stable

kernel-6.4.10-100.fc37

FEDORA-2023-d9509be489 created by jforbes a year ago for Fedora 37

The 6.4.10 stable kernel update contains a number of important fixes across the tree.

Reboot Required
After installing this update it is required that you reboot your system to ensure the changes supplied by this update are applied properly.

How to install

Updates may require up to 24 hours to propagate to mirrors. If the following command doesn't work, please retry later:

sudo dnf upgrade --refresh --advisory=FEDORA-2023-d9509be489

This update has been submitted for testing by jforbes.

a year ago

This update's test gating status has been changed to 'waiting'.

a year ago

This update's test gating status has been changed to 'passed'.

a year ago
User Icon bretth commented & provided feedback a year ago
karma

default & performance test pass (KVM)

User Icon geraldosimiao commented & provided feedback a year ago
karma

KVM tests passed

This update has been pushed to testing.

a year ago

This update can be pushed to stable now if the maintainer wishes

a year ago
User Icon pjolt commented & provided feedback a year ago
karma

WMvare17, host i7-13700KF.

User Icon nixuser commented & provided feedback a year ago
karma

Working fine here.

This update has been submitted for stable by jforbes.

a year ago

This update has been pushed to stable.

a year ago

Please login to add feedback.

Metadata
Type
security
Severity
high
Karma
4
Signed
Content Type
RPM
Test Gating
Autopush Settings
Unstable by Karma
-3
Stable by Karma
disabled
Stable by Time
disabled
Dates
submitted
a year ago
in testing
a year ago
in stable
a year ago
approved
a year ago
BZ#2213802 CVE-2023-4155 kernel: KVM: SEV-ES / SEV-SNP VMGEXIT double fetch vulnerability
0
0
BZ#2221609 CVE-2023-4273 kernel: exFAT: stack overflow in exfat_get_uniname_from_ext_entry
0
0
BZ#2224594 kernel-6.4.4-100.fc37.x86_64 has no output on AMD RX570
0
0
BZ#2225511 CVE-2023-4128 Kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route
0
0
BZ#2229498 CVE-2023-4194 kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid
0
0
BZ#2229499 kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid [fedora-all]
0
0
BZ#2229642 CVE-2023-4155 kernel: KVM: SEV-ES / SEV-SNP VMGEXIT double fetch vulnerability [fedora-all]
0
0
BZ#2230448 kernel: exFAT: stack overflow in exfat_get_uniname_from_ext_entry [fedora-all]
0
0
BZ#2230905 CVE-2023-4128 kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route [fedora-all]
0
0

Automated Test Results

Test Cases

0 4 Test Case kernel regression