.10.0-1160.36.2.el7.s390x.rpm perf-debuginfo-3.10.0-1160.36.2.el7.s390x.rpm python-perf-3.10.0-1160.36.2.el7.s390x.rpm python-perf-debuginfo-3.10.0-1160.36.2.el7.s390x.rpm x86_64: bpftool-3.10.0-1160.36.2.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.36.2.el7.x86_64.rpm kernel-devel-3.10.0-1160.36.2.el7.x86_64.rpm kernel-headers-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.36.2.el7.x86_64.rpm perf-3.10.0-1160.36.2.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm python-perf-3.10.0-1160.36.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: bpftool-debuginfo-3.10.0-1160.36.2.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-1160.36.2.el7.ppc64.rpm kernel-debuginfo-3.10.0-1160.36.2.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-1160.36.2.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-1160.36.2.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-1160.36.2.el7.ppc64.rpm perf-debuginfo-3.10.0-1160.36.2.el7.ppc64.rpm python-perf-debuginfo-3.10.0-1160.36.2.el7.ppc64.rpm ppc64le: bpftool-debuginfo-3.10.0-1160.36.2.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-1160.36.2.el7.ppc64le.rpm kernel-debug-devel-3.10.0-1160.36.2.el7.ppc64le.rpm kernel-debuginfo-3.10.0-1160.36.2.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-1160.36.2.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-1160.36.2.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-1160.36.2.el7.ppc64le.rpm perf-debuginfo-3.10.0-1160.36.2.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-1160.36.2.el7.ppc64le.rpm x86_64: bpftool-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1160.36.2.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: kernel-3.10.0-1160.36.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-1160.36.2.el7.noarch.rpm kernel-doc-3.10.0-1160.36.2.el7.noarch.rpm x86_64: bpftool-3.10.0-1160.36.2.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.36.2.el7.x86_64.rpm kernel-devel-3.10.0-1160.36.2.el7.x86_64.rpm kernel-headers-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.36.2.el7.x86_64.rpm perf-3.10.0-1160.36.2.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm python-perf-3.10.0-1160.36.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: bpftool-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1160.36.2.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2019-20934 https://access.redhat.com/security/cve/CVE-2020-11668 https://access.redhat.com/security/cve/CVE-2021-33033 https://access.redhat.com/security/cve/CVE-2021-33034 https://access.redhat.com/security/cve/CVE-2021-33909 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/vulnerabilities/RHSB-2021-006 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYPd0rdzjgjWX9erEAQgSLQ/9FYCaqS1w2FD8A64mwloIz/fRGh5eGMwl 6RgXKj6wOJPaSPYl3Gk4r7hEDx1aO8jwxz5uZ8PRz1K4LFArAGLi3BBc2pCk1QA1 SHPfNuKO8UefwGrqv7Xd6wThwwt+7D8LN2Lg+H2vUYve/NRrxQZOqH7MnQPKsVve ufvaDQjrySGSXkiQHSSDSvlDQB3eaVRCqh10cBwWzsU/lG/JcdvbIo4Oat27S8WU c4VijwACg7Wn7iTYkMMR4xk0iP991QeoYkqusJByGO5K9naZsSU8LxT4i84/mbZB RWJULDHKPHZtfpR+Gz6AOIl7aa8vE8V90263OUWPJG/c0O6u3sWzK5YyGr0Ob82l gbl1BnI+W0BanwMHeiBJq7HmgFU1jYO7vu5w4mnaf9gkDgm1GOBrHaBOHg/qEXWs WR4UDOpnJcZAxMpVJEyk8EolSv7AlcDKTr+J9xu9vKhdbmok0VbtGhjUDXEZI7tT 5FlrM1qfpa9S4EtiUv7hIYGFg78gVoLrXlPMxEyw9zXhYczCypNwbzWyH+O6utTG saiHuayf6WTw582qITDfgI9nenIu9a6rqEu1pg5EuwoqD5ipRVAsmaFBPWdi+exa +I2KV777KAXM2k4XqVbmVcZ1MnvTqCoEwFLy349A3r3Y9JwDJxCu73HU5nifg4LP AMB5i8YI9o8= =gDcx - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYPewT+NLKJtyKPYoAQh1xQ/+LLjv5SG+lvycXHhly7oGqIbM/+Y3Qsm3 /rgKBjIne7v+vxAb4j7TwmGkqkGXWo19LjNCbW7MGQc0bpZBpoVjKvRZUuZ2tpCl 6rGSC2BjY2ZCFXdFDAErJvwE82ALzDlZ8wJpn7o0zSZ7RkqKCdwLO3Zvp+XPZGg3 BsXLNk4s+IjHB7iTx0LZhMTHkngErjPVlICiEE2d5YnBiS6ICXL5Igc6H/4xxlvz 9CFJfubkxw0KbX8MJZ5AZ89HSoeCP7mW3mnde+R7ZQh/4ku2YEd66x1MsTXdrvjW 1ztL8gIUiWeW/So3SiXFsO4OZMTVy2jHQHFbi9k4/8ZZO9JZ7/7XSc5Azou4mfZ2 uFpVflj48HkdbWZ+fxWORO24XZK+tM43dVr5tjHkgH80LJHzdi2+mbIo/yrmrvvX 9WGZeOkwWbmZQp1AWfi8nrmUcPuGQRXd1xblXvwAO+7T1gQ8twYpekS3CJvztgay n3FF+1LIZMuRkTlFMvmGNX2ie07ju7aHGji47BIVDqWoz++8DrZ3yVQyGZYsSD1j /sD44fFxFDtu0VIH9poRLnLN2S+gFjQFUH/EwVk3EB6MiD48ILK1LToRpscCmub8 JkOuL61b+M60FMXyrLbHPwhj2ZSeHjdogTx9Qe7r28szhXxM3vtb383BtFBa0Gst YNbft47pmOA= =1yAK -----END PGP SIGNATURE-----