Send CentOS-announce mailing list submissions to centos-announce@centos.org
To subscribe or unsubscribe via the World Wide Web, visit https://lists.centos.org/mailman/listinfo/centos-announce or, via email, send a message with subject or body 'help' to centos-announce-request@centos.org
You can reach the person managing the list at centos-announce-owner@centos.org
When replying, please edit your Subject line so it is more specific than "Re: Contents of CentOS-announce digest..."
Today's Topics:
1. CentOS Linux, CentOS Stream and the Boot Hole vulnerability (Brian Stinson) 2. [Correction/Additions] CentOS Linux, CentOS Stream and the Boot Hole vulnerability (Brian Stinson) 3. CESA-2020:3220 Important CentOS 7 kernel Security Update (Johnny Hughes) 4. CESA-2020:3217 Moderate CentOS 7 shim Security Update (Johnny Hughes) 5. CESA-2018:3140 Moderate CentOS 7 fwupdate Security Update (Johnny Hughes) 6. CESA-2020:3217 Moderate CentOS 7 shim-signed Security Update (Johnny Hughes) 7. CESA-2020:3217 Moderate CentOS 7 grub2 Security Update (Johnny Hughes)
----------------------------------------------------------------------
Message: 1 Date: Wed, 29 Jul 2020 12:38:47 -0500 From: Brian Stinson bstinson@centosproject.org To: centos-announce@centos.org Subject: [CentOS-announce] CentOS Linux, CentOS Stream and the Boot Hole vulnerability Message-ID: 0f0d3ad8-7160-73b7-82d2-6d8ff51ef5f1@centosproject.org Content-Type: text/plain; charset=utf-8
We are aware of the Boot Hole vulnerability in grub2 (CVE-2020-1073) and are working on releasing new packages for CentOS Linux 7, CentOS Linux 8 and CentOS Stream in response. These should make it out to a mirror near you shortly.
/!\ Secureboot Systems - Please do a full update /!\
CentOS Linux 8 and CentOS Stream systems with secureboot enabled MUST update the kernel, grub2, and shim packages together. As part of this CVE, we have re-issued the kernel and shim signing certificate authorities, and previously released EL8 kernels cannot boot in secureboot mode with the newer shim/grub2.
The following packages boot together in secureboot mode on CentOS Stream:
*
kernel-4.18.0-227.el8 / kernel-rt-4.18.0-227.rt7.39.el8
*
grub2-2.02-87.el8_2
*
shim-x64-15-13.el8
The following packages boot together in secureboot mode on CentOS Linux 8:
*
kernel-4.18.0-193.14.2.el8_2
*
grub2-2.02-87.el8_2
*
shim-x64-15-13.el8
For systems with CentOS Linux 7 or with secureboot disabled, we strongly recommend doing a full `dnf/yum update` to pick up all of the latest patches at the same time.
On behalf of the CentOS Team,
--
Brian Stinson
------------------------------
Message: 2 Date: Wed, 29 Jul 2020 13:46:26 -0500 From: Brian Stinson bstinson@centosproject.org To: centos-announce@centos.org Subject: [CentOS-announce] [Correction/Additions] CentOS Linux, CentOS Stream and the Boot Hole vulnerability Message-ID: d82db84a-7564-48bb-ef18-e6dd0a2f5036@centosproject.org Content-Type: text/plain; charset=utf-8
On 7/29/20 12:38 PM, Brian Stinson wrote:
We are aware of the Boot Hole vulnerability in grub2 (CVE-2020-1073) and are working on releasing new packages for CentOS Linux 7, CentOS Linux 8 and CentOS Stream in response. These should make it out to a mirror near you shortly.
/!\ Secureboot Systems - Please do a full update /!\
CentOS Linux 8 and CentOS Stream systems with secureboot enabled MUST update the kernel, grub2, and shim packages together. As part of this CVE, we have re-issued the kernel and shim signing certificate authorities, and previously released EL8 kernels cannot boot in secureboot mode with the newer shim/grub2.
The following packages boot together in secureboot mode on CentOS Stream:
kernel-4.18.0-227.el8 / kernel-rt-4.18.0-227.rt7.39.el8
grub2-2.02-87.el8_2
shim-x64-15-13.el8
The following packages boot together in secureboot mode on CentOS Linux 8:
kernel-4.18.0-193.14.2.el8_2
grub2-2.02-87.el8_2
shim-x64-15-13.el8
For systems with CentOS Linux 7 or with secureboot disabled, we strongly recommend doing a full `dnf/yum update` to pick up all of the latest patches at the same time.
On behalf of the CentOS Team,
--
Brian Stinson
CentOS-announce mailing list CentOS-announce@centos.org https://lists.centos.org/mailman/listinfo/centos-announce
This is a minor correction to the CVE number referenced in this earlier post.
CVE-2020-10713 is the correct assignment.
This is a link to the research article: https://eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/
And a link to the post on OSS Security with details about related CVEs: https://www.openwall.com/lists/oss-security/2020/07/29/3
?
------------------------------
Message: 3 Date: Thu, 30 Jul 2020 00:08:16 +0000 From: Johnny Hughes johnny@centos.org To: centos-announce@centos.org Subject: [CentOS-announce] CESA-2020:3220 Important CentOS 7 kernel Security Update Message-ID: 20200730000816.GA18261@bstore1.rdu2.centos.org Content-Type: text/plain; charset=us-ascii
CentOS Errata and Security Advisory 2020:3220 Important
Upstream details at : https://access.redhat.com/errata/RHSA-2020:3220
The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename )
x86_64: 902acadffe6f22819077496921383eaf7b2e83dc506a6ef6024c662bf7aa219b bpftool-3.10.0-1127.18.2.el7.x86_64.rpm 28bd92ee760fa1d9d6665ee33382089eab61f13e44ea46cc77bc7bd456cc78d1 kernel-3.10.0-1127.18.2.el7.x86_64.rpm 92f9b61e88437523d873b8dc22e8a29a44e0a487b0dc5a343ed81fe35428d7c4 kernel-abi-whitelists-3.10.0-1127.18.2.el7.noarch.rpm 5f0282fc7886ba082a43a0259bd3a6038dd3aca4574bbbceef90a1aba88d9a84 kernel-debug-3.10.0-1127.18.2.el7.x86_64.rpm b39c5e6e7b1bb5fb503352e67d0cbf0f20e4040f50ea8a24450cda3d0ce316ef kernel-debug-devel-3.10.0-1127.18.2.el7.x86_64.rpm ee25595e47130f137034ab8c665d8509448f1dbba65d4bf4e7fc5292e9d2b7a5 kernel-devel-3.10.0-1127.18.2.el7.x86_64.rpm 93dbc66703ceae3244ee11c60d8af22cd10ebd7b182dea59353916941389f0df kernel-doc-3.10.0-1127.18.2.el7.noarch.rpm 686c91ea38d4d22461bb9db234d6204208818a3b9c36e36e33ffe85adf43918b kernel-headers-3.10.0-1127.18.2.el7.x86_64.rpm b5780110e4033f75514552d8118119ce545cb00b0f30aeb883d738cb2eb6eaa8 kernel-tools-3.10.0-1127.18.2.el7.x86_64.rpm cbcedbc44f834457956181f8a5f5a20a39bdddb10c7d3dd6a324beb388c71321 kernel-tools-libs-3.10.0-1127.18.2.el7.x86_64.rpm aaee5ada299aea7c953b48a29d74fb7f2c2e5e23bab0c5cfb2c409c32e16fadb kernel-tools-libs-devel-3.10.0-1127.18.2.el7.x86_64.rpm 139a42a53f1b974880e3513eb48d80a63e6071aa2a50370c7e68e9ac2ba52213 perf-3.10.0-1127.18.2.el7.x86_64.rpm 619c92886d32633e098d4e5ef558c46e6452eccdd365a8be75e5d89bafae27a7 python-perf-3.10.0-1127.18.2.el7.x86_64.rpm
Source: 6ef0b9b15b602fbf9573a22158fad1537397dc6cfb6ab507ddc31a65335e4837 kernel-3.10.0-1127.18.2.el7.src.rpm