Fedora alert FEDORA-2021-05152dbcf5 (kernel)
From: | updates@fedoraproject.org | |
To: | package-announce@lists.fedoraproject.org | |
Subject: | [SECURITY] Fedora 33 Update: kernel-5.11.20-200.fc33 | |
Date: | Sun, 16 May 2021 02:06:51 +0000 | |
Message-ID: | <20210516020651.D544830A4E31@bastion01.iad2.fedoraproject.org> | |
Archive-link: | Article |
-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2021-05152dbcf5 2021-05-16 02:06:09.511519 -------------------------------------------------------------------------------- Name : kernel Product : Fedora 33 Version : 5.11.20 Release : 200.fc33 URL : https://www.kernel.org/ Summary : The Linux kernel Description : The kernel meta package -------------------------------------------------------------------------------- Update Information: The 5.11.20 stable kernel update contains a number of important fixes across the tree. -------------------------------------------------------------------------------- ChangeLog: * Wed May 12 2021 Justin M. Forbes <jforbes@fedoraproject.org> [5.11.20-0] - io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers (Thadeu Lima de Souza Cascardo) - bpf: Prevent writable memory-mapping of read-only ringbuf pages (Andrii Nakryiko) - bpf, ringbuf: Deny reserve of buffers larger than ringbuf (Thadeu Lima de Souza Cascardo) - bpf: Fix alu32 const subreg bound tracking on bitwise operations (Daniel Borkmann) - net/nfc: fix use-after-free llcp_sock_bind/connect (Or Cohen) -------------------------------------------------------------------------------- References: [ 1 ] Bug #1959514 - CVE-2021-23134 kernel: use-after-free in nfc sockets https://bugzilla.redhat.com/show_bug.cgi?id=1959514 [ 2 ] Bug #1959556 - CVE-2021-3490 kernel: Linux kernel eBPF bitwise ops ALU32 bounds tracking https://bugzilla.redhat.com/show_bug.cgi?id=1959556 [ 3 ] Bug #1959559 - CVE-2021-3489 kernel: Linux kernel eBPF RINGBUF map oversized allocation https://bugzilla.redhat.com/show_bug.cgi?id=1959559 [ 4 ] Bug #1959565 - CVE-2021-3491 kernel: Linux kernel io_uring PROVIDE_BUFFERS MAX_RW_COUNT bypass https://bugzilla.redhat.com/show_bug.cgi?id=1959565 -------------------------------------------------------------------------------- This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2021-05152dbcf5' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgr... All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-cond... List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-ann... Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure