stable

kernel-4.14.11-200.fc26

FEDORA-2018-8ed5eff2c0 created by jforbes 7 years ago for Fedora 26

The 4.14.11 stable kernel update contains a number of important fixes across the tree. This also includes the KPTI patches to mitigate the Meltdown vulnerability for x86 architectures

Reboot Required
After installing this update it is required that you reboot your system to ensure the changes supplied by this update are applied properly.

How to install

Updates may require up to 24 hours to propagate to mirrors. If the following command doesn't work, please retry later:

sudo dnf upgrade --refresh --advisory=FEDORA-2018-8ed5eff2c0

This update has been submitted for testing by jforbes.

7 years ago
User Icon labbott provided feedback 7 years ago
karma
User Icon adamwill commented & provided feedback 7 years ago
karma

Works fine on my F26 test box (a Sony Vaio VPC-Z1).

User Icon puiterwijk commented & provided feedback 7 years ago
karma

Works fine on a RHEL7 vhost

jforbes edited this update.

7 years ago

kernel-4.14.11-200.fc26 ejected from the push because u"Cannot find relevant tag for kernel-4.14.11-200.fc26. None of ['f26-updates-testing', 'f26-updates-pending', 'f26-infra'] are in [u'f22-updates-candidate', u'dist-6E-epel-testing-candidate', u'f21-updates-candidate', u'f25-updates-candidate', u'f24-updates-candidate', u'epel7-testing-candidate', u'dist-5E-epel-testing-candidate', u'f23-updates-candidate', u'f26-updates-candidate', u'f27-modular-updates-candidate', u'f27-updates-candidate']."

7 years ago
User Icon anonymous commented & provided feedback 7 years ago

Works fine here. Intel i5 (3rd gen) on x86_64.

karma: +1

This update has been pushed to stable.

7 years ago
User Icon augenauf commented & provided feedback 7 years ago
karma

Works fine for me on x64_86 hardware (2)


Please login to add feedback.

Metadata
Type
security
Karma
4
Signed
Content Type
RPM
Test Gating
Autopush Settings
Unstable by Karma
-3
Stable by Karma
disabled
Stable by Time
disabled
Dates
submitted
7 years ago
in stable
7 years ago
modified
7 years ago
BZ#1529120 CVE-2017-17864 kernel: information disclosure via pointer leak in kernel/bpf/verifier.c
0
0
BZ#1529123 CVE-2017-17863 kernel: integer overflow in static int check_alu_op function in bpf/verifier.c
0
0
BZ#1529124 CVE-2017-17862 kernel: Improper logic pruning in bpf/verifier.c
0
0
BZ#1529125 CVE-2017-17862 CVE-2017-17863 CVE-2017-17864 kernel: various flaws [fedora-all]
0
0
BZ#1530269 CVE-2017-17852 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging mishandling of 32-bit ALU ops
0
0
BZ#1530270 CVE-2017-17853 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging incorrect BPF_RSH signed bounds calculations
0
0
BZ#1530271 CVE-2017-17854 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging unrestricted integer values for pointer arithmetic
0
0
BZ#1530272 CVE-2017-17855 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging improper use of pointers in place of scalars
0
0
BZ#1530273 CVE-2017-17856 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging the lack of stack-pointer alignment enforcement
0
0
BZ#1530274 CVE-2017-17857 kernel: bpf/verifier.c allows local users to cause a denial of service by leveraging mishandling of invalid variable stack read operations
0
0
BZ#1530279 CVE-2017-17852 CVE-2017-17853 CVE-2017-17854 CVE-2017-17855 CVE-2017-17856 CVE-2017-17857 kernel: various flaws [fedora-all]
0
0

Automated Test Results

Test Cases

0 1 Test Case kernel regression