FEDORA-2015-c1c2f5e168

Submitter jforbes
Builds
kernel-4.2.8-200.fc22
Update ID FEDORA-2015-c1c2f5e168
Release F22
Karma+3
Typesecurity
Severityunspecified
Statusstable
Suggestionreboot
Submitted 8 months ago, 2015-12-17 12:54:11 (UTC)
In Testing 8 months ago, 2015-12-18 10:04:42 (UTC)
In Stable 8 months ago, 2015-12-22 07:00:25 (UTC)

Automated Test Results

Notes about this update:

The 4.2.8 stable kernel update contains a number of important fixes across the tree.


Related Bugs 9

00 #1286293 Fedora 23 x86_64bit :: "ideapad_laptop" driver on Lenovo Y700-17isk laptop hard blocks bluetooth and wlan radios ...
00 #1282712 CVE-2013-7446 kernel: Unix sockets use after free - peer_wait_queue prematurely freed [fedora-all]
00 #1282688 CVE-2013-7446 kernel: Unix sockets use after free - peer_wait_queue prematurely freed
00 #1291332 kernel: Permission bypass on overlayfs during copy_up [fedora-all]
00 #1291329 kernel: Permission bypass on overlayfs during copy_up
00 #1291198 CVE-2015-7550 kernel: User triggerable crash from race between key read and rey revoke [fedora-all]
00 #1291197 CVE-2015-7550 kernel: User triggerable crash from race between key read and rey revoke
00 #1290477 kernel: IPv6 connect causes DoS via NULL pointer dereference [fedora-all]
00 #1290475 CVE-2015-8543 kernel: IPv6 connect causes DoS via NULL pointer dereference

Comments 9 RSS

Comment fields support Fedora-Flavored Markdown.

Preview

#1286293 Fedora 23 x86_64bit :: "ideapad_laptop" driver on Lenovo Y700-17isk laptop hard blocks bluetooth and wlan radios ...
#1282712 CVE-2013-7446 kernel: Unix sockets use after free - peer_wait_queue prematurely freed [fedora-all]
#1282688 CVE-2013-7446 kernel: Unix sockets use after free - peer_wait_queue prematurely freed
#1291332 kernel: Permission bypass on overlayfs during copy_up [fedora-all]
#1291329 kernel: Permission bypass on overlayfs during copy_up
#1291198 CVE-2015-7550 kernel: User triggerable crash from race between key read and rey revoke [fedora-all]
#1291197 CVE-2015-7550 kernel: User triggerable crash from race between key read and rey revoke
#1290477 kernel: IPv6 connect causes DoS via NULL pointer dereference [fedora-all]
#1290475 CVE-2015-8543 kernel: IPv6 connect causes DoS via NULL pointer dereference
Does the system's basic functionality continue to work after this update?
Is the update generally functional?