[FEDORA-2022-9342e59a98] Fedora 34: kernel
Severity
High
Affected Packages
1
CVEs
4
The 5.16.15 stable kernel update includes a number of important fixes across the
tree. It also includes a temporary revert of the feature that makes QNAP NFS
mounts fail. We will carry this revert through the 5.16 series in attempt to
give the vendor more time to come out with an update, or upstream to come out
with a solution.
Package | Affected Version |
---|---|
pkg:rpm/fedora/kernel?distro=fedora-34 | < 5.16.15.101.fc34 |
- ID
- FEDORA-2022-9342e59a98
- Severity
- high
- Severity from
- CVE-2022-0995
- URL
- https://bodhi.fedoraproject.org/updates/FEDORA-2022-9342e59a98
- Published
-
2022-03-18T19:15:59
(2 years ago) - Modified
-
2022-03-18T19:15:59
(2 years ago) - Rights
- Copyright 2022 Red Hat, Inc.
- Other Advisories
-
- ALAS-2022-1581
- ALAS-2022-1591
- ALAS2-2022-1774
- ALAS2-2022-1793
- ALAS2-2024-2569
- ALSA-2022:1988
- DSA-5127-1
- DSA-5173-1
- ELSA-2022-1988
- ELSA-2022-9761
- FEDORA-2022-de4474b89d
- MS:CVE-2022-1011
- MS:CVE-2022-26490
- openSUSE-SU-2022:1037-1
- openSUSE-SU-2022:1039-1
- RHSA-2022:1975
- RHSA-2022:1988
- RLSA-2022:1988
- SSA:2022-129-01
- SUSE-SU-2022:1037-1
- SUSE-SU-2022:1038-1
- SUSE-SU-2022:1039-1
- SUSE-SU-2022:1163-1
- SUSE-SU-2022:1183-1
- SUSE-SU-2022:1196-1
- SUSE-SU-2022:1197-1
- SUSE-SU-2022:1255-1
- SUSE-SU-2022:1256-1
- SUSE-SU-2022:1257-1
- SUSE-SU-2022:1266-1
- SUSE-SU-2022:1267-1
- SUSE-SU-2022:1270-1
- SUSE-SU-2022:1283-1
- SUSE-SU-2022:1318-1
- SUSE-SU-2022:1320-1
- SUSE-SU-2022:1322-1
- SUSE-SU-2022:1326-1
- SUSE-SU-2022:1329-1
- SUSE-SU-2022:1335-1
- SUSE-SU-2022:1369-1
- SUSE-SU-2022:1402-1
- SUSE-SU-2022:1407-1
- SUSE-SU-2022:1440-1
- SUSE-SU-2022:1453-1
- SUSE-SU-2022:1486-1
- SUSE-SU-2022:1593-1
- SUSE-SU-2022:1598-1
- SUSE-SU-2022:1611-1
- SUSE-SU-2022:1634-1
- SUSE-SU-2022:1641-1
- SUSE-SU-2022:1651-1
- SUSE-SU-2022:1668-1
- SUSE-SU-2022:1686-1
- SUSE-SU-2022:2077-1
- SUSE-SU-2022:2082-1
- SUSE-SU-2022:2083-1
- SUSE-SU-2022:2103-1
- SUSE-SU-2022:2104-1
- SUSE-SU-2022:2111-1
- SUSE-SU-2022:2520-1
- SUSE-SU-2022:2615-1
- SUSE-SU-2022:2699-1
- SUSE-SU-2022:2700-1
- SUSE-SU-2022:2709-1
- SUSE-SU-2022:2726-1
- SUSE-SU-2022:2728-1
- SUSE-SU-2022:2738-1
- SUSE-SU-2022:2745-1
- SUSE-SU-2022:2766-1
- SUSE-SU-2022:2770-1
- SUSE-SU-2022:2776-1
- SUSE-SU-2022:2780-1
- SUSE-SU-2022:2783-1
- SUSE-SU-2022:2789-1
- SUSE-SU-2022:2854-1
- SUSE-SU-2023:0416-1
- USN-5381-1
- USN-5390-1
- USN-5390-2
- USN-5413-1
- USN-5415-1
- USN-5417-1
- USN-5418-1
- USN-5467-1
- USN-5515-1
- USN-5541-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2061633 | Bug #2061633 - CVE-2022-0886 kernel: buffer overflow in IPsec ESP transformation code | https://bugzilla.redhat.com/show_bug.cgi?id=2061633 |
Bugzilla | 2064855 | Bug #2064855 - CVE-2022-1011 kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes | https://bugzilla.redhat.com/show_bug.cgi?id=2064855 |
Bugzilla | 2064232 | Bug #2064232 - CVE-2022-26490 kernel: potential buffer overflows in EVT_TRANSACTION in st21nfca | https://bugzilla.redhat.com/show_bug.cgi?id=2064232 |
Bugzilla | 2063786 | Bug #2063786 - CVE-2022-0995 kernel: kernel bug in the watch_queue subsystem | https://bugzilla.redhat.com/show_bug.cgi?id=2063786 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/fedora/kernel?distro=fedora-34 | fedora | kernel | < 5.16.15.101.fc34 | fedora-34 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |