Updated kernel-tmb provides upstream 3.12.26 kernel and fixes the following security issues: Array index error in the aio_read_events_ring function in fs/aio.c in the Linux kernel through 3.15.1 allows local users to obtain sensitive information from kernel memory via a large head value (CVE-2014-0206). media-device: fix infoleak in ioctl media_enum_entities() (CVE-2014-1739) The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification. (CVE-2014-3153) kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number. To avoid this and other issues CONFIG_AUDITSYSCALL has been disabled. (CVE-2014-3917) The capabilities implementation in the Linux kernel before 3.14.8 does not properly consider that namespaces are inapplicable to inodes, which allows local users to bypass intended chmod restrictions by first creating a user namespace, as demonstrated by setting the setgid bit on a file with group ownership of root (CVE-2014-4014) mm/shmem.c in the Linux kernel through 3.15.1 does not properly implement the interaction between range notification and hole punching, which allows local users to cause a denial of service (i_mutex hold) by using the mmap system call to access a hole, as demonstrated by interfering with intended shmem activity by blocking completion of (1) an MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call (CVE-2014-4171). arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000 (CVE-2014-4508). A flaw was found in the way reference counting was handled in the Linux kernels VFS subsystem when unmount on symlink was performed. An unprivileged local user could use this flaw to cause OOM conditions leading to denial of service or, potentially, trigger use-after-free error (CVE-2014-5045). Linux kernel built with the support for Stream Control Transmission Protocol (CONFIG_IP_SCTP) is vulnerable to a NULL pointer dereference flaw. It could occur when simultaneous new connections are initiated between the same pair of hosts. A remote user/program could use this flaw to crash the system kernel resulting in DoS (CVE.2014-5077). For other fixes, see the referenced changelogs. References: https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.26 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.25 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.24 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.23 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.22 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.21 SRPM: kernel-tmb-3.12.26-1.mga4.src.rpm i586: kernel-tmb-desktop-3.12.26-1.mga4-1-1.mga4.i586.rpm kernel-tmb-desktop586-3.12.26-1.mga4-1-1.mga4.i586.rpm kernel-tmb-desktop586-devel-3.12.26-1.mga4-1-1.mga4.i586.rpm kernel-tmb-desktop586-devel-latest-3.12.26-1.mga4.i586.rpm kernel-tmb-desktop586-latest-3.12.26-1.mga4.i586.rpm kernel-tmb-desktop-devel-3.12.26-1.mga4-1-1.mga4.i586.rpm kernel-tmb-desktop-devel-latest-3.12.26-1.mga4.i586.rpm kernel-tmb-desktop-latest-3.12.26-1.mga4.i586.rpm kernel-tmb-laptop-3.12.26-1.mga4-1-1.mga4.i586.rpm kernel-tmb-laptop-devel-3.12.26-1.mga4-1-1.mga4.i586.rpm kernel-tmb-laptop-devel-latest-3.12.26-1.mga4.i586.rpm kernel-tmb-laptop-latest-3.12.26-1.mga4.i586.rpm kernel-tmb-server-3.12.26-1.mga4-1-1.mga4.i586.rpm kernel-tmb-server-devel-3.12.26-1.mga4-1-1.mga4.i586.rpm kernel-tmb-server-devel-latest-3.12.26-1.mga4.i586.rpm kernel-tmb-server-latest-3.12.26-1.mga4.i586.rpm kernel-tmb-source-3.12.26-1.mga4-1-1.mga4.noarch.rpm kernel-tmb-source-latest-3.12.26-1.mga4.noarch.rpm x86_64: kernel-tmb-desktop-3.12.26-1.mga4-1-1.mga4.x86_64.rpm kernel-tmb-desktop-devel-3.12.26-1.mga4-1-1.mga4.x86_64.rpm kernel-tmb-desktop-devel-latest-3.12.26-1.mga4.x86_64.rpm kernel-tmb-desktop-latest-3.12.26-1.mga4.x86_64.rpm kernel-tmb-laptop-3.12.26-1.mga4-1-1.mga4.x86_64.rpm kernel-tmb-laptop-devel-3.12.26-1.mga4-1-1.mga4.x86_64.rpm kernel-tmb-laptop-devel-latest-3.12.26-1.mga4.x86_64.rpm kernel-tmb-laptop-latest-3.12.26-1.mga4.x86_64.rpm kernel-tmb-server-3.12.26-1.mga4-1-1.mga4.x86_64.rpm kernel-tmb-server-devel-3.12.26-1.mga4-1-1.mga4.x86_64.rpm kernel-tmb-server-devel-latest-3.12.26-1.mga4.x86_64.rpm kernel-tmb-server-latest-3.12.26-1.mga4.x86_64.rpm kernel-tmb-source-3.12.26-1.mga4-1-1.mga4.noarch.rpm kernel-tmb-source-latest-3.12.26-1.mga4.noarch.rpm Reproducible: Steps to Reproduce:
In VirtualBox, M4, KDE, 32-bit Package(s) under test: kernel-tmb-desktop586-latest default install of kernel-tmb-desktop586-latest [root@localhost wilcal]# uname -a Linux localhost 3.12.20-tmb-desktop586-1.mga4 #1 SMP PREEMPT Fri May 16 16:36:36 UTC 2014 i686 i686 i686 GNU/Linux [root@localhost wilcal]# dkms status vboxadditions, 4.3.10-1.1.mga4, 3.12.25-desktop-3.mga4, i586: installed-binary from 3.12.25-desktop-3.mga4 kernel-tmb-desktop586-latest boots to a working desktop and applications work fine, 1600x1200 screen resolution install kernel-tmb-desktop586-latest from updates_testing [root@localhost wilcal]# uname -a Linux localhost 3.12.26-tmb-desktop586-1.mga4 #1 SMP PREEMPT Wed Aug 6 16:14:22 UTC 2014 i686 i686 i686 GNU/Linux [root@localhost wilcal]# dkms status vboxadditions, 4.3.10-1.1.mga4, 3.12.25-desktop-3.mga4, i586: installed-binary from 3.12.25-desktop-3.mga4 kernel-tmb-desktop586-latest boots to a working desktop and applications work fine, 1600x1200 screen resolution Test platform: Intel Core i7-2600K Sandy Bridge 3.4GHz GIGABYTE GA-Z68X-UD3-B3 LGA 1155 MoBo GIGABYTE GV-N440D3-1GI Nvidia GeForce GT 440 (Fermi) 1GB RTL8111/8168B PCI Express 1Gbit Ethernet DRAM 16GB (4 x 4GB) Mageia 4 64-bit, Nvidia driver virtualbox-4.3.10-1.1.mga4.x86_64 virtualbox-guest-additions-4.3.10-1.1.mga4.x86_64
CC: (none) => wilcal.int
In VirtualBox, M4, KDE, 64-bit Package(s) under test: kernel-tmb-desktop-latest default install of kernel-tmb-desktop-latest [wilcal@localhost ~]$ uname -a Linux localhost 3.12.20-tmb-desktop-1.mga4 #1 SMP PREEMPT Fri May 16 17:05:43 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux [root@localhost wilcal]# dkms status vboxadditions, 4.3.10-1.1.mga4, 3.12.20-desktop-1.mga4, x86_64: installed-binary from 3.12.20-desktop-1.mga4 kernel-tmb-desktop-latest boots to a working desktop and applications work fine, 1600x1200 screen resolution install kernel-tmb-desktop-latest from updates_testing [root@localhost wilcal]# uname -a Linux localhost 3.12.26-tmb-desktop-1.mga4 #1 SMP PREEMPT Wed Aug 6 16:23:12 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux [root@localhost wilcal]# dkms status vboxadditions, 4.3.10-1.1.mga4, 3.12.20-desktop-1.mga4, x86_64: installed-binary from 3.12.20-desktop-1.mga4 kernel-tmb-desktop-latest boots to a working desktop and applications work fine, 1600x1200 screen resolution Test platform: Intel Core i7-2600K Sandy Bridge 3.4GHz GIGABYTE GA-Z68X-UD3-B3 LGA 1155 MoBo GIGABYTE GV-N440D3-1GI Nvidia GeForce GT 440 (Fermi) 1GB RTL8111/8168B PCI Express 1Gbit Ethernet DRAM 16GB (4 x 4GB) Mageia 4 64-bit, Nvidia driver virtualbox-4.3.10-1.1.mga4.x86_64 virtualbox-guest-additions-4.3.10-1.1.mga4.x86_64
In VirtualBox, M4, KDE, 32-bit Package(s) under test: kernel-tmb-server-latest install kernel-tmb-server-latest from updates_testing [root@localhost wilcal]# uname -a Linux localhost 3.12.26-tmb-server-1.mga4 #1 SMP Wed Aug 6 16:41:22 UTC 2014 i686 i686 i686 GNU/Linux [root@localhost wilcal]# dkms status vboxadditions, 4.3.10-1.1.mga4, 3.12.25-desktop-3.mga4, i586: installed-binary from 3.12.25-desktop-3.mga4 kernel-tmb-server-latest boots to a working desktop and applications work fine, 1600x1200 screen resolution Test platform: Intel Core i7-2600K Sandy Bridge 3.4GHz GIGABYTE GA-Z68X-UD3-B3 LGA 1155 MoBo GIGABYTE GV-N440D3-1GI Nvidia GeForce GT 440 (Fermi) 1GB RTL8111/8168B PCI Express 1Gbit Ethernet DRAM 16GB (4 x 4GB) Mageia 4 64-bit, Nvidia driver virtualbox-4.3.10-1.1.mga4.x86_64 virtualbox-guest-additions-4.3.10-1.1.mga4.x86_64
In VirtualBox, M4, KDE, 64-bit Package(s) under test: kernel-tmb-server-latest install kernel-tmb-server-latest from updates_testing [root@localhost wilcal]# uname -a Linux localhost 3.12.26-tmb-server-1.mga4 #1 SMP Wed Aug 6 17:09:39 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux [root@localhost wilcal]# dkms status vboxadditions, 4.3.10-1.1.mga4, 3.12.20-desktop-1.mga4, x86_64: installed-binary from 3.12.20-desktop-1.mga4 kernel-tmb-server-latest boots to a working desktop and applications work fine, 1600x1200 screen resolution Test platform: Intel Core i7-2600K Sandy Bridge 3.4GHz GIGABYTE GA-Z68X-UD3-B3 LGA 1155 MoBo GIGABYTE GV-N440D3-1GI Nvidia GeForce GT 440 (Fermi) 1GB RTL8111/8168B PCI Express 1Gbit Ethernet DRAM 16GB (4 x 4GB) Mageia 4 64-bit, Nvidia driver virtualbox-4.3.10-1.1.mga4.x86_64 virtualbox-guest-additions-4.3.10-1.1.mga4.x86_64
Tested mga4-64, real hardware, nvidia graphics driver. Ran server, laptop and desktop for several hours each of general use, no regressions noted.
CC: (none) => wrw105
tested mga4-32 real hardware, nvidia304 graphics driver. Ran each flavor (server, laptop, desktop) for several hours of general use, no regressions noted.
For me this update works fine. Testing complete for mga4 32-bit & 64-bit Can we push this one?
Validating the update. Could someone from the sysadmin team push this to updates. Thanks
Keywords: (none) => validated_updateWhiteboard: (none) => MGA4-32-OK MGA4-64-OKCC: (none) => sysadmin-bugs
Advisory uploaded.
CC: (none) => remiWhiteboard: MGA4-32-OK MGA4-64-OK => MGA4-32-OK MGA4-64- advisory
An update for this issue has been pushed to Mageia Updates repository. http://advisories.mageia.org/MGASA-2014-0337.html
Status: NEW => RESOLVEDResolution: (none) => FIXED