The 4.4.11 update contains a number of important fixes across the tree

Reboot Required
After installing this update it is required that you reboot your system to ensure the changes supplied by this update are applied properly.

How to install

sudo dnf upgrade --advisory=FEDORA-2016-2363b37a98

This update has been submitted for testing by labbott.

5 years ago

This update has been pushed to testing.

5 years ago
User Icon anonymous commented & provided feedback 5 years ago

Looks good (Laptop with AMD E-450 APU x86_64).

karma: +1

User Icon filiperosset commented & provided feedback 5 years ago
karma

no regressions noted

User Icon buvaneshkumar commented & provided feedback 5 years ago
karma

LGTM

This update has been submitted for stable by labbott.

5 years ago
User Icon anonymous commented & provided feedback 5 years ago

works fine so far. desktop

This update has been pushed to stable.

5 years ago
User Icon sumantrom commented & provided feedback 4 years ago
karma

LGTM

User Icon buvaneshkumar commented & provided feedback 4 years ago
karma

lgtm

BZ#1338625 CVE-2016-4951 kernel: Null pointer dereference in tipc_nl_publ_dump

Please login to add feedback.

Metadata
Type
security
Severity
low
Karma
3
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Stable by Karma
disabled
Stable by Time
disabled
Dates
submitted
5 years ago
in testing
5 years ago
in stable
5 years ago
BZ#1332139 CVE-2016-3713 kernel: kvm: out-of-bounds access in set_var_mtrr_msr
0
0
BZ#1336410 CVE-2016-3713 kernel: kvm: out-of-bounds access in set_var_mtrr_msr [fedora-all]
0
0
BZ#1337528 CVE-2016-4913 kernel: Information leak when handling NM entries containing NUL
0
0
BZ#1337529 CVE-2016-4913 kernel: Information leak when handling NM entries containing NUL [fedora-all]
0
0
BZ#1338625 CVE-2016-4951 kernel: Null pointer dereference in tipc_nl_publ_dump
0
1
BZ#1338626 CVE-2016-4951 kernel: Null pointer dereference in tipc_nl_publ_dump [fedora-all]
0
0

Automated Test Results

Test Cases

0 0 Test Case kernel regression