FEDORA-2017-b93e6de389

security update in Fedora 25 for kernel

Status: unpushed

The 4.11.6 update contains a number of important fixes across the tree, including the recently announced "stack clash"

Reboot Required

After installing this update it is required that you reboot your system to ensure the changes supplied by this update are applied properly.

Comments 7

This update has been submitted for testing by labbott.

works for me

karma: +1

Works for me.

Kernel regression test skipped the first two tests and triggers selinux (selinuxuser_execheap).

karma: +1

critpath: +1 kernel regression: +1

No regressions noted x86_64 and i686 PAE.

karma: +1 critpath: +1

This update has been pushed to testing.

Works. x86_64, GNOME (Core2 Quad, 8 GiB, AMD RV635).

karma: +1 critpath: +1 kernel regression: +1

This update has been unpushed.

Add Comment & Feedback

Please login to add feedback.

Content Type
RPM
Status
unpushed
Test Gating
Submitted by
Update Type
security
Update Severity
unspecified
Karma
+3
stable threshold: 3
unstable threshold: -3
Autopush (karma)
Disabled
Autopush (time)
Disabled
Dates
submitted 2 years ago
in testing 2 years ago

Related Bugs 8

00 #1442912 Kernels > 4.10 enable extra debugging on b43
00 #1459326 BUG: audit records being sent to the console even when auditd is running
00 #1461333 CVE-2017-1000364 kernel: heap/stack gap jumping via unbounded stack allocations
00 #1462819 CVE-2017-1000364 kernel: heap/stack gap jumping via unbounded stack allocations [fedora-all]
00 #1462827 CVE-2017-1000365 kernel: RLIMIT_STACK/RLIMIT_INFINITY string size limitation bypass [fedora-all]
00 #1462828 CVE-2017-1000370 kernel: offset2lib patch protection bypass [fedora-all]
00 #1462829 CVE-2017-1000371 kernel: offset2lib allows for the stack guard page to be jumped over [fedora-all]
00 #1462833 CVE-2017-1000379 kernel: Incorrectly mapped contents of PIE executable [fedora-all]

Automated Test Results

Test Cases

0+2 Test Case kernel regression