The 4.8.13 stable kernel update contains a number of important fixes across the tree.

Reboot Required
After installing this update it is required that you reboot your system to ensure the changes supplied by this update are applied properly.

How to install

sudo dnf upgrade --advisory=FEDORA-2016-107f03cc00

This update has been submitted for testing by jforbes.

3 years ago
User Icon dhgutteridge commented & provided feedback 3 years ago
karma

No regressions noted on x86_64 Ivy Bridge and i686 Diamondville.

User Icon funfunctor commented & provided feedback 3 years ago
karma

@jforbes don't leave this one hanging in testing too long ! Some of the CVE's were pretty bad.

BZ#1401820 CVE-2016-8655 kernel: Race condition in packet_set_ring leads to use after free [fedora-all]
BZ#1400019 CVE-2016-8655 kernel: Race condition in packet_set_ring leads to use after free
BZ#1402014 CVE-2016-9793 kernel: Signed overflow for SO_{SND|RCV}BUFFORCE [fedora-all]
BZ#1402013 CVE-2016-9793 kernel: Signed overflow for SO_{SND|RCV}BUFFORCE
BZ#1402489 Disable CONFIG_KCM on all fedora kernels
BZ#1403146 CVE-2016-9576 kernel: Use after free in SCSI generic device interface [fedora-all]
BZ#1403145 CVE-2016-9576 kernel: Use after free in SCSI generic device interface
User Icon nivag commented & provided feedback 3 years ago
karma

wfm - desktop 32GB Intel i7-4770 CPU and laptop 16GB Intel i7-3610QM CPU

User Icon g6avk commented & provided feedback 3 years ago
karma

Works for me, x86_64

User Icon doskias commented & provided feedback 3 years ago
karma

Hopefully this one won't stay too much in testing.

BZ#1401820 CVE-2016-8655 kernel: Race condition in packet_set_ring leads to use after free [fedora-all]
BZ#1400019 CVE-2016-8655 kernel: Race condition in packet_set_ring leads to use after free
BZ#1402014 CVE-2016-9793 kernel: Signed overflow for SO_{SND|RCV}BUFFORCE [fedora-all]
BZ#1402013 CVE-2016-9793 kernel: Signed overflow for SO_{SND|RCV}BUFFORCE
BZ#1402489 Disable CONFIG_KCM on all fedora kernels
BZ#1403146 CVE-2016-9576 kernel: Use after free in SCSI generic device interface [fedora-all]
BZ#1403145 CVE-2016-9576 kernel: Use after free in SCSI generic device interface

This update has been pushed to testing.

3 years ago
User Icon bradw commented & provided feedback 3 years ago
karma

Personal LAMP and mail server running GNOME. All OK.

This update has reached the stable karma threshold and can be pushed to stable now if the maintainer wishes.

3 years ago
User Icon bojan commented & provided feedback 3 years ago
karma

As appears to be traditional these days, already obsolete, but runs here on x86_64 (T450s, server, VM).

User Icon fszymanski commented & provided feedback 3 years ago
karma

Works for me.

User Icon fszymanski commented & provided feedback 3 years ago

Sorry, wrong checkboxes.

This update has reached the stable karma threshold and can be pushed to stable now if the maintainer wishes.

3 years ago
User Icon robatino commented & provided feedback 3 years ago

@fszymanski: If you give +1 karma in a later comment, it will change your total karma from -1 to +1 (you don't have to leave it at -1 with a 0-karma comment).

User Icon fszymanski provided feedback 3 years ago
karma
User Icon filiperosset commented & provided feedback 3 years ago
karma

working fine in my i7 4720hq

User Icon frieben commented & provided feedback 3 years ago
karma

Everything ok running in an VM.

This update has reached the stable karma threshold and can be pushed to stable now if the maintainer wishes.

3 years ago

This update has been submitted for stable by jforbes.

3 years ago
User Icon tenk commented & provided feedback 3 years ago
karma

Works for me.

User Icon jwboyer commented & provided feedback 3 years ago
karma

Works well on a Dell XPS desktop with radeon graphics

This update has been pushed to stable.

3 years ago

Please login to add feedback.

Metadata
Type
security
Severity
high
Karma
12
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Dates
submitted
3 years ago
in testing
3 years ago
in stable
3 years ago
BZ#1400019 CVE-2016-8655 kernel: Race condition in packet_set_ring leads to use after free
0
2
BZ#1401820 CVE-2016-8655 kernel: Race condition in packet_set_ring leads to use after free [fedora-all]
0
2
BZ#1402013 CVE-2016-9793 kernel: Signed overflow for SO_{SND|RCV}BUFFORCE
0
2
BZ#1402014 CVE-2016-9793 kernel: Signed overflow for SO_{SND|RCV}BUFFORCE [fedora-all]
0
2
BZ#1402489 Disable CONFIG_KCM on all fedora kernels
0
2
BZ#1403145 CVE-2016-9576 kernel: Use after free in SCSI generic device interface
0
2
BZ#1403146 CVE-2016-9576 kernel: Use after free in SCSI generic device interface [fedora-all]
0
2

Automated Test Results

Test Cases

0 5 Test Case kernel regression