SRPMS: kernel-linus-3.12.18-1.mga4.src.rpm i586: kernel-linus-3.12.18-1.mga4-1-1.mga4.i586.rpm kernel-linus-devel-3.12.18-1.mga4-1-1.mga4.i586.rpm kernel-linus-devel-latest-3.12.18-1.mga4.i586.rpm kernel-linus-doc-3.12.18-1.mga4.noarch.rpm kernel-linus-latest-3.12.18-1.mga4.i586.rpm kernel-linus-source-3.12.18-1.mga4-1-1.mga4.noarch.rpm kernel-linus-source-latest-3.12.18-1.mga4.noarch.rpm x86_64: kernel-linus-3.12.18-1.mga4-1-1.mga4.x86_64.rpm kernel-linus-devel-3.12.18-1.mga4-1-1.mga4.x86_64.rpm kernel-linus-devel-latest-3.12.18-1.mga4.x86_64.rpm kernel-linus-doc-3.12.18-1.mga4.noarch.rpm kernel-linus-latest-3.12.18-1.mga4.x86_64.rpm kernel-linus-source-3.12.18-1.mga4-1-1.mga4.noarch.rpm kernel-linus-source-latest-3.12.18-1.mga4.noarch.rpm Reproducible: Steps to Reproduce:
Advisory: Updated kernel-linus provides upstream 3.12.18 kernel and fixes the following security issues: Buffer overflow in the complete_emulated_mmio function in arch/x86/kvm/ x86.c in the Linux kernel before 3.13.6 allows guest OS users to execute arbitrary code on the host OS by leveraging a loop that triggers an invalid memory copy affecting certain cancel_work_item data. (CVE-2014-0049) The get_rx_bufs function in drivers/vhost/net.c in the vhost-net subsystem in the Linux kernel package before 2.6.32-431.11.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly handle vhost_get_vq_desc errors, which allows guest OS users to cause a denial of service (host OS crash) via unspecified vectors. (CVE-2014-0055) The cifs_iovec_write function in fs/cifs/file.c in the Linux kernel through 3.13.5 does not properly handle uncached write operations that copy fewer than the requested number of bytes, which allows local users to obtain sensitive information from kernel memory, cause a denial of service (memory corruption and system crash), or possibly gain privileges via a writev system call with a crafted pointer. (CVE-2014-0069) drivers/vhost/net.c in the Linux kernel before 3.13.10, when mergeable buffers are disabled, does not properly validate packet lengths, which allows guest OS users to cause a denial of service (memory corruption and host OS crash) or possibly gain privileges on the host OS via crafted packets, related to the handle_rx and get_rx_bufs functions. (CVE-2014-0077) Oter fixes in this update: - switch hugepages back to madvise to fix performance regression (mga#12994) - enable Intel P-state driver (mga#13080) - fix r8169 suspend/resume issue (mga#13255) For upstream merged fixes, read the referenced changelogs: References: https://bugs.mageia.org/show_bug.cgi?id=12994 https://bugs.mageia.org/show_bug.cgi?id=13080 https://bugs.mageia.org/show_bug.cgi?id=13255 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.18 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.17 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.16 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.15 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.14
On real hardware, M4, KDE, 32-bit Package(s) under test: kernel-linus install kernel-linus from updates_testing [wilcal@localhost ~]$ uname -a Linux localhost 3.12.18-1.mga4 #1 SMP Thu Apr 24 12:20:23 UTC 2014 i686 i686 i686 GNU/Linux kernel-linus boots to a working desktop and applications work fine Test platform: Intel, P4 530J 3.0 GHz, 800MHz FSB, 1MB L2, LGA 775 GigaByte GA-81915G Pro F4 i915G LGA 775 MoBo Marvel Yukon 88E8001 Gigabit LAN Intel High Def Audio, Azalia (C-Media 9880) (snd-hda-intel) Intel Graphics Media Accelerator 900 (Intel 82915G) Kingston 4GB (2 x 2GB) DDR400 PC-3200 250GB Seagate Kingwin KF-91-BK SATA Mobile Rack Kingwin KF-91-T-BK SATA Mobile Rack Tray Sony CD/DVD-RW DWQ120AB2
CC: (none) => wilcal.int
All ok 32bit, working dkms modules all build ok. It'll need testing 64bit before we can validate, if anyone can do so please..
Whiteboard: (none) => mga4-32-ok
Testing complete mga4 64.
Whiteboard: mga4-32-ok => mga4-32-ok mga6-64-ok
Whiteboard: mga4-32-ok mga6-64-ok => mga4-32-ok mga4-64-ok
Validating. Advisory uploaded. There is no mention of CVE-2014-2851 in the advisory for this one. It might need adding. Could sysadmin please push to 4 updates Thanks
Keywords: (none) => validated_updateWhiteboard: mga4-32-ok mga4-64-ok => advisory mga4-32-ok mga4-64-okCC: (none) => sysadmin-bugs
Update pushed: http://advisories.mageia.org/MGASA-2014-0207.html
Status: NEW => RESOLVEDResolution: (none) => FIXED