| Summary: | kernel 3.14.31 breaks adjtimex which breaks chrony | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | RPM Packages | Assignee: | Thomas Backlund <tmb> |
| Status: | RESOLVED FIXED | QA Contact: | |
| Severity: | normal | ||
| Priority: | Normal | ||
| Version: | 4 | ||
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Source RPM: | kernel-3.14.31-1.mga4.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2015-01-31 21:12:38 CET
Also confirmed on my PogoLinux workstation with the server kernel. Ok, this seems to trigger the security hardening fix that went into 3.14.31 (and upcoming mga5) that now validates userspace inputs to protect from buffer overflows. seems chrony has also been using a private copy of timer headers, so any changes to kernel headers have been missed. http://git.tuxfamily.org/chrony/chrony.git/commit/?id=fc73accfe5bc0f8ffaf78730da2c46a7f1de7acc If you feel up for it you could try to rebuild crony with this and see if it changes anything... I will check it out better when I get back home... Thanks, I rebuilt chrony with that patch and it didn't change anything; same error. Ok, it's currently being debated upstream to what the proper fix is ... I think we'll have a solution soon... I will hold back this update some days and if no solution I will revert the offending fix temporarily... A kernel-3.14.31-2.mga4 with a potential fix is currently building... Much better. Thanks! Status:
NEW =>
RESOLVED |