--------------------------------------------------------------------------------Fedora Update Notification
FEDORA-2018-8ed5eff2c0
2018-01-04 17:09:11.911891
--------------------------------------------------------------------------------Name        : kernel
Product     : Fedora 26
Version     : 4.14.11
Release     : 200.fc26
URL         : https://www.kernel.org/
Summary     : The Linux kernel
Description :
The kernel meta package

--------------------------------------------------------------------------------Update Information:

The 4.14.11 stable kernel update contains a number of important fixes across the
tree. This also includes the KPTI patches to mitigate the Meltdown vulnerability
for x86 architectures
--------------------------------------------------------------------------------References:

  [ 1 ] Bug #1530274 - CVE-2017-17857 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging mishandling of invalid variable stack read operations
        https://bugzilla.redhat.com/show_bug.cgi?id=1530274
  [ 2 ] Bug #1530273 - CVE-2017-17856 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging the lack of stack-pointer alignment enforcement
        https://bugzilla.redhat.com/show_bug.cgi?id=1530273
  [ 3 ] Bug #1530272 - CVE-2017-17855 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging improper use of pointers in place of scalars
        https://bugzilla.redhat.com/show_bug.cgi?id=1530272
  [ 4 ] Bug #1530271 - CVE-2017-17854 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging unrestricted integer values for pointer arithmetic
        https://bugzilla.redhat.com/show_bug.cgi?id=1530271
  [ 5 ] Bug #1530270 - CVE-2017-17853 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging incorrect BPF_RSH signed bounds calculations
        https://bugzilla.redhat.com/show_bug.cgi?id=1530270
  [ 6 ] Bug #1530269 - CVE-2017-17852 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging mishandling of 32-bit ALU ops
        https://bugzilla.redhat.com/show_bug.cgi?id=1530269
  [ 7 ] Bug #1529124 - CVE-2017-17862 kernel: Improper logic pruning in bpf/verifier.c
        https://bugzilla.redhat.com/show_bug.cgi?id=1529124
  [ 8 ] Bug #1529123 - CVE-2017-17863 kernel: integer overflow in static int check_alu_op function in bpf/verifier.c
        https://bugzilla.redhat.com/show_bug.cgi?id=1529123
  [ 9 ] Bug #1529120 - CVE-2017-17864 kernel: information disclosure via pointer leak in kernel/bpf/verifier.c
        https://bugzilla.redhat.com/show_bug.cgi?id=1529120
--------------------------------------------------------------------------------This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade kernel' at the command line.
For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/security/
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

Fedora 26: kernel Security Update 2018-8ed5eff2c0

January 4, 2018
The 4.14.11 stable kernel update contains a number of important fixes across the tree

Summary

The kernel meta package

The 4.14.11 stable kernel update contains a number of important fixes across the

tree. This also includes the KPTI patches to mitigate the Meltdown vulnerability

for x86 architectures

[ 1 ] Bug #1530274 - CVE-2017-17857 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging mishandling of invalid variable stack read operations

https://bugzilla.redhat.com/show_bug.cgi?id=1530274

[ 2 ] Bug #1530273 - CVE-2017-17856 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging the lack of stack-pointer alignment enforcement

https://bugzilla.redhat.com/show_bug.cgi?id=1530273

[ 3 ] Bug #1530272 - CVE-2017-17855 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging improper use of pointers in place of scalars

https://bugzilla.redhat.com/show_bug.cgi?id=1530272

[ 4 ] Bug #1530271 - CVE-2017-17854 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging unrestricted integer values for pointer arithmetic

https://bugzilla.redhat.com/show_bug.cgi?id=1530271

[ 5 ] Bug #1530270 - CVE-2017-17853 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging incorrect BPF_RSH signed bounds calculations

https://bugzilla.redhat.com/show_bug.cgi?id=1530270

[ 6 ] Bug #1530269 - CVE-2017-17852 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging mishandling of 32-bit ALU ops

https://bugzilla.redhat.com/show_bug.cgi?id=1530269

[ 7 ] Bug #1529124 - CVE-2017-17862 kernel: Improper logic pruning in bpf/verifier.c

https://bugzilla.redhat.com/show_bug.cgi?id=1529124

[ 8 ] Bug #1529123 - CVE-2017-17863 kernel: integer overflow in static int check_alu_op function in bpf/verifier.c

https://bugzilla.redhat.com/show_bug.cgi?id=1529123

[ 9 ] Bug #1529120 - CVE-2017-17864 kernel: information disclosure via pointer leak in kernel/bpf/verifier.c

https://bugzilla.redhat.com/show_bug.cgi?id=1529120

su -c 'dnf upgrade kernel' at the command line.

For more information, refer to the dnf documentation available at

https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the

GPG keys used by the Fedora Project can be found at

https://fedoraproject.org/security/

package-announce mailing list -- package-announce@lists.fedoraproject.org

To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

FEDORA-2018-8ed5eff2c0 2018-01-04 17:09:11.911891 Product : Fedora 26 Version : 4.14.11 Release : 200.fc26 URL : https://www.kernel.org/ Summary : The Linux kernel Description : The kernel meta package The 4.14.11 stable kernel update contains a number of important fixes across the tree. This also includes the KPTI patches to mitigate the Meltdown vulnerability for x86 architectures [ 1 ] Bug #1530274 - CVE-2017-17857 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging mishandling of invalid variable stack read operations https://bugzilla.redhat.com/show_bug.cgi?id=1530274 [ 2 ] Bug #1530273 - CVE-2017-17856 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging the lack of stack-pointer alignment enforcement https://bugzilla.redhat.com/show_bug.cgi?id=1530273 [ 3 ] Bug #1530272 - CVE-2017-17855 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging improper use of pointers in place of scalars https://bugzilla.redhat.com/show_bug.cgi?id=1530272 [ 4 ] Bug #1530271 - CVE-2017-17854 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging unrestricted integer values for pointer arithmetic https://bugzilla.redhat.com/show_bug.cgi?id=1530271 [ 5 ] Bug #1530270 - CVE-2017-17853 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging incorrect BPF_RSH signed bounds calculations https://bugzilla.redhat.com/show_bug.cgi?id=1530270 [ 6 ] Bug #1530269 - CVE-2017-17852 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging mishandling of 32-bit ALU ops https://bugzilla.redhat.com/show_bug.cgi?id=1530269 [ 7 ] Bug #1529124 - CVE-2017-17862 kernel: Improper logic pruning in bpf/verifier.c https://bugzilla.redhat.com/show_bug.cgi?id=1529124 [ 8 ] Bug #1529123 - CVE-2017-17863 kernel: integer overflow in static int check_alu_op function in bpf/verifier.c https://bugzilla.redhat.com/show_bug.cgi?id=1529123 [ 9 ] Bug #1529120 - CVE-2017-17864 kernel: information disclosure via pointer leak in kernel/bpf/verifier.c https://bugzilla.redhat.com/show_bug.cgi?id=1529120 su -c 'dnf upgrade kernel' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/security/ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

Change Log

References

Update Instructions

Severity
Product : Fedora 26
Version : 4.14.11
Release : 200.fc26
URL : https://www.kernel.org/
Summary : The Linux kernel

Related News