FEDORA-2017-26c9ecd7a4

security update in Fedora 25 for kernel

Status: stable 2 years ago

The 4.10.10 stable kernel update contains a number of important fixes across the tree.

Reboot Required

After installing this update it is required that you reboot your system to ensure the changes supplied by this update are applied properly.

How to install

sudo dnf upgrade --advisory=FEDORA-2017-26c9ecd7a4

Comments 20

This update has been submitted for testing by jforbes.

works for me the whole day on my personal workstations and all non-critical infrastructure, rest is planned to be rebootet in a few hours, 4.10.9 even did not make it to reboots....

karma: +1

Works for me, x86_64 work station. Plasma DE, Nvidia card/nouveau

karma: +1 critpath: +1 kernel regression: +1

No regressions noted on x86_64 Ivy Bridge and i686 Diamondville.

karma: +1 critpath: +1

wfm - desktop 16GB Intel i7-3770 CPU using the Mate Desktop

karma: +1 critpath: +1 kernel regression: +1

Works for me x86_64 (M-5Y71) laptop, ARMv7

karma: +1 critpath: +1 #1425990: +1 kernel regression: +1

Personal LAMP and mail server. All OK.

karma: +1

no regressions noted

karma: +1 critpath: +1

This update has been pushed to testing.

Boots here on x86_64 (T450s, Atom based server, VM).

karma: +1 critpath: +1
  • Works for me on Thinkpad X220.
  • Kernel passed regression tests.
karma: +1 critpath: +1 kernel regression: +1

works for me on T450s

karma: +1

Tested on Fedora Atomic Host and verified #1441310 is resolved. Also installed on laptop and have been running it for 6 hours and no issues noted. Also passed atomic-host-tests, logs here

karma: +1 critpath: +1 #1441310: +1

LGTM, pass default and performance est

karma: +1

WFM, Thinkpad X250

karma: +1 critpath: +1
karma: +1 critpath: +1 #1441095: +1 #1441088: +1

This update has been submitted for stable by jforbes.

This update has been pushed to stable.

kernel tainted by virtualbox modules, so I can't report automatically:

[15269.135824] BUG: unable to handle kernel paging request at 00000000fffffffd [15269.135835] IP: kmem_cache_alloc_trace+0x87/0x1b0 [15269.135837] PGD 3ce4a5067 [15269.135838] PUD 0

[15269.135843] Oops: 0000 [#1] SMP [15269.135845] Modules linked in: des_generic md4 nls_utf8 cifs dns_resolver fscache dm_crypt vboxpci(OE) vboxnetadp(OE) vboxnetflt(OE) vboxdrv(OE) bnep fuse xt_CHECKSUM ipt_MASQUERADE nf_nat_masquerade_ipv4 tun nf_log_ipv4 nf_log_common xt_LOG xt_recent ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 xt_conntrack ip_set nfnetlink ebtable_broute bridge ebtable_nat ip6table_security ip6table_mangle ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_raw iptable_security iptable_mangle iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack libcrc32c iptable_raw ebtable_filter ebtables ip6table_filter ip6_tables vfat fat intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp snd_hda_codec_hdmi kvm_intel snd_hda_codec_realtek snd_hda_codec_generic snd_hda_intel kvm snd_hda_codec [15269.135870] irqbypass snd_hda_core snd_hwdep crct10dif_pclmul snd_seq crc32_pclmul snd_seq_device eeepc_wmi hci_uart btbcm btqca btintel asus_wmi snd_pcm ghash_clmulni_intel bluetooth snd_timer intel_cstate sparse_keymap intel_uncore snd soundcore intel_rapl_perf iTCO_wdt iTCO_vendor_support acpi_als intel_lpss_acpi rfkill kfifo_buf intel_lpss pinctrl_sunrisepoint industrialio pinctrl_intel mei_me mei i2c_i801 shpchp acpi_pad tpm_tis tpm_tis_core tpm nfsd auth_rpcgss nfs_acl lockd grace sunrpc raid1 nouveau mxm_wmi i2c_algo_bit drm_kms_helper 8021q ttm garp stp llc mrp drm crc32c_intel r8169 serio_raw mii wmi video i2c_hid fjes [15269.135898] CPU: 5 PID: 3321 Comm: Xorg Tainted: G OE 4.10.10-200.fc25.x86_64 #1 [15269.135901] Hardware name: System manufacturer System Product Name/H110M-K, BIOS 1802 05/20/2016 [15269.135903] task: ffff9d120a7f2600 task.stack: ffffb77a88fb4000 [15269.135906] RIP: 0010:kmem_cache_alloc_trace+0x87/0x1b0 [15269.135908] RSP: 0018:ffffb77a88fb7ba8 EFLAGS: 00010246 [15269.135910] RAX: 00000000fffffffd RBX: 0000000000000000 RCX: 00000000000002e4 [15269.135913] RDX: 000000000009fd16 RSI: 00000000014080c0 RDI: 000000000001caa0 [15269.135915] RBP: ffffb77a88fb7bd8 R08: ffff9d1276d5caa0 R09: 0000000000000000 [15269.135918] R10: 00000000fffffffd R11: 0000000000000000 R12: 00000000014080c0 [15269.135920] R13: ffff9d1266003540 R14: 0000000000000088 R15: ffff9d1266003540 [15269.135923] FS: 00007fa47a2f0600(0000) GS:ffff9d1276d40000(0000) knlGS:0000000000000000 [15269.135925] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [15269.135927] CR2: 00000000fffffffd CR3: 00000003ce4a0000 CR4: 00000000003406e0 [15269.135930] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [15269.135932] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [15269.135934] Call Trace: [15269.135957] ? nouveau_fence_new+0x42/0xc0 [nouveau] [15269.135974] nouveau_fence_new+0x42/0xc0 [nouveau] [15269.135991] nouveau_gem_ioctl_pushbuf+0xef2/0x16b0 [nouveau] [15269.136002] drm_ioctl+0x21b/0x4c0 [drm] [15269.136005] ? sysrecvmsg+0x160/0x1f0 [15269.136021] ? nouveau_gem_ioctl_new+0x150/0x150 [nouveau] [15269.136038] nouveau_drm_ioctl+0x74/0xc0 [nouveau] [15269.136040] do_vfs_ioctl+0xa3/0x5f0 [15269.136043] ? sys_recvmsg+0x80/0x90 [15269.136045] SyS_ioctl+0x79/0x90 [15269.136048] entry_SYSCALL_64_fastpath+0x1a/0xa9 [15269.136050] RIP: 0033:0x7fa477b98787 [15269.136052] RSP: 002b:00007ffc3f933a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [15269.136054] RAX: ffffffffffffffda RBX: 0000000000001e00 RCX: 00007fa477b98787 [15269.136057] RDX: 00007ffc3f933af0 RSI: 00000000c0406481 RDI: 000000000000000c [15269.136059] RBP: 00000000000004b0 R08: 0000000000000000 R09: 00000000027e3580 [15269.136064] R10: 0000000000000001 R11: 0000000000000246 R12: 00000000000004b0 [15269.136066] R13: 0000000000000000 R14: 00000000008ca000 R15: 0000000000001e00 [15269.136068] Code: 49 83 78 10 00 4d 8b 10 0f 84 f4 00 00 00 4d 85 d2 0f 84 eb 00 00 00 49 63 47 20 49 8b 3f 4c 01 d0 40 f6 c7 0f 0f 85 17 01 00 00 <48> 8b 18 48 8d 4a 01 4c 89 d0 65 48 0f c7 0f 0f 94 c0 84 c0 74 [15269.136086] RIP: kmem_cache_alloc_trace+0x87/0x1b0 RSP: ffffb77a88fb7ba8 [15269.136088] CR2: 00000000fffffffd [15269.147406] ---[ end trace 83d2f053ead81b10 ]---

Works for me.

karma: +1 critpath: +1
Content Type
RPM
Status
stable
Test Gating
Submitted by
Update Type
security
Update Severity
unspecified
Karma
+15
stable threshold: 3
unstable threshold: -3
Autopush
Disabled
Dates
submitted 2 years ago
in testing 2 years ago
in stable 2 years ago

Related Bugs 8

0+1 #1425990 ax25 kernel module is missing in the armv7hl build
00 #1437404 CVE-2017-7308 kernel: net/packet: overflow in check for priv area size
00 #1437406 CVE-2017-7308 kernel: net/packet: overflow in check for priv area size [fedora-all]
00 #1439613 dvb_usb_cxusb fails on kernel 4.10 due to CONFIG_VMAP_STACK
0+1 #1441088 CVE-2017-7616 kernel: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c
00 #1441093 CVE-2017-7618 kernel: Infinite recursion in ahash.c by triggering EBUSY on a full queue
0+1 #1441095 CVE-2017-7616 CVE-2017-7618 kernel: various flaws [fedora-all]
0+1 #1441310 4.10 mtu restriction causes failures in openshift networking

Automated Test Results

Test Cases

0+4 Test Case kernel regression