stable

kernel-5.6.19-200.fc31

FEDORA-2020-1b2dae6219 created by jforbes 4 years ago for Fedora 31

The 5.6.19 stable kernel updates contain a number of important fixes across the tree.

Reboot Required
After installing this update it is required that you reboot your system to ensure the changes supplied by this update are applied properly.

How to install

Updates may require up to 24 hours to propagate to mirrors. If the following command doesn't work, please retry later:

sudo dnf upgrade --refresh --advisory=FEDORA-2020-1b2dae6219

This update has been submitted for testing by jforbes.

4 years ago

This update's test gating status has been changed to 'waiting'.

4 years ago

This update's test gating status has been changed to 'ignored'.

4 years ago

jforbes edited this update.

4 years ago

This update has been pushed to testing.

4 years ago
karma

This update's test gating status has been changed to 'greenwave_failed'.

4 years ago

This update's test gating status has been changed to 'ignored'.

4 years ago

This update's test gating status has been changed to 'greenwave_failed'.

4 years ago

This update's test gating status has been changed to 'ignored'.

4 years ago
User Icon naphan commented & provided feedback 4 years ago
karma

Works. GNOME on Wayland (CPU: Intel Xeon E5-2650 v2, GPU: Radeon RX 580 Series; SSD Plextor PX-128M6S).

This update can be pushed to stable now if the maintainer wishes

4 years ago

This update has been submitted for stable by jforbes.

4 years ago

This update has been pushed to stable.

4 years ago

Please login to add feedback.

Metadata
Type
security
Severity
high
Karma
2
Signed
Content Type
RPM
Test Gating
Autopush Settings
Unstable by Karma
-3
Stable by Karma
disabled
Stable by Time
disabled
Dates
submitted
4 years ago
in testing
4 years ago
in stable
4 years ago
modified
4 years ago
BZ#1845840 CVE-2020-10766 kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection.
0
0
BZ#1845867 CVE-2020-10767 kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available.
0
0
BZ#1845868 CVE-2020-10768 kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command.
0
0
BZ#1847354 CVE-2020-10766 kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection. [fedora-all]
0
0
BZ#1847375 CVE-2020-10767 kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. [fedora-all]
0
0
BZ#1847392 CVE-2020-10768 kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. [fedora-all]
0
0

Automated Test Results

Test Cases

0 1 Test Case kernel regression