Fedora Linux 8578 Published by

A kernel security update has been released for Fedora 36.



SECURITY: Fedora 36 Update: kernel-5.17.13-300.fc36


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2022-8269eaf361
2022-06-10 01:13:41.743461
--------------------------------------------------------------------------------

Name : kernel
Product : Fedora 36
Version : 5.17.13
Release : 300.fc36
URL :   https://www.kernel.org/
Summary : The Linux kernel
Description :
The kernel meta package

--------------------------------------------------------------------------------
Update Information:

The 5.17.13 stable kernel update contains a number of important fixes across the
tree.
--------------------------------------------------------------------------------
ChangeLog:

* Mon Jun 6 2022 Justin M. Forbes [5.17.13-0]
- Drop F34 from release targets (Justin M. Forbes)
- Add the fedora-stable-release.sh script to generate stable dist-git (Justin M. Forbes)
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2089815 - CVE-2022-1852 kernel: NULL pointer dereference in x86_emulate_insn may lead to DoS
  https://bugzilla.redhat.com/show_bug.cgi?id=2089815
[ 2 ] Bug #2092427 - CVE-2022-1966 kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
  https://bugzilla.redhat.com/show_bug.cgi?id=2092427
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-8269eaf361' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________