Bug 14003 - Update request: kernel-linus-3.14.23-1.mga4
Summary: Update request: kernel-linus-3.14.23-1.mga4
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: RPM Packages (show other bugs)
Version: 4
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact:
URL:
Whiteboard: MGA4-32-OK MGA4-64-OK advisory
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2014-08-28 16:00 CEST by Thomas Backlund
Modified: 2014-11-15 19:32 CET (History)
6 users (show)

See Also:
Source RPM: kernel-linus-3.14.23-1.mga4.src.rpm
CVE:
Status comment:


Attachments

Description Thomas Backlund 2014-08-28 16:00:07 CEST
So lets start the 3.14 -longterm update tests...

Initial advisory:
This kernel-linus update provides an upgrade to the upstream 3.14
-longterm branch, currently 3.14.17

SRPM:
kernel-linus-3.14.17-1.mga4.src.rpm

i586:
kernel-linus-3.14.17-1.mga4-1-1.mga4.i586.rpm
kernel-linus-devel-3.14.17-1.mga4-1-1.mga4.i586.rpm
kernel-linus-devel-latest-3.14.17-1.mga4.i586.rpm
kernel-linus-doc-3.14.17-1.mga4.noarch.rpm
kernel-linus-latest-3.14.17-1.mga4.i586.rpm
kernel-linus-source-3.14.17-1.mga4-1-1.mga4.noarch.rpm
kernel-linus-source-latest-3.14.17-1.mga4.noarch.rpm

x86_64:
kernel-linus-3.14.17-1.mga4-1-1.mga4.x86_64.rpm
kernel-linus-devel-3.14.17-1.mga4-1-1.mga4.x86_64.rpm
kernel-linus-devel-latest-3.14.17-1.mga4.x86_64.rpm
kernel-linus-doc-3.14.17-1.mga4.noarch.rpm
kernel-linus-latest-3.14.17-1.mga4.x86_64.rpm
kernel-linus-source-3.14.17-1.mga4-1-1.mga4.noarch.rpm
kernel-linus-source-latest-3.14.17-1.mga4.noarch.rpm


Reproducible: 

Steps to Reproduce:
Comment 1 Rémi Verschelde 2014-08-28 20:54:53 CEST
Testing on Mageia 4 32bit. I'm unsure how to test it exactly, but the update went fine (modules were built without error), a reboot too, and now I'm using the kernel while testing other stuff.

CC: (none) => remi

claire robinson 2014-08-30 15:26:23 CEST

Whiteboard: (none) => feedback

Comment 2 stephane FLAVIGNY 2014-09-26 19:43:14 CEST
Testing on Mageia 4 64bit. No error here, reboot Ok.

Laptop Dell 5520.

[mga_4@localhost ~]$ uname -a
Linux localhost 3.14.18-1.mga4 #1 SMP Sun Sep 7 14:30:28 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux

Stéphane.

CC: (none) => megastorage

Comment 3 stephane FLAVIGNY 2014-09-26 20:50:29 CEST
I don't see but with this kernel, I loose the around windows! No minimize, Cross for closing windows...

If I start on old kernel, I have it!

Stéphane.
stephane FLAVIGNY 2014-09-26 21:14:41 CEST

Source RPM: kernel-linus-3.14.17-1.mga4.src.rpm => kernel-linus-3.14.18-1.mga4.src.rpm

stephane FLAVIGNY 2014-09-26 21:27:45 CEST

Summary: Update request: kernel-linus-3.14.17-1.mga4 => Update request: kernel-linus-3.14.18-1.mga4

Comment 4 Marja Van Waes 2014-09-26 22:10:11 CEST
Added "DO_NOT_TEST" on the whiteboard because Luigi12 just said kernel-linus is not ready for testing yet.

Please remove when it is.

Whiteboard: feedback => feedback DO_NOT_TEST
CC: (none) => marja11

Comment 5 Thomas Backlund 2014-10-16 22:30:30 CEST
Updated rpms list:

SRPMS:
kernel-linus-3.14.22-1.mga4.src.rpm


i586:
kernel-linus-3.14.22-1.mga4-1-1.mga4.i586.rpm
kernel-linus-devel-3.14.22-1.mga4-1-1.mga4.i586.rpm
kernel-linus-devel-latest-3.14.22-1.mga4.i586.rpm
kernel-linus-doc-3.14.22-1.mga4.noarch.rpm
kernel-linus-latest-3.14.22-1.mga4.i586.rpm
kernel-linus-source-3.14.22-1.mga4-1-1.mga4.noarch.rpm
kernel-linus-source-latest-3.14.22-1.mga4.noarch.rpm


x86_64:
kernel-linus-3.14.22-1.mga4-1-1.mga4.x86_64.rpm
kernel-linus-devel-3.14.22-1.mga4-1-1.mga4.x86_64.rpm
kernel-linus-devel-latest-3.14.22-1.mga4.x86_64.rpm
kernel-linus-doc-3.14.22-1.mga4.noarch.rpm
kernel-linus-latest-3.14.22-1.mga4.x86_64.rpm
kernel-linus-source-3.14.22-1.mga4-1-1.mga4.noarch.rpm
kernel-linus-source-latest-3.14.22-1.mga4.noarch.rpm

Whiteboard: feedback DO_NOT_TEST => (none)
Summary: Update request: kernel-linus-3.14.18-1.mga4 => Update request: kernel-linus-3.14.22-1.mga4
Source RPM: kernel-linus-3.14.18-1.mga4.src.rpm => kernel-linus-3.14.22-1.mga4.src.rpm

Comment 6 William Kenney 2014-10-21 18:15:09 CEST
On real hardware, M4, KDE, 32-bit

Package(s) under test:
kernel-linus-latest

default install of:
kernel-linus-latest

[root@localhost wilcal]# uname -a
Linux localhost 3.12.26-1.mga4 #1 SMP Tue Aug 5 15:33:04 UTC 2014 i686 i686 i686 GNU/Linux
[root@localhost wilcal]# urpmi kernel-linus-latest
Package kernel-linus-latest-3.12.26-1.mga4.i586 is already installed

System boots to a working desktop. Common apps work. Screen sizes are correct.

install:
kernel-linus-latest
from updates_testing

[root@localhost wilcal]# uname -a
Linux localhost 3.14.22-1.mga4 #1 SMP Thu Oct 16 12:32:31 UTC 2014 i686 i686 i686 GNU/Linux
[root@localhost wilcal]# urpmi kernel-linus-latest
Package kernel-linus-latest-3.14.22-1.mga4.i586 is already installed

System boots to a working desktop. Common apps work. Screen sizes are correct.

Test platform:
Intel, P4 530J 3.0 GHz, 800MHz FSB, 1MB L2, LGA 775
GigaByte  GA-81915G Pro F4  i915G  LGA 775  MoBo
 Marvel Yukon 88E8001 Gigabit LAN
 Intel High Def Audio, Azalia (C-Media 9880) (snd-hda-intel)
 Intel Graphics Media Accelerator 900 (Intel 82915G)
Kingston 4GB (2 x 2GB) DDR400 PC-3200
250GB Seagate
Kingwin KF-91-BK SATA Mobile Rack
Kingwin KF-91-T-BK SATA Mobile Rack Tray
Sony CD/DVD-RW DWQ120AB2

CC: (none) => wilcal.int

Comment 7 William Kenney 2014-10-21 19:42:50 CEST
On real hardware, M4, KDE, 64-bit

Package(s) under test:
kernel-linus-latest

default install of:
kernel-linus-latest

[root@localhost wilcal]# uname -a
Linux localhost 3.12.26-1.mga4 #1 SMP Tue Aug 5 15:22:04 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux
[root@localhost wilcal]# urpmi kernel-linus-latest
Package kernel-linus-latest-3.12.26-1.mga4.x86_64 is already installed

System boots to a working desktop. Common apps work. Screen sizes are correct.

install:
kernel-linus-latest
from updates_testing

[root@localhost wilcal]# uname -a
Linux localhost 3.14.22-1.mga4 #1 SMP Thu Oct 16 12:41:46 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux
[root@localhost wilcal]# urpmi kernel-linus-latest
Package kernel-linus-latest-3.14.22-1.mga4.x86_64 is already installed

System boots to a working desktop. Common apps work. Screen sizes are correct.

Test platform:
Intel Core i7-2600K Sandy Bridge 3.4GHz
GIGABYTE GA-Z68X-UD3-B3 LGA 1155 MoBo
GIGABYTE GV-N440D3-1GI Nvidia GeForce GT 440 (Fermi) 1GB
RTL8111/8168B PCI Express 1Gbit Ethernet
DRAM 16GB (4 x 4GB)
Comment 8 Thomas Backlund 2014-10-23 21:24:56 CEST
Advisory

This kernel-linus update provides an upgrade to the upstream 3.14
-longterm branch, currently based on 3.14.22 and fixes the following
security issues:

The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux
kernel through 3.16.1 miscalculates the number of pages during the
handling of a mapping failure, which allows guest OS users to (1)
cause a denial of service (host OS memory corruption) or possibly
have unspecified other impact by triggering a large gfn value or
(2) cause a denial of service (host OS memory consumption) by
triggering a small gfn value that leads to permanently pinned
pages (CVE-2014-3601).

The assoc_array_gc function in the associative-array implementation
in lib/assoc_array.c in the Linux kernel before 3.16.3 does not
properly implement garbage collection, which allows local users to
cause a denial of service (NULL pointer dereference and system
crash) or possibly have unspecified other impact via multiple
"keyctl newring" operations followed by a "keyctl timeout"
operation (CVE-2014-3631).

The pivot_root implementation in fs/namespace.c in the Linux kernel
through 3.17 does not properly interact with certain locations of
a chroot directory, which allows local users to cause a denial of
service (mount-tree loop) via . (dot) values in both arguments to
the pivot_root system call (CVE-2014-7970).

The do_umount function in fs/namespace.c in the Linux kernel 
through 3.17 does not require the CAP_SYS_ADMIN capability for
do_remount_sb calls that change the root filesystem to read-only,
which allows local users to cause a denial of service (loss of
writability) by making certain unshare system calls, clearing the
/ MNT_LOCKED flag, and making an MNT_FORCE umount system call
(CVE-2014-7975).

For other fixes included in this update, read the referenced 
changelogs.

References:
https://bugs.mageia.org/show_bug.cgi?id=14003
http://kernelnewbies.org/Linux_3.13
http://kernelnewbies.org/Linux_3.14
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.1
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.2
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.3
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.4
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.5
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.6
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.7
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.8
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.9
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.10
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.11
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.12
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.13
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.14
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.15
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.16
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.17
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.18
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.19
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.20
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.21
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.22
Comment 9 Thomas Backlund 2014-10-26 11:46:12 CET
Adding blocked (for now) by
https://bugs.mageia.org/show_bug.cgi?id=14235

people are hitting hdlist provides issue fixed in:
http://advisories.mageia.org/MGAA-2014-0117.html

that is now triggered by the switch to 3.14 branch

Depends on: (none) => 14235

Comment 10 Thomas Backlund 2014-11-02 22:31:44 CET
Bug 14235 should be resolved.

kernel updated to 3.14.23 to squash more CVEs and rebuilt for fixed kmod provides

SRPMS:
kernel-linus-3.14.23-1.mga4.src.rpm


i586:
kernel-linus-3.14.23-1.mga4-1-1.mga4.i586.rpm
kernel-linus-devel-3.14.23-1.mga4-1-1.mga4.i586.rpm
kernel-linus-devel-latest-3.14.23-1.mga4.i586.rpm
kernel-linus-doc-3.14.23-1.mga4.noarch.rpm
kernel-linus-latest-3.14.23-1.mga4.i586.rpm
kernel-linus-source-3.14.23-1.mga4-1-1.mga4.noarch.rpm
kernel-linus-source-latest-3.14.23-1.mga4.noarch.rpm


x86_64:
kernel-linus-3.14.23-1.mga4-1-1.mga4.x86_64.rpm
kernel-linus-devel-3.14.23-1.mga4-1-1.mga4.x86_64.rpm
kernel-linus-devel-latest-3.14.23-1.mga4.x86_64.rpm
kernel-linus-doc-3.14.23-1.mga4.noarch.rpm
kernel-linus-latest-3.14.23-1.mga4.x86_64.rpm
kernel-linus-source-3.14.23-1.mga4-1-1.mga4.noarch.rpm
kernel-linus-source-latest-3.14.23-1.mga4.noarch.rpm

Depends on: 14235 => (none)
Summary: Update request: kernel-linus-3.14.22-1.mga4 => Update request: kernel-linus-3.14.23-1.mga4
Source RPM: kernel-linus-3.14.22-1.mga4.src.rpm => kernel-linus-3.14.23-1.mga4.src.rpm

Comment 11 William Kenney 2014-11-05 17:43:24 CET
On real hardware, M4, KDE, 32-bit

Package(s) under test:
kernel-linus-latest

install:
kernel-linus-latest
from updates_testing

[root@localhost wilcal]# uname -a
Linux localhost 3.14.23-1.mga4 #1 SMP Sun Nov 2 09:37:13 UTC 2014 i686 i686 i686 GNU/Linux
[root@localhost wilcal]# urpmi kernel-linus-latest
Package kernel-linus-latest-3.14.23-1.mga4.i586 is already installed

System boots to a working desktop. Common apps work. Screen sizes are correct.

Test platform:
Intel, P4 530J 3.0 GHz, 800MHz FSB, 1MB L2, LGA 775
GigaByte  GA-81915G Pro F4  i915G  LGA 775  MoBo
 Marvel Yukon 88E8001 Gigabit LAN
 Intel High Def Audio, Azalia (C-Media 9880) (snd-hda-intel)
 Intel Graphics Media Accelerator 900 (Intel 82915G)
Kingston 4GB (2 x 2GB) DDR400 PC-3200
250GB Seagate
Kingwin KF-91-BK SATA Mobile Rack
Kingwin KF-91-T-BK SATA Mobile Rack Tray
Sony CD/DVD-RW DWQ120AB2
Comment 12 William Kenney 2014-11-05 18:26:13 CET
On real hardware, M4, KDE, 64-bit

Package(s) under test:
kernel-linus-latest

install:
kernel-linus-latest
from updates_testing

[root@localhost wilcal]# uname -a
Linux localhost 3.14.23-1.mga4 #1 SMP Sun Nov 2 09:38:22 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux
[root@localhost wilcal]# urpmi kernel-linus-latest
Package kernel-linus-latest-3.14.23-1.mga4.x86_64 is already installed

System boots to a working desktop. Common apps work. Screen sizes are correct.

Test platform:
Intel Core i7-2600K Sandy Bridge 3.4GHz
GIGABYTE GA-Z68X-UD3-B3 LGA 1155 MoBo
GIGABYTE GV-N440D3-1GI Nvidia GeForce GT 440 (Fermi) 1GB
RTL8111/8168B PCI Express 1Gbit Ethernet
DRAM 16GB (4 x 4GB)
Comment 13 Herman Viaene 2014-11-10 15:50:46 CET
Tested on HP Probook 6555b: AMD Phenom Quadcore N950 and Radeon 4250 graphical. 64-bit installation. This laptop does not load the nVidia packages of course. No vbox installed on this laptop.
After rebooting no obvious problems seen : used MCC, LO, dolphin.

CC: (none) => herman.viaene

Comment 14 David Walser 2014-11-15 05:40:03 CET
Validating.  Sysadmins, please push this to updates.  Thank you.

Keywords: (none) => validated_update
CC: (none) => sysadmin-bugs

Comment 15 David Walser 2014-11-15 05:42:58 CET
Note that Thomas needs to post an updated advisory (and it needs to be uploaded) before this can be pushed.

Whiteboard: (none) => MGA4-32-OK MGA4-64-OK

Comment 16 Thomas Backlund 2014-11-15 09:24:26 CET
Updated advisory

This kernel-linus update provides an upgrade to the upstream 3.14
-longterm branch, currently based on 3.14.23 and fixes the following
security issues:

The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux
kernel through 3.16.1 miscalculates the number of pages during the
handling of a mapping failure, which allows guest OS users to (1)
cause a denial of service (host OS memory corruption) or possibly
have unspecified other impact by triggering a large gfn value or
(2) cause a denial of service (host OS memory consumption) by
triggering a small gfn value that leads to permanently pinned
pages (CVE-2014-3601).

The assoc_array_gc function in the associative-array implementation
in lib/assoc_array.c in the Linux kernel before 3.16.3 does not
properly implement garbage collection, which allows local users to
cause a denial of service (NULL pointer dereference and system
crash) or possibly have unspecified other impact via multiple
"keyctl newring" operations followed by a "keyctl timeout"
operation (CVE-2014-3631).

The xfs_da3_fixhashpath function in fs/xfs/xfs_da_btree.c in the
xfs implementation in the Linux kernel before 3.14.2 does not properly
compare btree hash values, which allows local users to cause a denial
of service (filesystem corruption, and OOPS or panic) via operations
on directories that have hash collisions, as demonstrated by rmdir
operations (CVE-2014-7283).

The net_get_random_once implementation in net/core/utils.c in the
Linux kernel 3.13.x and 3.14.x before 3.14.5 on certain Intel processors
does not perform the intended slow-path operation to initialize random
seeds, which makes it easier for remote attackers to spoof or disrupt IP
communication by leveraging the predictability of TCP sequence numbers,
TCP and UDP port numbers, and IP ID values (CVE-2014-7284)

The pivot_root implementation in fs/namespace.c in the Linux kernel
through 3.17 does not properly interact with certain locations of
a chroot directory, which allows local users to cause a denial of
service (mount-tree loop) via . (dot) values in both arguments to
the pivot_root system call (CVE-2014-7970).

The do_umount function in fs/namespace.c in the Linux kernel 
through 3.17 does not require the CAP_SYS_ADMIN capability for
do_remount_sb calls that change the root filesystem to read-only,
which allows local users to cause a denial of service (loss of
writability) by making certain unshare system calls, clearing the
/ MNT_LOCKED flag, and making an MNT_FORCE umount system call
(CVE-2014-7975).

For other fixes included in this update, read the referenced 
changelogs.

References:
https://bugs.mageia.org/show_bug.cgi?id=14003
http://kernelnewbies.org/Linux_3.13
http://kernelnewbies.org/Linux_3.14
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.1
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.2
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.3
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.4
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.5
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.6
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.7
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.8
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.9
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.10
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.11
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.12
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.13
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.14
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.15
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.16
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.17
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.18
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.19
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.20
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.21
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.22
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.23
Comment 17 Rémi Verschelde 2014-11-15 11:22:27 CET
Advisory uploaded.

Whiteboard: MGA4-32-OK MGA4-64-OK => MGA4-32-OK MGA4-64-OK advisory

Comment 18 Mageia Robot 2014-11-15 19:32:18 CET
An update for this issue has been pushed to Mageia Updates repository.

http://advisories.mageia.org/MGASA-2014-0451.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.