Operating System:

[RedHat]

Published:

16 November 2017

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.2907
                    Kernel security and bug fix update
                             16 November 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           kernel
Publisher:         Red Hat
Operating System:  Red Hat Enterprise Linux 6
Impact/Access:     Root Compromise   -- Existing Account
                   Denial of Service -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-1000112 CVE-2017-1000111 CVE-2017-14106

Reference:         ESB-2017.2401
                   ESB-2017.2537
                   ESB-2017.2650

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2017:3200

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: kernel security and bug fix update
Advisory ID:       RHSA-2017:3200-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2017:3200
Issue date:        2017-11-14
CVE Names:         CVE-2017-14106 CVE-2017-1000111 CVE-2017-1000112 
=====================================================================

1. Summary:

An update for kernel is now available for Red Hat Enterprise Linux 6.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop (v. 6) - i386, noarch, x86_64
Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node (v. 6) - noarch, x86_64
Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64
Red Hat Enterprise Linux Server (v. 6) - i386, noarch, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64
Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64

3. Description:

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security Fix(es):

* A race condition issue leading to a use-after-free flaw was found in the
way the raw packet sockets are implemented in the Linux kernel networking
subsystem handling synchronization. A local user able to open a raw packet
socket (requires the CAP_NET_RAW capability) could use this flaw to elevate
their privileges on the system. (CVE-2017-1000111, Important)

* An exploitable memory corruption flaw was found in the Linux kernel. The
append path can be erroneously switched from UFO to non-UFO in
ip_ufo_append_data() when building an UFO packet with MSG_MORE option. If
unprivileged user namespaces are available, this flaw can be exploited to
gain root privileges. (CVE-2017-1000112, Important)

* A divide-by-zero vulnerability was found in the __tcp_select_window
function in the Linux kernel. This can result in a kernel panic causing a
local denial of service. (CVE-2017-14106, Moderate)

Red Hat would like to thank Willem de Bruijn for reporting CVE-2017-1000111
and Andrey Konovalov for reporting CVE-2017-1000112.

Bug Fix(es):

* When the operating system was booted with Red Hat Enterprise
Virtualization, and the eh_deadline sysfs parameter was set to 10s, the
Storage Area Network (SAN) issues caused eh_deadline to trigger with no
handler. Consequently, a kernel panic occurred. This update fixes the lpfc
driver, thus preventing the kernel panic under described circumstances.
(BZ#1487220)

* When an NFS server returned the NFS4ERR_BAD_SEQID error to an OPEN
request, the open-owner was removed from the state_owners rbtree.
Consequently, NFS4 client infinite loop that required a reboot to recover
occurred. This update changes NFS4ERR_BAD_SEQID handling to leave the
open-owner in the state_owners rbtree by updating the create_time parameter
so that it looks like a new open-owner. As a result, an NFS4 client is now
able to recover without falling into the infinite recovery loop after
receiving NFS4ERR_BAD_SEQID. (BZ#1491123)

* If an NFS client attempted to mount NFSv3 shares from an NFS server
exported directly to the client's IP address, and this NFS client had
already mounted other shares that originated from the same server but were
exported to the subnetwork which this client was part of, the auth.unix.ip
cache expiration was not handled correctly. Consequently, the client
received the 'stale file handle' errors when trying to mount the share.
This update fixes handling of the cache expiration, and the NFSv3 shares
now mount as expected without producing the 'stale file handle' errors.
(BZ#1497976)

* When running a script that raised the tx ring count to its maximum value
supported by the Solarflare Network Interface Controller (NIC) driver, the
EF10 family NICs allowed the settings exceeding the hardware's capability.
Consequently, the Solarflare hardware became unusable with Red Hat
Entepripse Linux 6. This update fixes the sfc driver, so that the tx ring
can have maximum 2048 entries for all EF10 NICs. As a result, the
Solarflare hardware no longer becomes unusable with Red Hat Entepripse
Linux 6 due to this bug. (BZ#1498019)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1479304 - CVE-2017-1000111 kernel: Heap out-of-bounds in AF_PACKET sockets
1479307 - CVE-2017-1000112 kernel: Exploitable memory corruption due to UFO
          to non-UFO path switch
1487295 - CVE-2017-14106 kernel: Divide-by-zero in __tcp_select_window

6. Package List:

Red Hat Enterprise Linux Desktop (v. 6):

Source:
kernel-2.6.32-696.16.1.el6.src.rpm

i386:
kernel-2.6.32-696.16.1.el6.i686.rpm
kernel-debug-2.6.32-696.16.1.el6.i686.rpm
kernel-debug-debuginfo-2.6.32-696.16.1.el6.i686.rpm
kernel-debug-devel-2.6.32-696.16.1.el6.i686.rpm
kernel-debuginfo-2.6.32-696.16.1.el6.i686.rpm
kernel-debuginfo-common-i686-2.6.32-696.16.1.el6.i686.rpm
kernel-devel-2.6.32-696.16.1.el6.i686.rpm
kernel-headers-2.6.32-696.16.1.el6.i686.rpm
perf-2.6.32-696.16.1.el6.i686.rpm
perf-debuginfo-2.6.32-696.16.1.el6.i686.rpm
python-perf-debuginfo-2.6.32-696.16.1.el6.i686.rpm

noarch:
kernel-abi-whitelists-2.6.32-696.16.1.el6.noarch.rpm
kernel-doc-2.6.32-696.16.1.el6.noarch.rpm
kernel-firmware-2.6.32-696.16.1.el6.noarch.rpm

x86_64:
kernel-2.6.32-696.16.1.el6.x86_64.rpm
kernel-debug-2.6.32-696.16.1.el6.x86_64.rpm
kernel-debug-debuginfo-2.6.32-696.16.1.el6.i686.rpm
kernel-debug-debuginfo-2.6.32-696.16.1.el6.x86_64.rpm
kernel-debug-devel-2.6.32-696.16.1.el6.i686.rpm
kernel-debug-devel-2.6.32-696.16.1.el6.x86_64.rpm
kernel-debuginfo-2.6.32-696.16.1.el6.i686.rpm
kernel-debuginfo-2.6.32-696.16.1.el6.x86_64.rpm
kernel-debuginfo-common-i686-2.6.32-696.16.1.el6.i686.rpm
kernel-debuginfo-common-x86_64-2.6.32-696.16.1.el6.x86_64.rpm
kernel-devel-2.6.32-696.16.1.el6.x86_64.rpm
kernel-headers-2.6.32-696.16.1.el6.x86_64.rpm
perf-2.6.32-696.16.1.el6.x86_64.rpm
perf-debuginfo-2.6.32-696.16.1.el6.i686.rpm
perf-debuginfo-2.6.32-696.16.1.el6.x86_64.rpm
python-perf-debuginfo-2.6.32-696.16.1.el6.i686.rpm
python-perf-debuginfo-2.6.32-696.16.1.el6.x86_64.rpm

Red Hat Enterprise Linux Desktop Optional (v. 6):

i386:
kernel-debug-debuginfo-2.6.32-696.16.1.el6.i686.rpm
kernel-debuginfo-2.6.32-696.16.1.el6.i686.rpm
kernel-debuginfo-common-i686-2.6.32-696.16.1.el6.i686.rpm
perf-debuginfo-2.6.32-696.16.1.el6.i686.rpm
python-perf-2.6.32-696.16.1.el6.i686.rpm
python-perf-debuginfo-2.6.32-696.16.1.el6.i686.rpm

x86_64:
kernel-debug-debuginfo-2.6.32-696.16.1.el6.x86_64.rpm
kernel-debuginfo-2.6.32-696.16.1.el6.x86_64.rpm
kernel-debuginfo-common-x86_64-2.6.32-696.16.1.el6.x86_64.rpm
perf-debuginfo-2.6.32-696.16.1.el6.x86_64.rpm
python-perf-2.6.32-696.16.1.el6.x86_64.rpm
python-perf-debuginfo-2.6.32-696.16.1.el6.x86_64.rpm

Red Hat Enterprise Linux HPC Node (v. 6):

Source:
kernel-2.6.32-696.16.1.el6.src.rpm

noarch:
kernel-abi-whitelists-2.6.32-696.16.1.el6.noarch.rpm
kernel-doc-2.6.32-696.16.1.el6.noarch.rpm
kernel-firmware-2.6.32-696.16.1.el6.noarch.rpm

x86_64:
kernel-2.6.32-696.16.1.el6.x86_64.rpm
kernel-debug-2.6.32-696.16.1.el6.x86_64.rpm
kernel-debug-debuginfo-2.6.32-696.16.1.el6.i686.rpm
kernel-debug-debuginfo-2.6.32-696.16.1.el6.x86_64.rpm
kernel-debug-devel-2.6.32-696.16.1.el6.i686.rpm
kernel-debug-devel-2.6.32-696.16.1.el6.x86_64.rpm
kernel-debuginfo-2.6.32-696.16.1.el6.i686.rpm
kernel-debuginfo-2.6.32-696.16.1.el6.x86_64.rpm
kernel-debuginfo-common-i686-2.6.32-696.16.1.el6.i686.rpm
kernel-debuginfo-common-x86_64-2.6.32-696.16.1.el6.x86_64.rpm
kernel-devel-2.6.32-696.16.1.el6.x86_64.rpm
kernel-headers-2.6.32-696.16.1.el6.x86_64.rpm
perf-2.6.32-696.16.1.el6.x86_64.rpm
perf-debuginfo-2.6.32-696.16.1.el6.i686.rpm
perf-debuginfo-2.6.32-696.16.1.el6.x86_64.rpm
python-perf-debuginfo-2.6.32-696.16.1.el6.i686.rpm
python-perf-debuginfo-2.6.32-696.16.1.el6.x86_64.rpm

Red Hat Enterprise Linux HPC Node Optional (v. 6):

x86_64:
kernel-debug-debuginfo-2.6.32-696.16.1.el6.x86_64.rpm
kernel-debuginfo-2.6.32-696.16.1.el6.x86_64.rpm
kernel-debuginfo-common-x86_64-2.6.32-696.16.1.el6.x86_64.rpm
perf-debuginfo-2.6.32-696.16.1.el6.x86_64.rpm
python-perf-2.6.32-696.16.1.el6.x86_64.rpm
python-perf-debuginfo-2.6.32-696.16.1.el6.x86_64.rpm

Red Hat Enterprise Linux Server (v. 6):

Source:
kernel-2.6.32-696.16.1.el6.src.rpm

i386:
kernel-2.6.32-696.16.1.el6.i686.rpm
kernel-debug-2.6.32-696.16.1.el6.i686.rpm
kernel-debug-debuginfo-2.6.32-696.16.1.el6.i686.rpm
kernel-debug-devel-2.6.32-696.16.1.el6.i686.rpm
kernel-debuginfo-2.6.32-696.16.1.el6.i686.rpm
kernel-debuginfo-common-i686-2.6.32-696.16.1.el6.i686.rpm
kernel-devel-2.6.32-696.16.1.el6.i686.rpm
kernel-headers-2.6.32-696.16.1.el6.i686.rpm
perf-2.6.32-696.16.1.el6.i686.rpm
perf-debuginfo-2.6.32-696.16.1.el6.i686.rpm
python-perf-debuginfo-2.6.32-696.16.1.el6.i686.rpm

noarch:
kernel-abi-whitelists-2.6.32-696.16.1.el6.noarch.rpm
kernel-doc-2.6.32-696.16.1.el6.noarch.rpm
kernel-firmware-2.6.32-696.16.1.el6.noarch.rpm

ppc64:
kernel-2.6.32-696.16.1.el6.ppc64.rpm
kernel-bootwrapper-2.6.32-696.16.1.el6.ppc64.rpm
kernel-debug-2.6.32-696.16.1.el6.ppc64.rpm
kernel-debug-debuginfo-2.6.32-696.16.1.el6.ppc64.rpm
kernel-debug-devel-2.6.32-696.16.1.el6.ppc64.rpm
kernel-debuginfo-2.6.32-696.16.1.el6.ppc64.rpm
kernel-debuginfo-common-ppc64-2.6.32-696.16.1.el6.ppc64.rpm
kernel-devel-2.6.32-696.16.1.el6.ppc64.rpm
kernel-headers-2.6.32-696.16.1.el6.ppc64.rpm
perf-2.6.32-696.16.1.el6.ppc64.rpm
perf-debuginfo-2.6.32-696.16.1.el6.ppc64.rpm
python-perf-debuginfo-2.6.32-696.16.1.el6.ppc64.rpm

s390x:
kernel-2.6.32-696.16.1.el6.s390x.rpm
kernel-debug-2.6.32-696.16.1.el6.s390x.rpm
kernel-debug-debuginfo-2.6.32-696.16.1.el6.s390x.rpm
kernel-debug-devel-2.6.32-696.16.1.el6.s390x.rpm
kernel-debuginfo-2.6.32-696.16.1.el6.s390x.rpm
kernel-debuginfo-common-s390x-2.6.32-696.16.1.el6.s390x.rpm
kernel-devel-2.6.32-696.16.1.el6.s390x.rpm
kernel-headers-2.6.32-696.16.1.el6.s390x.rpm
kernel-kdump-2.6.32-696.16.1.el6.s390x.rpm
kernel-kdump-debuginfo-2.6.32-696.16.1.el6.s390x.rpm
kernel-kdump-devel-2.6.32-696.16.1.el6.s390x.rpm
perf-2.6.32-696.16.1.el6.s390x.rpm
perf-debuginfo-2.6.32-696.16.1.el6.s390x.rpm
python-perf-debuginfo-2.6.32-696.16.1.el6.s390x.rpm

x86_64:
kernel-2.6.32-696.16.1.el6.x86_64.rpm
kernel-debug-2.6.32-696.16.1.el6.x86_64.rpm
kernel-debug-debuginfo-2.6.32-696.16.1.el6.i686.rpm
kernel-debug-debuginfo-2.6.32-696.16.1.el6.x86_64.rpm
kernel-debug-devel-2.6.32-696.16.1.el6.i686.rpm
kernel-debug-devel-2.6.32-696.16.1.el6.x86_64.rpm
kernel-debuginfo-2.6.32-696.16.1.el6.i686.rpm
kernel-debuginfo-2.6.32-696.16.1.el6.x86_64.rpm
kernel-debuginfo-common-i686-2.6.32-696.16.1.el6.i686.rpm
kernel-debuginfo-common-x86_64-2.6.32-696.16.1.el6.x86_64.rpm
kernel-devel-2.6.32-696.16.1.el6.x86_64.rpm
kernel-headers-2.6.32-696.16.1.el6.x86_64.rpm
perf-2.6.32-696.16.1.el6.x86_64.rpm
perf-debuginfo-2.6.32-696.16.1.el6.i686.rpm
perf-debuginfo-2.6.32-696.16.1.el6.x86_64.rpm
python-perf-debuginfo-2.6.32-696.16.1.el6.i686.rpm
python-perf-debuginfo-2.6.32-696.16.1.el6.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 6):

i386:
kernel-debug-debuginfo-2.6.32-696.16.1.el6.i686.rpm
kernel-debuginfo-2.6.32-696.16.1.el6.i686.rpm
kernel-debuginfo-common-i686-2.6.32-696.16.1.el6.i686.rpm
perf-debuginfo-2.6.32-696.16.1.el6.i686.rpm
python-perf-2.6.32-696.16.1.el6.i686.rpm
python-perf-debuginfo-2.6.32-696.16.1.el6.i686.rpm

ppc64:
kernel-debug-debuginfo-2.6.32-696.16.1.el6.ppc64.rpm
kernel-debuginfo-2.6.32-696.16.1.el6.ppc64.rpm
kernel-debuginfo-common-ppc64-2.6.32-696.16.1.el6.ppc64.rpm
perf-debuginfo-2.6.32-696.16.1.el6.ppc64.rpm
python-perf-2.6.32-696.16.1.el6.ppc64.rpm
python-perf-debuginfo-2.6.32-696.16.1.el6.ppc64.rpm

s390x:
kernel-debug-debuginfo-2.6.32-696.16.1.el6.s390x.rpm
kernel-debuginfo-2.6.32-696.16.1.el6.s390x.rpm
kernel-debuginfo-common-s390x-2.6.32-696.16.1.el6.s390x.rpm
kernel-kdump-debuginfo-2.6.32-696.16.1.el6.s390x.rpm
perf-debuginfo-2.6.32-696.16.1.el6.s390x.rpm
python-perf-2.6.32-696.16.1.el6.s390x.rpm
python-perf-debuginfo-2.6.32-696.16.1.el6.s390x.rpm

x86_64:
kernel-debug-debuginfo-2.6.32-696.16.1.el6.x86_64.rpm
kernel-debuginfo-2.6.32-696.16.1.el6.x86_64.rpm
kernel-debuginfo-common-x86_64-2.6.32-696.16.1.el6.x86_64.rpm
perf-debuginfo-2.6.32-696.16.1.el6.x86_64.rpm
python-perf-2.6.32-696.16.1.el6.x86_64.rpm
python-perf-debuginfo-2.6.32-696.16.1.el6.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 6):

Source:
kernel-2.6.32-696.16.1.el6.src.rpm

i386:
kernel-2.6.32-696.16.1.el6.i686.rpm
kernel-debug-2.6.32-696.16.1.el6.i686.rpm
kernel-debug-debuginfo-2.6.32-696.16.1.el6.i686.rpm
kernel-debug-devel-2.6.32-696.16.1.el6.i686.rpm
kernel-debuginfo-2.6.32-696.16.1.el6.i686.rpm
kernel-debuginfo-common-i686-2.6.32-696.16.1.el6.i686.rpm
kernel-devel-2.6.32-696.16.1.el6.i686.rpm
kernel-headers-2.6.32-696.16.1.el6.i686.rpm
perf-2.6.32-696.16.1.el6.i686.rpm
perf-debuginfo-2.6.32-696.16.1.el6.i686.rpm
python-perf-debuginfo-2.6.32-696.16.1.el6.i686.rpm

noarch:
kernel-abi-whitelists-2.6.32-696.16.1.el6.noarch.rpm
kernel-doc-2.6.32-696.16.1.el6.noarch.rpm
kernel-firmware-2.6.32-696.16.1.el6.noarch.rpm

x86_64:
kernel-2.6.32-696.16.1.el6.x86_64.rpm
kernel-debug-2.6.32-696.16.1.el6.x86_64.rpm
kernel-debug-debuginfo-2.6.32-696.16.1.el6.i686.rpm
kernel-debug-debuginfo-2.6.32-696.16.1.el6.x86_64.rpm
kernel-debug-devel-2.6.32-696.16.1.el6.i686.rpm
kernel-debug-devel-2.6.32-696.16.1.el6.x86_64.rpm
kernel-debuginfo-2.6.32-696.16.1.el6.i686.rpm
kernel-debuginfo-2.6.32-696.16.1.el6.x86_64.rpm
kernel-debuginfo-common-i686-2.6.32-696.16.1.el6.i686.rpm
kernel-debuginfo-common-x86_64-2.6.32-696.16.1.el6.x86_64.rpm
kernel-devel-2.6.32-696.16.1.el6.x86_64.rpm
kernel-headers-2.6.32-696.16.1.el6.x86_64.rpm
perf-2.6.32-696.16.1.el6.x86_64.rpm
perf-debuginfo-2.6.32-696.16.1.el6.i686.rpm
perf-debuginfo-2.6.32-696.16.1.el6.x86_64.rpm
python-perf-debuginfo-2.6.32-696.16.1.el6.i686.rpm
python-perf-debuginfo-2.6.32-696.16.1.el6.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 6):

i386:
kernel-debug-debuginfo-2.6.32-696.16.1.el6.i686.rpm
kernel-debuginfo-2.6.32-696.16.1.el6.i686.rpm
kernel-debuginfo-common-i686-2.6.32-696.16.1.el6.i686.rpm
perf-debuginfo-2.6.32-696.16.1.el6.i686.rpm
python-perf-2.6.32-696.16.1.el6.i686.rpm
python-perf-debuginfo-2.6.32-696.16.1.el6.i686.rpm

x86_64:
kernel-debug-debuginfo-2.6.32-696.16.1.el6.x86_64.rpm
kernel-debuginfo-2.6.32-696.16.1.el6.x86_64.rpm
kernel-debuginfo-common-x86_64-2.6.32-696.16.1.el6.x86_64.rpm
perf-debuginfo-2.6.32-696.16.1.el6.x86_64.rpm
python-perf-2.6.32-696.16.1.el6.x86_64.rpm
python-perf-debuginfo-2.6.32-696.16.1.el6.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2017-14106
https://access.redhat.com/security/cve/CVE-2017-1000111
https://access.redhat.com/security/cve/CVE-2017-1000112
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2017 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFaDArIXlSAg2UNWIIRAi5yAJwPcea+LOAY8YRgk9+lge9ft6riYwCgvxbU
IWqUGR5V5IqbbbtVWOPNqXo=
=l9Go
- -----END PGP SIGNATURE-----

- --
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=7mDq
-----END PGP SIGNATURE-----