So lets start the 3.14 -longterm update tests... Initial advisory: This kernel-linus update provides an upgrade to the upstream 3.14 -longterm branch, currently 3.14.17 SRPM: kernel-linus-3.14.17-1.mga4.src.rpm i586: kernel-linus-3.14.17-1.mga4-1-1.mga4.i586.rpm kernel-linus-devel-3.14.17-1.mga4-1-1.mga4.i586.rpm kernel-linus-devel-latest-3.14.17-1.mga4.i586.rpm kernel-linus-doc-3.14.17-1.mga4.noarch.rpm kernel-linus-latest-3.14.17-1.mga4.i586.rpm kernel-linus-source-3.14.17-1.mga4-1-1.mga4.noarch.rpm kernel-linus-source-latest-3.14.17-1.mga4.noarch.rpm x86_64: kernel-linus-3.14.17-1.mga4-1-1.mga4.x86_64.rpm kernel-linus-devel-3.14.17-1.mga4-1-1.mga4.x86_64.rpm kernel-linus-devel-latest-3.14.17-1.mga4.x86_64.rpm kernel-linus-doc-3.14.17-1.mga4.noarch.rpm kernel-linus-latest-3.14.17-1.mga4.x86_64.rpm kernel-linus-source-3.14.17-1.mga4-1-1.mga4.noarch.rpm kernel-linus-source-latest-3.14.17-1.mga4.noarch.rpm Reproducible: Steps to Reproduce:
Testing on Mageia 4 32bit. I'm unsure how to test it exactly, but the update went fine (modules were built without error), a reboot too, and now I'm using the kernel while testing other stuff.
CC: (none) => remi
Whiteboard: (none) => feedback
Testing on Mageia 4 64bit. No error here, reboot Ok. Laptop Dell 5520. [mga_4@localhost ~]$ uname -a Linux localhost 3.14.18-1.mga4 #1 SMP Sun Sep 7 14:30:28 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux Stéphane.
CC: (none) => megastorage
I don't see but with this kernel, I loose the around windows! No minimize, Cross for closing windows... If I start on old kernel, I have it! Stéphane.
Source RPM: kernel-linus-3.14.17-1.mga4.src.rpm => kernel-linus-3.14.18-1.mga4.src.rpm
Summary: Update request: kernel-linus-3.14.17-1.mga4 => Update request: kernel-linus-3.14.18-1.mga4
Added "DO_NOT_TEST" on the whiteboard because Luigi12 just said kernel-linus is not ready for testing yet. Please remove when it is.
Whiteboard: feedback => feedback DO_NOT_TESTCC: (none) => marja11
Updated rpms list: SRPMS: kernel-linus-3.14.22-1.mga4.src.rpm i586: kernel-linus-3.14.22-1.mga4-1-1.mga4.i586.rpm kernel-linus-devel-3.14.22-1.mga4-1-1.mga4.i586.rpm kernel-linus-devel-latest-3.14.22-1.mga4.i586.rpm kernel-linus-doc-3.14.22-1.mga4.noarch.rpm kernel-linus-latest-3.14.22-1.mga4.i586.rpm kernel-linus-source-3.14.22-1.mga4-1-1.mga4.noarch.rpm kernel-linus-source-latest-3.14.22-1.mga4.noarch.rpm x86_64: kernel-linus-3.14.22-1.mga4-1-1.mga4.x86_64.rpm kernel-linus-devel-3.14.22-1.mga4-1-1.mga4.x86_64.rpm kernel-linus-devel-latest-3.14.22-1.mga4.x86_64.rpm kernel-linus-doc-3.14.22-1.mga4.noarch.rpm kernel-linus-latest-3.14.22-1.mga4.x86_64.rpm kernel-linus-source-3.14.22-1.mga4-1-1.mga4.noarch.rpm kernel-linus-source-latest-3.14.22-1.mga4.noarch.rpm
Whiteboard: feedback DO_NOT_TEST => (none)Summary: Update request: kernel-linus-3.14.18-1.mga4 => Update request: kernel-linus-3.14.22-1.mga4Source RPM: kernel-linus-3.14.18-1.mga4.src.rpm => kernel-linus-3.14.22-1.mga4.src.rpm
On real hardware, M4, KDE, 32-bit Package(s) under test: kernel-linus-latest default install of: kernel-linus-latest [root@localhost wilcal]# uname -a Linux localhost 3.12.26-1.mga4 #1 SMP Tue Aug 5 15:33:04 UTC 2014 i686 i686 i686 GNU/Linux [root@localhost wilcal]# urpmi kernel-linus-latest Package kernel-linus-latest-3.12.26-1.mga4.i586 is already installed System boots to a working desktop. Common apps work. Screen sizes are correct. install: kernel-linus-latest from updates_testing [root@localhost wilcal]# uname -a Linux localhost 3.14.22-1.mga4 #1 SMP Thu Oct 16 12:32:31 UTC 2014 i686 i686 i686 GNU/Linux [root@localhost wilcal]# urpmi kernel-linus-latest Package kernel-linus-latest-3.14.22-1.mga4.i586 is already installed System boots to a working desktop. Common apps work. Screen sizes are correct. Test platform: Intel, P4 530J 3.0 GHz, 800MHz FSB, 1MB L2, LGA 775 GigaByte GA-81915G Pro F4 i915G LGA 775 MoBo Marvel Yukon 88E8001 Gigabit LAN Intel High Def Audio, Azalia (C-Media 9880) (snd-hda-intel) Intel Graphics Media Accelerator 900 (Intel 82915G) Kingston 4GB (2 x 2GB) DDR400 PC-3200 250GB Seagate Kingwin KF-91-BK SATA Mobile Rack Kingwin KF-91-T-BK SATA Mobile Rack Tray Sony CD/DVD-RW DWQ120AB2
CC: (none) => wilcal.int
On real hardware, M4, KDE, 64-bit Package(s) under test: kernel-linus-latest default install of: kernel-linus-latest [root@localhost wilcal]# uname -a Linux localhost 3.12.26-1.mga4 #1 SMP Tue Aug 5 15:22:04 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux [root@localhost wilcal]# urpmi kernel-linus-latest Package kernel-linus-latest-3.12.26-1.mga4.x86_64 is already installed System boots to a working desktop. Common apps work. Screen sizes are correct. install: kernel-linus-latest from updates_testing [root@localhost wilcal]# uname -a Linux localhost 3.14.22-1.mga4 #1 SMP Thu Oct 16 12:41:46 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux [root@localhost wilcal]# urpmi kernel-linus-latest Package kernel-linus-latest-3.14.22-1.mga4.x86_64 is already installed System boots to a working desktop. Common apps work. Screen sizes are correct. Test platform: Intel Core i7-2600K Sandy Bridge 3.4GHz GIGABYTE GA-Z68X-UD3-B3 LGA 1155 MoBo GIGABYTE GV-N440D3-1GI Nvidia GeForce GT 440 (Fermi) 1GB RTL8111/8168B PCI Express 1Gbit Ethernet DRAM 16GB (4 x 4GB)
Advisory This kernel-linus update provides an upgrade to the upstream 3.14 -longterm branch, currently based on 3.14.22 and fixes the following security issues: The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.16.1 miscalculates the number of pages during the handling of a mapping failure, which allows guest OS users to (1) cause a denial of service (host OS memory corruption) or possibly have unspecified other impact by triggering a large gfn value or (2) cause a denial of service (host OS memory consumption) by triggering a small gfn value that leads to permanently pinned pages (CVE-2014-3601). The assoc_array_gc function in the associative-array implementation in lib/assoc_array.c in the Linux kernel before 3.16.3 does not properly implement garbage collection, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via multiple "keyctl newring" operations followed by a "keyctl timeout" operation (CVE-2014-3631). The pivot_root implementation in fs/namespace.c in the Linux kernel through 3.17 does not properly interact with certain locations of a chroot directory, which allows local users to cause a denial of service (mount-tree loop) via . (dot) values in both arguments to the pivot_root system call (CVE-2014-7970). The do_umount function in fs/namespace.c in the Linux kernel through 3.17 does not require the CAP_SYS_ADMIN capability for do_remount_sb calls that change the root filesystem to read-only, which allows local users to cause a denial of service (loss of writability) by making certain unshare system calls, clearing the / MNT_LOCKED flag, and making an MNT_FORCE umount system call (CVE-2014-7975). For other fixes included in this update, read the referenced changelogs. References: https://bugs.mageia.org/show_bug.cgi?id=14003 http://kernelnewbies.org/Linux_3.13 http://kernelnewbies.org/Linux_3.14 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.1 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.2 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.3 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.4 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.5 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.6 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.7 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.8 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.9 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.10 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.11 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.12 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.13 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.14 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.15 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.16 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.17 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.18 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.19 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.20 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.21 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.22
Adding blocked (for now) by https://bugs.mageia.org/show_bug.cgi?id=14235 people are hitting hdlist provides issue fixed in: http://advisories.mageia.org/MGAA-2014-0117.html that is now triggered by the switch to 3.14 branch
Depends on: (none) => 14235
Bug 14235 should be resolved. kernel updated to 3.14.23 to squash more CVEs and rebuilt for fixed kmod provides SRPMS: kernel-linus-3.14.23-1.mga4.src.rpm i586: kernel-linus-3.14.23-1.mga4-1-1.mga4.i586.rpm kernel-linus-devel-3.14.23-1.mga4-1-1.mga4.i586.rpm kernel-linus-devel-latest-3.14.23-1.mga4.i586.rpm kernel-linus-doc-3.14.23-1.mga4.noarch.rpm kernel-linus-latest-3.14.23-1.mga4.i586.rpm kernel-linus-source-3.14.23-1.mga4-1-1.mga4.noarch.rpm kernel-linus-source-latest-3.14.23-1.mga4.noarch.rpm x86_64: kernel-linus-3.14.23-1.mga4-1-1.mga4.x86_64.rpm kernel-linus-devel-3.14.23-1.mga4-1-1.mga4.x86_64.rpm kernel-linus-devel-latest-3.14.23-1.mga4.x86_64.rpm kernel-linus-doc-3.14.23-1.mga4.noarch.rpm kernel-linus-latest-3.14.23-1.mga4.x86_64.rpm kernel-linus-source-3.14.23-1.mga4-1-1.mga4.noarch.rpm kernel-linus-source-latest-3.14.23-1.mga4.noarch.rpm
Depends on: 14235 => (none)Summary: Update request: kernel-linus-3.14.22-1.mga4 => Update request: kernel-linus-3.14.23-1.mga4Source RPM: kernel-linus-3.14.22-1.mga4.src.rpm => kernel-linus-3.14.23-1.mga4.src.rpm
On real hardware, M4, KDE, 32-bit Package(s) under test: kernel-linus-latest install: kernel-linus-latest from updates_testing [root@localhost wilcal]# uname -a Linux localhost 3.14.23-1.mga4 #1 SMP Sun Nov 2 09:37:13 UTC 2014 i686 i686 i686 GNU/Linux [root@localhost wilcal]# urpmi kernel-linus-latest Package kernel-linus-latest-3.14.23-1.mga4.i586 is already installed System boots to a working desktop. Common apps work. Screen sizes are correct. Test platform: Intel, P4 530J 3.0 GHz, 800MHz FSB, 1MB L2, LGA 775 GigaByte GA-81915G Pro F4 i915G LGA 775 MoBo Marvel Yukon 88E8001 Gigabit LAN Intel High Def Audio, Azalia (C-Media 9880) (snd-hda-intel) Intel Graphics Media Accelerator 900 (Intel 82915G) Kingston 4GB (2 x 2GB) DDR400 PC-3200 250GB Seagate Kingwin KF-91-BK SATA Mobile Rack Kingwin KF-91-T-BK SATA Mobile Rack Tray Sony CD/DVD-RW DWQ120AB2
On real hardware, M4, KDE, 64-bit Package(s) under test: kernel-linus-latest install: kernel-linus-latest from updates_testing [root@localhost wilcal]# uname -a Linux localhost 3.14.23-1.mga4 #1 SMP Sun Nov 2 09:38:22 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux [root@localhost wilcal]# urpmi kernel-linus-latest Package kernel-linus-latest-3.14.23-1.mga4.x86_64 is already installed System boots to a working desktop. Common apps work. Screen sizes are correct. Test platform: Intel Core i7-2600K Sandy Bridge 3.4GHz GIGABYTE GA-Z68X-UD3-B3 LGA 1155 MoBo GIGABYTE GV-N440D3-1GI Nvidia GeForce GT 440 (Fermi) 1GB RTL8111/8168B PCI Express 1Gbit Ethernet DRAM 16GB (4 x 4GB)
Tested on HP Probook 6555b: AMD Phenom Quadcore N950 and Radeon 4250 graphical. 64-bit installation. This laptop does not load the nVidia packages of course. No vbox installed on this laptop. After rebooting no obvious problems seen : used MCC, LO, dolphin.
CC: (none) => herman.viaene
Validating. Sysadmins, please push this to updates. Thank you.
Keywords: (none) => validated_updateCC: (none) => sysadmin-bugs
Note that Thomas needs to post an updated advisory (and it needs to be uploaded) before this can be pushed.
Whiteboard: (none) => MGA4-32-OK MGA4-64-OK
Updated advisory This kernel-linus update provides an upgrade to the upstream 3.14 -longterm branch, currently based on 3.14.23 and fixes the following security issues: The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.16.1 miscalculates the number of pages during the handling of a mapping failure, which allows guest OS users to (1) cause a denial of service (host OS memory corruption) or possibly have unspecified other impact by triggering a large gfn value or (2) cause a denial of service (host OS memory consumption) by triggering a small gfn value that leads to permanently pinned pages (CVE-2014-3601). The assoc_array_gc function in the associative-array implementation in lib/assoc_array.c in the Linux kernel before 3.16.3 does not properly implement garbage collection, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via multiple "keyctl newring" operations followed by a "keyctl timeout" operation (CVE-2014-3631). The xfs_da3_fixhashpath function in fs/xfs/xfs_da_btree.c in the xfs implementation in the Linux kernel before 3.14.2 does not properly compare btree hash values, which allows local users to cause a denial of service (filesystem corruption, and OOPS or panic) via operations on directories that have hash collisions, as demonstrated by rmdir operations (CVE-2014-7283). The net_get_random_once implementation in net/core/utils.c in the Linux kernel 3.13.x and 3.14.x before 3.14.5 on certain Intel processors does not perform the intended slow-path operation to initialize random seeds, which makes it easier for remote attackers to spoof or disrupt IP communication by leveraging the predictability of TCP sequence numbers, TCP and UDP port numbers, and IP ID values (CVE-2014-7284) The pivot_root implementation in fs/namespace.c in the Linux kernel through 3.17 does not properly interact with certain locations of a chroot directory, which allows local users to cause a denial of service (mount-tree loop) via . (dot) values in both arguments to the pivot_root system call (CVE-2014-7970). The do_umount function in fs/namespace.c in the Linux kernel through 3.17 does not require the CAP_SYS_ADMIN capability for do_remount_sb calls that change the root filesystem to read-only, which allows local users to cause a denial of service (loss of writability) by making certain unshare system calls, clearing the / MNT_LOCKED flag, and making an MNT_FORCE umount system call (CVE-2014-7975). For other fixes included in this update, read the referenced changelogs. References: https://bugs.mageia.org/show_bug.cgi?id=14003 http://kernelnewbies.org/Linux_3.13 http://kernelnewbies.org/Linux_3.14 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.1 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.2 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.3 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.4 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.5 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.6 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.7 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.8 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.9 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.10 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.11 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.12 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.13 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.14 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.15 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.16 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.17 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.18 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.19 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.20 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.21 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.22 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.23
Advisory uploaded.
Whiteboard: MGA4-32-OK MGA4-64-OK => MGA4-32-OK MGA4-64-OK advisory
An update for this issue has been pushed to Mageia Updates repository. http://advisories.mageia.org/MGASA-2014-0451.html
Status: NEW => RESOLVEDResolution: (none) => FIXED