Fedora Linux 8579 Published by

A kernel-headers security update has been released for Fedora 36.



SECURITY: Fedora 36 Update: kernel-headers-5.17.11-300.fc36


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2022-8095b23575
2022-05-28 01:13:38.361017
--------------------------------------------------------------------------------

Name : kernel-headers
Product : Fedora 36
Version : 5.17.11
Release : 300.fc36
URL :   http://www.kernel.org/
Summary : Header files for the Linux kernel for use by glibc
Description :
Kernel-headers includes the C header files that specify the interface
between the Linux kernel and userspace libraries and programs. The
header files define structures and constants that are needed for
building most standard programs and are also needed for rebuilding the
glibc package.

--------------------------------------------------------------------------------
Update Information:

The 5.17.11 stable kernel update contains a number of important fixes across the
tree.
--------------------------------------------------------------------------------
ChangeLog:

* Wed May 25 2022 Justin M. Forbes - 5.17.11-300
- Linux v5.17.11
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2086753 - CVE-2022-1729 kernel: race condition in perf_event_open leads to privilege escalation
  https://bugzilla.redhat.com/show_bug.cgi?id=2086753
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-8095b23575' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________