-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2022-8efcea6e67 2022-04-24 20:05:56.279739 --------------------------------------------------------------------------------
Name : kernel Product : Fedora 35 Version : 5.17.4 Release : 200.fc35 URL : https://www.kernel.org/ Summary : The Linux kernel Description : The kernel meta package
-------------------------------------------------------------------------------- Update Information:
The 5.17.4 kernel rebase contains new features, improved hardware support, and a number of important fixes across the tree. -------------------------------------------------------------------------------- ChangeLog:
* Wed Apr 20 2022 Justin M. Forbes jforbes@fedoraproject.org [5.17.4-0] - Add F34 and F35 as release targets (Justin M. Forbes) - Revert "net: bcmgenet: Use stronger register read/writes to assure ordering" (Justin M. Forbes) -------------------------------------------------------------------------------- References:
[ 1 ] Bug #2031194 - CVE-2021-4095 kernel: KVM: NULL pointer dereference in kvm_dirty_ring_get() in virt/kvm/dirty_ring.c https://bugzilla.redhat.com/show_bug.cgi?id=2031194 [ 2 ] Bug #2039178 - CVE-2021-4204 kernel: improper input validation may lead to privilege escalation https://bugzilla.redhat.com/show_bug.cgi?id=2039178 [ 3 ] Bug #2071051 - CVE-2022-1204 kernel: Use after free in net/ax25/af_ax25.c https://bugzilla.redhat.com/show_bug.cgi?id=2071051 --------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2022-8efcea6e67' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys --------------------------------------------------------------------------------