The 5.11.11 stable kernel update contains a number of important fixes across the tree.

Reboot Required
After installing this update it is required that you reboot your system to ensure the changes supplied by this update are applied properly.

How to install

sudo dnf upgrade --refresh --advisory=FEDORA-2021-6b0f287b8b

This update has been submitted for testing by jforbes.

a year ago

This update's test gating status has been changed to 'ignored'.

a year ago

This update's test gating status has been changed to 'waiting'.

a year ago

This update's test gating status has been changed to 'ignored'.

a year ago

This update has been pushed to testing.

a year ago
karma
User Icon geraldosimiao commented & provided feedback a year ago
karma

Works fine, all tests passed.

This update can be pushed to stable now if the maintainer wishes

a year ago

This update has been submitted for stable by jforbes.

a year ago

jforbes edited this update.

a year ago

This update has been pushed to stable.

a year ago

Please login to add feedback.

Metadata
Type
security
Severity
medium
Karma
2
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Stable by Karma
disabled
Stable by Time
disabled
Dates
submitted
a year ago
in testing
a year ago
in stable
a year ago
modified
a year ago
BZ#1945345 CVE-2021-29646 kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c
0
0
BZ#1945346 CVE-2021-29646 kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c [fedora-all]
0
0
BZ#1945361 CVE-2021-29647 kernel: information disclosure due to uninitialized data structure in qrtr_recvmsg function in net/qrtr/qrtr.c
0
0
BZ#1945362 CVE-2021-29647 kernel: information disclosure due to uninitialized data structure in qrtr_recvmsg function in net/qrtr/qrtr.c [fedora-all]
0
0
BZ#1945373 CVE-2021-29648 kernel: DoS due to BPF subsystem does not properly consider that resolved_ids and resolved_sizes are intentionally uninitialized in the vmlinux BPF
0
0
BZ#1945374 CVE-2021-29648 kernel: DoS due to BPF subsystem does not properly consider that resolved_ids and resolved_sizes are intentionally uninitialized in the vmlinux BPF [fedora-all]
0
0
BZ#1945379 CVE-2021-29649 kernel: memory leak in user mode driver due to lack of cleanup steps in kernel/usermode_driver.c and kernel/bpf/preload/bpf_preload_kern.c
0
0
BZ#1945384 CVE-2021-29649 kernel: memory leak in user mode driver due to lack of cleanup steps in kernel/usermode_driver.c and kernel/bpf/preload/bpf_preload_kern.c [fedora-all]
0
0
BZ#1945388 CVE-2021-29650 kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS
0
0
BZ#1945389 CVE-2021-29650 kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS [fedora-all]
0
0

Automated Test Results

ignored

Test Cases

0 1 Test Case kernel regression