Fedora 27: kernel Security Update 2018-22d5fa8a90
Summary
The kernel meta package
The 4.14.11 stable kernel update contains a number of important fixes across the
tree. This also includes the KPTI patches to mitigate the Meltdown vulnerability
for x86 architectures.
[ 1 ] Bug #1530274 - CVE-2017-17857 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging mishandling of invalid variable stack read operations
https://bugzilla.redhat.com/show_bug.cgi?id=1530274
[ 2 ] Bug #1530273 - CVE-2017-17856 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging the lack of stack-pointer alignment enforcement
https://bugzilla.redhat.com/show_bug.cgi?id=1530273
[ 3 ] Bug #1530272 - CVE-2017-17855 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging improper use of pointers in place of scalars
https://bugzilla.redhat.com/show_bug.cgi?id=1530272
[ 4 ] Bug #1530271 - CVE-2017-17854 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging unrestricted integer values for pointer arithmetic
https://bugzilla.redhat.com/show_bug.cgi?id=1530271
[ 5 ] Bug #1530270 - CVE-2017-17853 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging incorrect BPF_RSH signed bounds calculations
https://bugzilla.redhat.com/show_bug.cgi?id=1530270
[ 6 ] Bug #1530269 - CVE-2017-17852 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging mishandling of 32-bit ALU ops
https://bugzilla.redhat.com/show_bug.cgi?id=1530269
[ 7 ] Bug #1529124 - CVE-2017-17862 kernel: Improper logic pruning in bpf/verifier.c
https://bugzilla.redhat.com/show_bug.cgi?id=1529124
[ 8 ] Bug #1529123 - CVE-2017-17863 kernel: integer overflow in static int check_alu_op function in bpf/verifier.c
https://bugzilla.redhat.com/show_bug.cgi?id=1529123
[ 9 ] Bug #1529120 - CVE-2017-17864 kernel: information disclosure via pointer leak in kernel/bpf/verifier.c
https://bugzilla.redhat.com/show_bug.cgi?id=1529120
su -c 'dnf upgrade kernel' at the command line.
For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/security/
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
FEDORA-2018-22d5fa8a90 2018-01-04 00:41:39.715641 Product : Fedora 27 Version : 4.14.11 Release : 300.fc27 URL : https://www.kernel.org/ Summary : The Linux kernel Description : The kernel meta package The 4.14.11 stable kernel update contains a number of important fixes across the tree. This also includes the KPTI patches to mitigate the Meltdown vulnerability for x86 architectures. [ 1 ] Bug #1530274 - CVE-2017-17857 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging mishandling of invalid variable stack read operations https://bugzilla.redhat.com/show_bug.cgi?id=1530274 [ 2 ] Bug #1530273 - CVE-2017-17856 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging the lack of stack-pointer alignment enforcement https://bugzilla.redhat.com/show_bug.cgi?id=1530273 [ 3 ] Bug #1530272 - CVE-2017-17855 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging improper use of pointers in place of scalars https://bugzilla.redhat.com/show_bug.cgi?id=1530272 [ 4 ] Bug #1530271 - CVE-2017-17854 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging unrestricted integer values for pointer arithmetic https://bugzilla.redhat.com/show_bug.cgi?id=1530271 [ 5 ] Bug #1530270 - CVE-2017-17853 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging incorrect BPF_RSH signed bounds calculations https://bugzilla.redhat.com/show_bug.cgi?id=1530270 [ 6 ] Bug #1530269 - CVE-2017-17852 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging mishandling of 32-bit ALU ops https://bugzilla.redhat.com/show_bug.cgi?id=1530269 [ 7 ] Bug #1529124 - CVE-2017-17862 kernel: Improper logic pruning in bpf/verifier.c https://bugzilla.redhat.com/show_bug.cgi?id=1529124 [ 8 ] Bug #1529123 - CVE-2017-17863 kernel: integer overflow in static int check_alu_op function in bpf/verifier.c https://bugzilla.redhat.com/show_bug.cgi?id=1529123 [ 9 ] Bug #1529120 - CVE-2017-17864 kernel: information disclosure via pointer leak in kernel/bpf/verifier.c https://bugzilla.redhat.com/show_bug.cgi?id=1529120 su -c 'dnf upgrade kernel' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/security/ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Change Log
References