FEDORA-2016-6ce812a1e0

Submitter jwboyer
Builds
kernel-4.3.3-300.fc23
Update ID FEDORA-2016-6ce812a1e0
Release F23
Karma+26
Typesecurity
Severityunspecified
Statusstable
Suggestionreboot
Submitted 7 months ago, 2016-01-06 14:11:46 (UTC)
In Testing 7 months ago, 2016-01-07 04:29:35 (UTC)
In Stable 7 months ago, 2016-01-12 04:16:48 (UTC)

Automated Test Results

Notes about this update:

Update to latest upstream stable release, 4.3.3. This is a major kernel version rebase and testers should take care to ensure things are working as expected.


Related Bugs 6

00 #1292047 CVE-2015-8569 kernel: Information leak from getsockname [fedora-all]
00 #1292045 CVE-2015-8569 kernel: Information leak from getsockname
00 #1292841 CVE-2015-8575 kernel: information leak in sco_sock_bind() [fedora-all]
00 #1292840 CVE-2015-8575 kernel: information leak in sco_sock_bind()
00 #1295288 CVE-2015-8709 Kernel: ptrace: potential privilege escalation in user namespaces [fedora-all]
00 #1295287 CVE-2015-8709 Kernel: ptrace: potential privilege escalation in user namespaces

Comments 56 RSS

Comment fields support Fedora-Flavored Markdown.

Preview

#1292047 CVE-2015-8569 kernel: Information leak from getsockname [fedora-all]
#1292045 CVE-2015-8569 kernel: Information leak from getsockname
#1292841 CVE-2015-8575 kernel: information leak in sco_sock_bind() [fedora-all]
#1292840 CVE-2015-8575 kernel: information leak in sco_sock_bind()
#1295288 CVE-2015-8709 Kernel: ptrace: potential privilege escalation in user namespaces [fedora-all]
#1295287 CVE-2015-8709 Kernel: ptrace: potential privilege escalation in user namespaces
Does the system's basic functionality continue to work after this update?
Is the update generally functional?