Fedora Linux 8781 Published by

A kernel-headers security update has been released for Fedora 35.



SECURITY: Fedora 35 Update: kernel-headers-5.17.11-200.fc35


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2022-b2cde267d9
2022-05-28 01:21:01.911781
--------------------------------------------------------------------------------

Name : kernel-headers
Product : Fedora 35
Version : 5.17.11
Release : 200.fc35
URL :   http://www.kernel.org/
Summary : Header files for the Linux kernel for use by glibc
Description :
Kernel-headers includes the C header files that specify the interface
between the Linux kernel and userspace libraries and programs. The
header files define structures and constants that are needed for
building most standard programs and are also needed for rebuilding the
glibc package.

--------------------------------------------------------------------------------
Update Information:

The 5.17.11 stable kernel update contains a number of important fixes across the
tree.
--------------------------------------------------------------------------------
ChangeLog:

* Wed May 25 2022 Justin M. Forbes - 5.17.11-200
- Linux v5.17.11
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2086753 - CVE-2022-1729 kernel: race condition in perf_event_open leads to privilege escalation
  https://bugzilla.redhat.com/show_bug.cgi?id=2086753
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-b2cde267d9' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________