You are here
Home > Preporuke > Sigurnosni nedostaci jezgre operacijskog sustava

Sigurnosni nedostaci jezgre operacijskog sustava

——————————————————————————–
Fedora Update Notification
FEDORA-2018-8ed5eff2c0
2018-01-04 17:09:11.911891
——————————————————————————–

Name        : kernel
Product     : Fedora 26
Version     : 4.14.11
Release     : 200.fc26
URL         : http://www.kernel.org/
Summary     : The Linux kernel
Description :
The kernel meta package

——————————————————————————–
Update Information:

The 4.14.11 stable kernel update contains a number of important fixes across the
tree. This also includes the KPTI patches to mitigate the Meltdown vulnerability
for x86 architectures
——————————————————————————–
References:

  [ 1 ] Bug #1530274 – CVE-2017-17857 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging mishandling of invalid variable stack read operations
        https://bugzilla.redhat.com/show_bug.cgi?id=1530274
  [ 2 ] Bug #1530273 – CVE-2017-17856 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging the lack of stack-pointer alignment enforcement
        https://bugzilla.redhat.com/show_bug.cgi?id=1530273
  [ 3 ] Bug #1530272 – CVE-2017-17855 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging improper use of pointers in place of scalars
        https://bugzilla.redhat.com/show_bug.cgi?id=1530272
  [ 4 ] Bug #1530271 – CVE-2017-17854 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging unrestricted integer values for pointer arithmetic
        https://bugzilla.redhat.com/show_bug.cgi?id=1530271
  [ 5 ] Bug #1530270 – CVE-2017-17853 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging incorrect BPF_RSH signed bounds calculations
        https://bugzilla.redhat.com/show_bug.cgi?id=1530270
  [ 6 ] Bug #1530269 – CVE-2017-17852 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging mishandling of 32-bit ALU ops
        https://bugzilla.redhat.com/show_bug.cgi?id=1530269
  [ 7 ] Bug #1529124 – CVE-2017-17862 kernel: Improper logic pruning in bpf/verifier.c
        https://bugzilla.redhat.com/show_bug.cgi?id=1529124
  [ 8 ] Bug #1529123 – CVE-2017-17863 kernel: integer overflow in static int check_alu_op function in bpf/verifier.c
        https://bugzilla.redhat.com/show_bug.cgi?id=1529123
  [ 9 ] Bug #1529120 – CVE-2017-17864 kernel: information disclosure via pointer leak in kernel/bpf/verifier.c
        https://bugzilla.redhat.com/show_bug.cgi?id=1529120
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade kernel’ at the command line.
For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

——————————————————————————–
Fedora Update Notification
FEDORA-2018-22d5fa8a90
2018-01-04 00:41:39.715641
——————————————————————————–

Name : kernel
Product : Fedora 27
Version : 4.14.11
Release : 300.fc27
URL : http://www.kernel.org/
Summary : The Linux kernel
Description :
The kernel meta package

——————————————————————————–
Update Information:

The 4.14.11 stable kernel update contains a number of important fixes across the
tree. This also includes the KPTI patches to mitigate the Meltdown vulnerability
for x86 architectures.
——————————————————————————–
References:

[ 1 ] Bug #1530274 – CVE-2017-17857 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging mishandling of invalid variable stack read operations
https://bugzilla.redhat.com/show_bug.cgi?id=1530274
[ 2 ] Bug #1530273 – CVE-2017-17856 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging the lack of stack-pointer alignment enforcement
https://bugzilla.redhat.com/show_bug.cgi?id=1530273
[ 3 ] Bug #1530272 – CVE-2017-17855 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging improper use of pointers in place of scalars
https://bugzilla.redhat.com/show_bug.cgi?id=1530272
[ 4 ] Bug #1530271 – CVE-2017-17854 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging unrestricted integer values for pointer arithmetic
https://bugzilla.redhat.com/show_bug.cgi?id=1530271
[ 5 ] Bug #1530270 – CVE-2017-17853 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging incorrect BPF_RSH signed bounds calculations
https://bugzilla.redhat.com/show_bug.cgi?id=1530270
[ 6 ] Bug #1530269 – CVE-2017-17852 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging mishandling of 32-bit ALU ops
https://bugzilla.redhat.com/show_bug.cgi?id=1530269
[ 7 ] Bug #1529124 – CVE-2017-17862 kernel: Improper logic pruning in bpf/verifier.c
https://bugzilla.redhat.com/show_bug.cgi?id=1529124
[ 8 ] Bug #1529123 – CVE-2017-17863 kernel: integer overflow in static int check_alu_op function in bpf/verifier.c
https://bugzilla.redhat.com/show_bug.cgi?id=1529123
[ 9 ] Bug #1529120 – CVE-2017-17864 kernel: information disclosure via pointer leak in kernel/bpf/verifier.c
https://bugzilla.redhat.com/show_bug.cgi?id=1529120
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade kernel’ at the command line.
For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

Top
More in Preporuke
Sigurnosni nedostatak jezgre operacijskog sustava

Otkriven je sigurnosni nedostatak u programskom paketu kernel-firmware za operacijski sustav SUSE. Otkriveni nedostatak potencijalnim napadačima omogućuje otkrivanje osjetljivih informacija....

Close