Now this is mostly for squashing the recently announced critical: x86, x32: Correct invalid use of user timespec in the kernel (CVE-2014-0038) but it also updates to 3.10.28 to squash a few more less critical secururity issues and other bugfixes like some laptop overheating reported by some with the 3.10.24 kernel. I will write a better advisory tomorrow, but so you can start testing: SRPMS: kernel-tmb-3.10.28-1.mga3.src.rpm i586: kernel-tmb-desktop-3.10.28-1.mga3-1-1.mga3.i586.rpm kernel-tmb-desktop586-3.10.28-1.mga3-1-1.mga3.i586.rpm kernel-tmb-desktop586-devel-3.10.28-1.mga3-1-1.mga3.i586.rpm kernel-tmb-desktop586-devel-latest-3.10.28-1.mga3.i586.rpm kernel-tmb-desktop586-latest-3.10.28-1.mga3.i586.rpm kernel-tmb-desktop-devel-3.10.28-1.mga3-1-1.mga3.i586.rpm kernel-tmb-desktop-devel-latest-3.10.28-1.mga3.i586.rpm kernel-tmb-desktop-latest-3.10.28-1.mga3.i586.rpm kernel-tmb-laptop-3.10.28-1.mga3-1-1.mga3.i586.rpm kernel-tmb-laptop-devel-3.10.28-1.mga3-1-1.mga3.i586.rpm kernel-tmb-laptop-devel-latest-3.10.28-1.mga3.i586.rpm kernel-tmb-laptop-latest-3.10.28-1.mga3.i586.rpm kernel-tmb-server-3.10.28-1.mga3-1-1.mga3.i586.rpm kernel-tmb-server-devel-3.10.28-1.mga3-1-1.mga3.i586.rpm kernel-tmb-server-devel-latest-3.10.28-1.mga3.i586.rpm kernel-tmb-server-latest-3.10.28-1.mga3.i586.rpm kernel-tmb-source-3.10.28-1.mga3-1-1.mga3.noarch.rpm kernel-tmb-source-latest-3.10.28-1.mga3.noarch.rpm x86_64: kernel-tmb-desktop-3.10.28-1.mga3-1-1.mga3.x86_64.rpm kernel-tmb-desktop-devel-3.10.28-1.mga3-1-1.mga3.x86_64.rpm kernel-tmb-desktop-devel-latest-3.10.28-1.mga3.x86_64.rpm kernel-tmb-desktop-latest-3.10.28-1.mga3.x86_64.rpm kernel-tmb-laptop-3.10.28-1.mga3-1-1.mga3.x86_64.rpm kernel-tmb-laptop-devel-3.10.28-1.mga3-1-1.mga3.x86_64.rpm kernel-tmb-laptop-devel-latest-3.10.28-1.mga3.x86_64.rpm kernel-tmb-laptop-latest-3.10.28-1.mga3.x86_64.rpm kernel-tmb-server-3.10.28-1.mga3-1-1.mga3.x86_64.rpm kernel-tmb-server-devel-3.10.28-1.mga3-1-1.mga3.x86_64.rpm kernel-tmb-server-devel-latest-3.10.28-1.mga3.x86_64.rpm kernel-tmb-server-latest-3.10.28-1.mga3.x86_64.rpm kernel-tmb-source-3.10.28-1.mga3-1-1.mga3.noarch.rpm kernel-tmb-source-latest-3.10.28-1.mga3.noarch.rpm Reproducible: Steps to Reproduce:
i586 virtualbox, all flavors install and boots fine to X. Nothing tested beyond. Error messages shown when trying to start virtualbox service (no module found, probably because I havent installed dkms-virtualbox).
CC: (none) => stormi
When testing these alternative kernels (-linus, -rt, -tmb, -vserver) it is necessary to use the dkms driver packages, dkms-nvidia* and dkms-fglrx etc. rather than the pre-built kmod packages such as nvidia-current-kernel-desktop-latest. Pre-built kmod packages only support the specific kernel they are built for, which forms part of the package name. Dkms packages actually build the driver on the next boot for whichever kernel you are using. It means the first boot after installing the new kernel will take longer than expected. Allow it to complete, normally a minute or couple of minutes, depending on your hardware. You can see it building if you remove "splash quiet" options from the kernel command line or press escape as it boots so you can see the text. It shows and a series of dots ". . . . ."
Testing complete mga3 32 tmb-desktop586 tmb-desktop tmb-laptop tmb-server
Whiteboard: (none) => mga3-32-ok
Advisory: This kernel update provides an update to the 3.10 longterm branch, currently 3.10.28 and fixes the following security issues: The ath9k_htc_set_bssid_mask function in drivers/net/wireless/ath/ath9k/htc_drv_main.c in the Linux kernel through 3.12 uses a BSSID masking approach to determine the set of MAC addresses on which a Wi-Fi device is listening, which allows remote attackers to discover the original MAC address after spoofing by sending a series of packets to MAC addresses with certain bit manipulations. (CVE-2013-4579) Pageexec reported a bug in the Linux kernel's recvmmsg syscall when called from code using the x32 ABI. An unprivileged local user could exploit this flaw to cause a denial of service (system crash) or gain administrator privileges (CVE-2014-0038) Faults during task-switch due to unhandled FPU-exceptions allow to kill processes at random on all affected kernels, resulting in local DOS in the end. One some architectures, privilege escalation under non-common circumstances is possible. (CVE-2014-1438) The hamradio yam_ioctl() code fails to initialise the cmd field of the struct yamdrv_ioctl_cfg leading to a 4-byte info leak. (CVE-2014-1446) Linux kernel built with the NetFilter Connection Tracking(NF_CONNTRACK) support for IRC protocol(NF_NAT_IRC), is vulnerable to an information leakage flaw. It could occur when communicating over direct client-to-client IRC connection(/dcc) via a NAT-ed network. Kernel attempts to mangle IRC TCP packet's content, wherein an uninitialised 'buffer' object is copied to a socket buffer and sent over to the other end of a connection. (CVE-2014-1690) For other changes, see the referenced changelogs: References: https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.25 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.26 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.27 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.28
Tested mga3-64, dkms modules built correctly for desktop, server and laptop. I'll hold off for a bit on tagging it OK until a few others have a chance to check on other hardware, but it looks OK to me.
CC: (none) => wrw105
No additional testers overnight, so OKing. Ready for validation when advisory is uploaded to svn.
Whiteboard: mga3-32-ok => mga3-32-ok mga3-64-ok
Advisory uploaded. Validating Could sysadmin please push to 3 updates Thanks
Keywords: (none) => validated_updateWhiteboard: mga3-32-ok mga3-64-ok => advisory mga3-32-ok mga3-64-okCC: (none) => sysadmin-bugs
Update pushed: http://advisories.mageia.org/MGASA-2014-0045.html
Status: NEW => RESOLVEDResolution: (none) => FIXED