Fedora Linux 8642 Published by

A kernel security update has been released for Fedora 35.



SECURITY: Fedora 35 Update: kernel-5.17.13-200.fc35


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2022-80cc9873be
2022-06-10 01:39:50.237617
--------------------------------------------------------------------------------

Name : kernel
Product : Fedora 35
Version : 5.17.13
Release : 200.fc35
URL :   https://www.kernel.org/
Summary : The Linux kernel
Description :
The kernel meta package

--------------------------------------------------------------------------------
Update Information:

The 5.17.13 stable kernel update contains a number of important fixes across the
tree.
--------------------------------------------------------------------------------
ChangeLog:

* Mon Jun 6 2022 Justin M. Forbes [5.17.13-0]
- Drop F34 from release targets (Justin M. Forbes)
- Add the fedora-stable-release.sh script to generate stable dist-git (Justin M. Forbes)
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2089815 - CVE-2022-1852 kernel: NULL pointer dereference in x86_emulate_insn may lead to DoS
  https://bugzilla.redhat.com/show_bug.cgi?id=2089815
[ 2 ] Bug #2092427 - CVE-2022-1966 kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
  https://bugzilla.redhat.com/show_bug.cgi?id=2092427
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-80cc9873be' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________