--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2022-9342e59a98
2022-03-18 19:12:07.465651
--------------------------------------------------------------------------------

Name        : kernel
Product     : Fedora 34
Version     : 5.16.15
Release     : 101.fc34
URL         : https://www.kernel.org/
Summary     : The Linux kernel
Description :
The kernel meta package

--------------------------------------------------------------------------------
Update Information:

The 5.16.15 stable kernel update includes a number of important fixes across the
tree. It also includes a temporary revert of the feature that makes QNAP NFS
mounts fail.  We will carry this revert through the 5.16 series in attempt to
give the vendor more time to come out with an update, or upstream to come out
with a solution.
--------------------------------------------------------------------------------
ChangeLog:

* Thu Mar 17 2022 Justin M. Forbes  [5.16.15-1]
- Back out the nfs workaround and just revert the query for fs_location (Justin M. Forbes)
* Wed Mar 16 2022 Justin M. Forbes  [5.16.15-0]
- nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION (Jordy Zomer)
- Restrict FS_LOCATIONS to NFS v4.2+ to work around Qnap knfsd-3.4.6 bug (Justin M. Forbes)
- Turn on VDPA_SIM_BLOCK (Justin M. Forbes)
- Fix up changelog (Justin M. Forbes)
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #2061633 - CVE-2022-0886 kernel: buffer overflow in IPsec ESP transformation code
        https://bugzilla.redhat.com/show_bug.cgi?id=2061633
  [ 2 ] Bug #2063786 - CVE-2022-0995 kernel: kernel bug in the watch_queue subsystem
        https://bugzilla.redhat.com/show_bug.cgi?id=2063786
  [ 3 ] Bug #2064232 - CVE-2022-26490 kernel: potential buffer overflows in EVT_TRANSACTION in st21nfca
        https://bugzilla.redhat.com/show_bug.cgi?id=2064232
  [ 4 ] Bug #2064855 - CVE-2022-1011 kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes
        https://bugzilla.redhat.com/show_bug.cgi?id=2064855
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-9342e59a98' at the command
line. For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/[email protected]
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure