Fedora Linux 8492 Published by

A kernel security update has been released for Fedora 36.



SECURITY: Fedora 36 Update: kernel-6.2.15-100.fc36


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2023-00393126a0
2023-05-14 01:29:05.918851
--------------------------------------------------------------------------------

Name : kernel
Product : Fedora 36
Version : 6.2.15
Release : 100.fc36
URL :   https://www.kernel.org/
Summary : The Linux kernel
Description :
The kernel meta package

--------------------------------------------------------------------------------
Update Information:

The 6.2.15 stable kernel update contains a number of important fixes across the
tree.
--------------------------------------------------------------------------------
ChangeLog:

* Thu May 11 2023 Justin M. Forbes [6.2.15-0]
- redhat: configs: generic: x86: Disable CONFIG_VIDEO_OV2740 for x86 platform (Kate Hsuan)
- Add Bugs to be fixed in 6.2.15 (Justin M. Forbes)
- xfs: verify buffer contents when we skip log replay (Darrick J. Wong)
- Linux v6.2.15
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2187439 - CVE-2023-2124 kernel: OOB access in the Linux kernel's XFS subsystem
  https://bugzilla.redhat.com/show_bug.cgi?id=2187439
[ 2 ] Bug #2189388 - CVE-2023-2269 kernel: A possible deadlock in dm_get_inactive_table in dm- ioctl.c leads to dos
  https://bugzilla.redhat.com/show_bug.cgi?id=2189388
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2023-00393126a0' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________