Fedora Linux 8574 Published by

A kernel security update has been released for Fedora 34.



SECURITY: Fedora 34 Update: kernel-5.16.11-100.fc34


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2022-edbd74424e
2022-02-27 03:21:19.355623
--------------------------------------------------------------------------------

Name : kernel
Product : Fedora 34
Version : 5.16.11
Release : 100.fc34
URL :   https://www.kernel.org/
Summary : The Linux kernel
Description :
The kernel meta package

--------------------------------------------------------------------------------
Update Information:

The 5.16.11 stable kernel update contains a number of important fixes across the
tree.
--------------------------------------------------------------------------------
ChangeLog:

* Wed Feb 23 2022 Justin M. Forbes [5.16.11-0]
- spec: don't overwrite auto.conf with .config (Ondrej Mosnacek)
- New configs for 5.16.10 (Justin M. Forbes)
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2043520 - CVE-2022-23222 kernel: local privileges escalation in kernel/bpf/verifier.c
  https://bugzilla.redhat.com/show_bug.cgi?id=2043520
[ 2 ] Bug #2044578 - CVE-2022-0500 kernel: Linux ebpf logic vulnerability leads to critical memory read and write gaining root privileges
  https://bugzilla.redhat.com/show_bug.cgi?id=2044578
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-edbd74424e' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________