Fedora Linux 8578 Published by

A kernel security update has been released for Fedora 32.



SECURITY: Fedora 32 Update: kernel-5.11.11-100.fc32


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2021-6b0f287b8b
2021-04-02 01:14:02.164585
--------------------------------------------------------------------------------

Name : kernel
Product : Fedora 32
Version : 5.11.11
Release : 100.fc32
URL :   https://www.kernel.org/
Summary : The Linux kernel
Description :
The kernel meta package

--------------------------------------------------------------------------------
Update Information:

The 5.11.11 stable kernel update contains a number of important fixes across the
tree.
--------------------------------------------------------------------------------
ChangeLog:

* Tue Mar 30 2021 Justin M. Forbes [5.11.11-100]
- Set CONFIG_XEN_MEMORY_HOTPLUG_LIMIT as required by 5.11.11 (Justin M. Forbes)
* Tue Mar 30 2021 Justin M. Forbes [5.11.11-13]
- drm/i915: Disable LTTPR support when the DPCD rev < 1.4 (Imre Deak)
- drm/i915/dp: Prevent setting the LTTPR LT mode if no LTTPRs are detected (Imre Deak)
- drm/i915/ilk-glk: Fix link training on links with LTTPRs (Imre Deak)
- redhat/mod-blacklist.sh: Fix floppy blacklisting (Hans de Goede)
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #1945345 - CVE-2021-29646 kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c
  https://bugzilla.redhat.com/show_bug.cgi?id=1945345
[ 2 ] Bug #1945361 - CVE-2021-29647 kernel: information disclosure due to uninitialized data structure in qrtr_recvmsg function in net/qrtr/qrtr.c
  https://bugzilla.redhat.com/show_bug.cgi?id=1945361
[ 3 ] Bug #1945373 - CVE-2021-29648 kernel: DoS due to BPF subsystem does not properly consider that resolved_ids and resolved_sizes are intentionally uninitialized in the vmlinux BPF
  https://bugzilla.redhat.com/show_bug.cgi?id=1945373
[ 4 ] Bug #1945379 - CVE-2021-29649 kernel: memory leak in user mode driver due to lack of cleanup steps in kernel/usermode_driver.c and kernel/bpf/preload/bpf_preload_kern.c
  https://bugzilla.redhat.com/show_bug.cgi?id=1945379
[ 5 ] Bug #1945388 - CVE-2021-29650 kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS
  https://bugzilla.redhat.com/show_bug.cgi?id=1945388
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2021-6b0f287b8b' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys