Fedora Linux 8781 Published by

A kernel-5.16.10-100 security update has been released for Fedora 34.



SECURITY: Fedora 34 Update: kernel-5.16.10-100.fc34


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2022-2aa7c08b53
2022-02-24 23:26:12.563198
--------------------------------------------------------------------------------

Name : kernel
Product : Fedora 34
Version : 5.16.10
Release : 100.fc34
URL :   https://www.kernel.org/
Summary : The Linux kernel
Description :
The kernel meta package

--------------------------------------------------------------------------------
Update Information:

The 5.16.10 stable kernel update contains a number of important fixes across the
tree.
--------------------------------------------------------------------------------
ChangeLog:

* Wed Feb 16 2022 Justin M. Forbes [5.16.10-100]
- New configs for 5.16.10 (Justin M. Forbes)
* Wed Feb 16 2022 Justin M. Forbes [5.16.10-0]
- Revert "x86/PCI: Ignore E820 reservations for bridge windows on newer systems" (Justin M. Forbes)
- usb: gadget: clear related members when goto fail (Hangyu Hua)
- usb: gadget: don't release an existing dev->buf (Hangyu Hua)
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2053548 - CVE-2022-24958 kernel: use-after-free in dev->buf release in drivers/usb/gadget/legacy/inode.c
  https://bugzilla.redhat.com/show_bug.cgi?id=2053548
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-2aa7c08b53' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________