——————————————————————————–
Fedora Update Notification
FEDORA-2018-8ed5eff2c0
2018-01-04 17:09:11.911891
——————————————————————————–
Name : kernel
Product : Fedora 26
Version : 4.14.11
Release : 200.fc26
URL : http://www.kernel.org/
Summary : The Linux kernel
Description :
The kernel meta package
——————————————————————————–
Update Information:
The 4.14.11 stable kernel update contains a number of important fixes across the
tree. This also includes the KPTI patches to mitigate the Meltdown vulnerability
for x86 architectures
——————————————————————————–
References:
[ 1 ] Bug #1530274 – CVE-2017-17857 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging mishandling of invalid variable stack read operations
https://bugzilla.redhat.com/show_bug.cgi?id=1530274
[ 2 ] Bug #1530273 – CVE-2017-17856 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging the lack of stack-pointer alignment enforcement
https://bugzilla.redhat.com/show_bug.cgi?id=1530273
[ 3 ] Bug #1530272 – CVE-2017-17855 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging improper use of pointers in place of scalars
https://bugzilla.redhat.com/show_bug.cgi?id=1530272
[ 4 ] Bug #1530271 – CVE-2017-17854 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging unrestricted integer values for pointer arithmetic
https://bugzilla.redhat.com/show_bug.cgi?id=1530271
[ 5 ] Bug #1530270 – CVE-2017-17853 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging incorrect BPF_RSH signed bounds calculations
https://bugzilla.redhat.com/show_bug.cgi?id=1530270
[ 6 ] Bug #1530269 – CVE-2017-17852 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging mishandling of 32-bit ALU ops
https://bugzilla.redhat.com/show_bug.cgi?id=1530269
[ 7 ] Bug #1529124 – CVE-2017-17862 kernel: Improper logic pruning in bpf/verifier.c
https://bugzilla.redhat.com/show_bug.cgi?id=1529124
[ 8 ] Bug #1529123 – CVE-2017-17863 kernel: integer overflow in static int check_alu_op function in bpf/verifier.c
https://bugzilla.redhat.com/show_bug.cgi?id=1529123
[ 9 ] Bug #1529120 – CVE-2017-17864 kernel: information disclosure via pointer leak in kernel/bpf/verifier.c
https://bugzilla.redhat.com/show_bug.cgi?id=1529120
——————————————————————————–
This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade kernel’ at the command line.
For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
——————————————————————————–
Fedora Update Notification
FEDORA-2018-22d5fa8a90
2018-01-04 00:41:39.715641
——————————————————————————–
Name : kernel
Product : Fedora 27
Version : 4.14.11
Release : 300.fc27
URL : http://www.kernel.org/
Summary : The Linux kernel
Description :
The kernel meta package
——————————————————————————–
Update Information:
The 4.14.11 stable kernel update contains a number of important fixes across the
tree. This also includes the KPTI patches to mitigate the Meltdown vulnerability
for x86 architectures.
——————————————————————————–
References:
[ 1 ] Bug #1530274 – CVE-2017-17857 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging mishandling of invalid variable stack read operations
https://bugzilla.redhat.com/show_bug.cgi?id=1530274
[ 2 ] Bug #1530273 – CVE-2017-17856 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging the lack of stack-pointer alignment enforcement
https://bugzilla.redhat.com/show_bug.cgi?id=1530273
[ 3 ] Bug #1530272 – CVE-2017-17855 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging improper use of pointers in place of scalars
https://bugzilla.redhat.com/show_bug.cgi?id=1530272
[ 4 ] Bug #1530271 – CVE-2017-17854 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging unrestricted integer values for pointer arithmetic
https://bugzilla.redhat.com/show_bug.cgi?id=1530271
[ 5 ] Bug #1530270 – CVE-2017-17853 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging incorrect BPF_RSH signed bounds calculations
https://bugzilla.redhat.com/show_bug.cgi?id=1530270
[ 6 ] Bug #1530269 – CVE-2017-17852 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging mishandling of 32-bit ALU ops
https://bugzilla.redhat.com/show_bug.cgi?id=1530269
[ 7 ] Bug #1529124 – CVE-2017-17862 kernel: Improper logic pruning in bpf/verifier.c
https://bugzilla.redhat.com/show_bug.cgi?id=1529124
[ 8 ] Bug #1529123 – CVE-2017-17863 kernel: integer overflow in static int check_alu_op function in bpf/verifier.c
https://bugzilla.redhat.com/show_bug.cgi?id=1529123
[ 9 ] Bug #1529120 – CVE-2017-17864 kernel: information disclosure via pointer leak in kernel/bpf/verifier.c
https://bugzilla.redhat.com/show_bug.cgi?id=1529120
——————————————————————————–
This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade kernel’ at the command line.
For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org