-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2022-de4474b89d 2022-03-18 20:04:31.741365 --------------------------------------------------------------------------------
Name : kernel Product : Fedora 35 Version : 5.16.15 Release : 201.fc35 URL : https://www.kernel.org/ Summary : The Linux kernel Description : The kernel meta package
-------------------------------------------------------------------------------- Update Information:
The 5.16.15 stable kernel update includes a number of important fixes across the tree. It also includes a temporary revert of the feature that makes QNAP NFS mounts fail. We will carry this revert through the 5.16 series in attempt to give the vendor more time to come out with an update, or upstream to come out with a solution. -------------------------------------------------------------------------------- ChangeLog:
* Thu Mar 17 2022 Justin M. Forbes jforbes@fedoraproject.org [5.16.15-1] - Back out the nfs workaround and just revert the query for fs_location (Justin M. Forbes) * Wed Mar 16 2022 Justin M. Forbes jforbes@fedoraproject.org [5.16.15-0] - nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION (Jordy Zomer) - Restrict FS_LOCATIONS to NFS v4.2+ to work around Qnap knfsd-3.4.6 bug (Justin M. Forbes) - Turn on VDPA_SIM_BLOCK (Justin M. Forbes) - Fix up changelog (Justin M. Forbes) -------------------------------------------------------------------------------- References:
[ 1 ] Bug #2061633 - CVE-2022-0886 kernel: buffer overflow in IPsec ESP transformation code https://bugzilla.redhat.com/show_bug.cgi?id=2061633 [ 2 ] Bug #2063786 - CVE-2022-0995 kernel: kernel bug in the watch_queue subsystem https://bugzilla.redhat.com/show_bug.cgi?id=2063786 [ 3 ] Bug #2064232 - CVE-2022-26490 kernel: potential buffer overflows in EVT_TRANSACTION in st21nfca https://bugzilla.redhat.com/show_bug.cgi?id=2064232 [ 4 ] Bug #2064855 - CVE-2022-1011 kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes https://bugzilla.redhat.com/show_bug.cgi?id=2064855 --------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2022-de4474b89d' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys --------------------------------------------------------------------------------