FEDORA-2019-6817686c4d

security update in Fedora 30 for kernel and kernel-headers

Status: stable 2 months ago

Update to v5.1.15


Update to v5.1.14

Reboot Required

After installing this update it is required that you reboot your system to ensure the changes supplied by this update are applied properly.

Comments 24

This update has been submitted for testing by jcline.

This update test gating status has been changed to 'waiting'.

This update has obsoleted kernel-5.1.14-300.fc30, and has inherited its bugs and notes.

This update test gating status has been changed to 'ignored'.

Works for me: desktop 16GB Intel i7-3770 CPU, using the Mate Desktop Environment. Regression tests passed.

karma: +1 critpath: +1 kernel regression: +1

This update has been pushed to testing.

karma: +1 critpath: +1 kernel regression: +1

works fine

karma: +1 critpath: +1 kernel regression: +1

Works on T450s and XS35GTv2.

karma: +1 critpath: +1

Looks good so far, but when I ran "kernel regression" I got a SELINUX Warning.

Quellkontext unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1 023 Zielkontext unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1 023 Zielobjekte Unbekannt [ process ] Quelle mprotheap Quellpfad mprotheap Port <unbekannt> Host El-Presidente RPM-Pakete der Quelle
RPM-Pakete des Ziels
Richtlinien-RPM <unbekannt> SELinux aktiviert True Richtlinientyp targeted Enforcing-Modus Enforcing Rechnername El-Presidente Plattform Linux El-Presidente 5.1.15-300.fc30.x86_64 #1 SMP Tue Jun 25 14:07:22 UTC 2019 x86_64 x86_64 Anzahl der Alarme 1 Zuerst gesehen 2019-06-26 14:43:43 CEST Zuletzt gesehen 2019-06-26 14:43:43 CEST Lokale ID e844abe6-2642-49d6-b531-2156e0ca98bb</unbekannt></unbekannt>

Raw-Audit-Meldungen type=AVC msg=audit(1561553023.193:322): avc: denied { execheap } for pid=6568 comm="mprotheap" scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=process permissive=0

Hash: mprotheap,unconfined_t,unconfined_t,process,execheap

karma: +1 critpath: +1 kernel regression: +1
karma: +1 critpath: +1 kernel regression: +1

x86_64, CPU: i5-7200U

@generalprobe I believe you encountered a known issue, which nobody has solved for a long time: https://bugzilla.redhat.com/show_bug.cgi?id=1465333

karma: +1 critpath: +1 kernel regression: +1

LGTM.

karma: +1 critpath: +1

LGTM.

karma: +1 critpath: +1 kernel regression: +1
karma: +1 critpath: +1 kernel regression: +1
karma: +1 critpath: +1 kernel regression: +1
karma: +1 critpath: +1

wfm on i7-9700K. kvm, Intel Corporation UHD Graphics 630, network, sound works fine.

karma: +1 critpath: +1 kernel regression: +1

This update has been submitted for stable by jcline.

This update has been unpushed.

This update has been submitted for testing by nphilipp.

This update has been submitted for stable by jcline.

Works well on Lenovo T460p

karma: +1 critpath: +1

This update has been pushed to stable.

Add Comment & Feedback

Please login to add feedback.

Content Type
RPM
Status
stable
Test Gating
Submitted by
Update Type
security
Update Severity
high
Karma
+13
stable threshold: 2
unstable threshold: -3
Autopush (karma)
Disabled
Autopush (time)
Disabled
Dates
submitted 2 months ago
in testing 2 months ago
in stable 2 months ago

Related Bugs 2

00 #1720616 CVE-2019-12817 kernel: ppc: unrelated processes being able to read/write to each other's virtual memory
00 #1723697 CVE-2019-12817 kernel: ppc: unrelated processes being able to read/write to each other's virtual memory [fedora-all]

Automated Test Results

Test Cases

0+10 Test Case kernel regression