So lets start the 3.14 -longterm update tests... Initial advisory: This kernel-tmb update provides an upgrade to the upstream 3.14 -longterm branch, currently 3.14.17 SRPM: kernel-tmb-3.14.17-1.mga4.src.rpm i586: kernel-tmb-desktop-3.14.17-1.mga4-1-1.mga4.i586.rpm kernel-tmb-desktop586-3.14.17-1.mga4-1-1.mga4.i586.rpm kernel-tmb-desktop586-devel-3.14.17-1.mga4-1-1.mga4.i586.rpm kernel-tmb-desktop586-devel-latest-3.14.17-1.mga4.i586.rpm kernel-tmb-desktop586-latest-3.14.17-1.mga4.i586.rpm kernel-tmb-desktop-devel-3.14.17-1.mga4-1-1.mga4.i586.rpm kernel-tmb-desktop-devel-latest-3.14.17-1.mga4.i586.rpm kernel-tmb-desktop-latest-3.14.17-1.mga4.i586.rpm kernel-tmb-laptop-3.14.17-1.mga4-1-1.mga4.i586.rpm kernel-tmb-laptop-devel-3.14.17-1.mga4-1-1.mga4.i586.rpm kernel-tmb-laptop-devel-latest-3.14.17-1.mga4.i586.rpm kernel-tmb-laptop-latest-3.14.17-1.mga4.i586.rpm kernel-tmb-server-3.14.17-1.mga4-1-1.mga4.i586.rpm kernel-tmb-server-devel-3.14.17-1.mga4-1-1.mga4.i586.rpm kernel-tmb-server-devel-latest-3.14.17-1.mga4.i586.rpm kernel-tmb-server-latest-3.14.17-1.mga4.i586.rpm kernel-tmb-source-3.14.17-1.mga4-1-1.mga4.noarch.rpm kernel-tmb-source-latest-3.14.17-1.mga4.noarch.rpm x86_64: kernel-tmb-desktop-3.14.17-1.mga4-1-1.mga4.x86_64.rpm kernel-tmb-desktop-devel-3.14.17-1.mga4-1-1.mga4.x86_64.rpm kernel-tmb-desktop-devel-latest-3.14.17-1.mga4.x86_64.rpm kernel-tmb-desktop-latest-3.14.17-1.mga4.x86_64.rpm kernel-tmb-laptop-3.14.17-1.mga4-1-1.mga4.x86_64.rpm kernel-tmb-laptop-devel-3.14.17-1.mga4-1-1.mga4.x86_64.rpm kernel-tmb-laptop-devel-latest-3.14.17-1.mga4.x86_64.rpm kernel-tmb-laptop-latest-3.14.17-1.mga4.x86_64.rpm kernel-tmb-server-3.14.17-1.mga4-1-1.mga4.x86_64.rpm kernel-tmb-server-devel-3.14.17-1.mga4-1-1.mga4.x86_64.rpm kernel-tmb-server-devel-latest-3.14.17-1.mga4.x86_64.rpm kernel-tmb-server-latest-3.14.17-1.mga4.x86_64.rpm kernel-tmb-source-3.14.17-1.mga4-1-1.mga4.noarch.rpm kernel-tmb-source-latest-3.14.17-1.mga4.noarch.rpm Reproducible: Steps to Reproduce:
Whiteboard: (none) => feedback
Updated rpm list: SRPMS: kernel-tmb-3.14.22-1.mga4.src.rpm i586: kernel-tmb-desktop-3.14.22-1.mga4-1-1.mga4.i586.rpm kernel-tmb-desktop586-3.14.22-1.mga4-1-1.mga4.i586.rpm kernel-tmb-desktop586-devel-3.14.22-1.mga4-1-1.mga4.i586.rpm kernel-tmb-desktop586-devel-latest-3.14.22-1.mga4.i586.rpm kernel-tmb-desktop586-latest-3.14.22-1.mga4.i586.rpm kernel-tmb-desktop-devel-3.14.22-1.mga4-1-1.mga4.i586.rpm kernel-tmb-desktop-devel-latest-3.14.22-1.mga4.i586.rpm kernel-tmb-desktop-latest-3.14.22-1.mga4.i586.rpm kernel-tmb-laptop-3.14.22-1.mga4-1-1.mga4.i586.rpm kernel-tmb-laptop-devel-3.14.22-1.mga4-1-1.mga4.i586.rpm kernel-tmb-laptop-devel-latest-3.14.22-1.mga4.i586.rpm kernel-tmb-laptop-latest-3.14.22-1.mga4.i586.rpm kernel-tmb-server-3.14.22-1.mga4-1-1.mga4.i586.rpm kernel-tmb-server-devel-3.14.22-1.mga4-1-1.mga4.i586.rpm kernel-tmb-server-devel-latest-3.14.22-1.mga4.i586.rpm kernel-tmb-server-latest-3.14.22-1.mga4.i586.rpm kernel-tmb-source-3.14.22-1.mga4-1-1.mga4.noarch.rpm kernel-tmb-source-latest-3.14.22-1.mga4.noarch.rpm x86_64: kernel-tmb-desktop-3.14.22-1.mga4-1-1.mga4.x86_64.rpm kernel-tmb-desktop-devel-3.14.22-1.mga4-1-1.mga4.x86_64.rpm kernel-tmb-desktop-devel-latest-3.14.22-1.mga4.x86_64.rpm kernel-tmb-desktop-latest-3.14.22-1.mga4.x86_64.rpm kernel-tmb-laptop-3.14.22-1.mga4-1-1.mga4.x86_64.rpm kernel-tmb-laptop-devel-3.14.22-1.mga4-1-1.mga4.x86_64.rpm kernel-tmb-laptop-devel-latest-3.14.22-1.mga4.x86_64.rpm kernel-tmb-laptop-latest-3.14.22-1.mga4.x86_64.rpm kernel-tmb-server-3.14.22-1.mga4-1-1.mga4.x86_64.rpm kernel-tmb-server-devel-3.14.22-1.mga4-1-1.mga4.x86_64.rpm kernel-tmb-server-devel-latest-3.14.22-1.mga4.x86_64.rpm kernel-tmb-server-latest-3.14.22-1.mga4.x86_64.rpm kernel-tmb-source-3.14.22-1.mga4-1-1.mga4.noarch.rpm kernel-tmb-source-latest-3.14.22-1.mga4.noarch.rpm
Summary: Update request: kernel-tmb-3.14.17-1.mga4 => Update request: kernel-tmb-3.14.22-1.mga4Source RPM: kernel-tmb-3.14.17-1.mga4.src.rpm => kernel-tmb-3.14.22-1.mga4.src.rpmWhiteboard: feedback => (none)
On real hardware, M4, KDE, 32-bit Package(s) under test: kernel-tmb-desktop-latest default install of: kernel-tmb-desktop-latest [root@localhost wilcal]# uname -a Linux localhost 3.12.26-tmb-desktop-1.mga4 #1 SMP PREEMPT Wed Aug 6 16:21:05 UTC 2014 i686 i686 i686 GNU/Linux [root@localhost wilcal]# urpmi kernel-tmb-desktop-latest Package kernel-tmb-desktop-latest-3.12.26-1.mga4.i586 is already installed System boots to a working desktop. Common apps work. Screen sizes are correct. install: kernel-tmb-desktop-latest from updates_testing [root@localhost wilcal]# uname -a Linux localhost 3.14.22-tmb-desktop-1.mga4 #1 SMP PREEMPT Thu Oct 16 15:57:58 UTC 2014 i686 i686 i686 GNU/Linux [root@localhost wilcal]# urpmi kernel-tmb-desktop-latest Package kernel-tmb-desktop-latest-3.14.22-1.mga4.i586 is already installed System boots to a working desktop. Common apps work. Screen sizes are correct. Test platform: Intel, P4 530J 3.0 GHz, 800MHz FSB, 1MB L2, LGA 775 GigaByte GA-81915G Pro F4 i915G LGA 775 MoBo Marvel Yukon 88E8001 Gigabit LAN Intel High Def Audio, Azalia (C-Media 9880) (snd-hda-intel) Intel Graphics Media Accelerator 900 (Intel 82915G) Kingston 4GB (2 x 2GB) DDR400 PC-3200 250GB Seagate Kingwin KF-91-BK SATA Mobile Rack Kingwin KF-91-T-BK SATA Mobile Rack Tray Sony CD/DVD-RW DWQ120AB2
CC: (none) => wilcal.int
On real hardware, M4, KDE, 64-bit Package(s) under test: kernel-tmb-desktop-latest default install of: kernel-tmb-desktop-latest [root@localhost wilcal]# uname -a Linux localhost 3.12.26-tmb-desktop-1.mga4 #1 SMP PREEMPT Wed Aug 6 16:23:12 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux [root@localhost wilcal]# urpmi kernel-tmb-desktop-latest Package kernel-tmb-desktop-latest-3.12.26-1.mga4.x86_64 is already installed System boots to a working desktop. Common apps work. Screen sizes are correct. install: kernel-tmb-desktop-latest from updates_testing [root@localhost wilcal]# uname -a Linux localhost 3.14.22-tmb-desktop-1.mga4 #1 SMP PREEMPT Thu Oct 16 15:45:54 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux [root@localhost wilcal]# urpmi kernel-tmb-desktop-latest Package kernel-tmb-desktop-latest-3.14.22-1.mga4.x86_64 is already installed System boots to a working desktop. Common apps work. Screen sizes are correct. Test platform: Intel Core i7-2600K Sandy Bridge 3.4GHz GIGABYTE GA-Z68X-UD3-B3 LGA 1155 MoBo GIGABYTE GV-N440D3-1GI Nvidia GeForce GT 440 (Fermi) 1GB RTL8111/8168B PCI Express 1Gbit Ethernet DRAM 16GB (4 x 4GB)
Advisory This kernel-tmb update provides an upgrade to the upstream 3.14 -longterm branch, currently based on 3.14.22 and fixes the following security issues: The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.16.1 miscalculates the number of pages during the handling of a mapping failure, which allows guest OS users to (1) cause a denial of service (host OS memory corruption) or possibly have unspecified other impact by triggering a large gfn value or (2) cause a denial of service (host OS memory consumption) by triggering a small gfn value that leads to permanently pinned pages (CVE-2014-3601). The assoc_array_gc function in the associative-array implementation in lib/assoc_array.c in the Linux kernel before 3.16.3 does not properly implement garbage collection, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via multiple "keyctl newring" operations followed by a "keyctl timeout" operation (CVE-2014-3631). The pivot_root implementation in fs/namespace.c in the Linux kernel through 3.17 does not properly interact with certain locations of a chroot directory, which allows local users to cause a denial of service (mount-tree loop) via . (dot) values in both arguments to the pivot_root system call (CVE-2014-7970). The do_umount function in fs/namespace.c in the Linux kernel through 3.17 does not require the CAP_SYS_ADMIN capability for do_remount_sb calls that change the root filesystem to read-only, which allows local users to cause a denial of service (loss of writability) by making certain unshare system calls, clearing the / MNT_LOCKED flag, and making an MNT_FORCE umount system call (CVE-2014-7975). Other fixes: The X86_SYSFB config option has been disabled as it prevents proper KMS setup on some systems (mga#13098) BFS cpu scheduler has been updated to 0.454. BFQ io scheduler has been added and set as default. For other fixes included in this update, read the referenced changelogs. References: https://bugs.mageia.org/show_bug.cgi?id=14011 https://bugs.mageia.org/show_bug.cgi?id=13098 http://kernelnewbies.org/Linux_3.13 http://kernelnewbies.org/Linux_3.14 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.1 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.2 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.3 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.4 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.5 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.6 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.7 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.8 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.9 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.10 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.11 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.12 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.13 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.14 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.15 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.16 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.17 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.18 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.19 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.20 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.21 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.22
Adding blocked (for now) by https://bugs.mageia.org/show_bug.cgi?id=14235 people are hitting hdlist provides issue fixed in: http://advisories.mageia.org/MGAA-2014-0117.html that is now triggered by the switch to 3.14 branch
Depends on: (none) => 14235
Bug 14235 should be resolved. kernel updated to 3.14.23 to squash more CVEs and rebuilt for fixed kmod provides SRPMS: kernel-tmb-3.14.23-1.mga4.src.rpm i586: kernel-tmb-desktop-3.14.23-1.mga4-1-1.mga4.i586.rpm kernel-tmb-desktop586-3.14.23-1.mga4-1-1.mga4.i586.rpm kernel-tmb-desktop586-devel-3.14.23-1.mga4-1-1.mga4.i586.rpm kernel-tmb-desktop586-devel-latest-3.14.23-1.mga4.i586.rpm kernel-tmb-desktop586-latest-3.14.23-1.mga4.i586.rpm kernel-tmb-desktop-devel-3.14.23-1.mga4-1-1.mga4.i586.rpm kernel-tmb-desktop-devel-latest-3.14.23-1.mga4.i586.rpm kernel-tmb-desktop-latest-3.14.23-1.mga4.i586.rpm kernel-tmb-laptop-3.14.23-1.mga4-1-1.mga4.i586.rpm kernel-tmb-laptop-devel-3.14.23-1.mga4-1-1.mga4.i586.rpm kernel-tmb-laptop-devel-latest-3.14.23-1.mga4.i586.rpm kernel-tmb-laptop-latest-3.14.23-1.mga4.i586.rpm kernel-tmb-server-3.14.23-1.mga4-1-1.mga4.i586.rpm kernel-tmb-server-devel-3.14.23-1.mga4-1-1.mga4.i586.rpm kernel-tmb-server-devel-latest-3.14.23-1.mga4.i586.rpm kernel-tmb-server-latest-3.14.23-1.mga4.i586.rpm kernel-tmb-source-3.14.23-1.mga4-1-1.mga4.noarch.rpm kernel-tmb-source-latest-3.14.23-1.mga4.noarch.rpm x86:64: kernel-tmb-desktop-3.14.23-1.mga4-1-1.mga4.x86_64.rpm kernel-tmb-desktop-devel-3.14.23-1.mga4-1-1.mga4.x86_64.rpm kernel-tmb-desktop-devel-latest-3.14.23-1.mga4.x86_64.rpm kernel-tmb-desktop-latest-3.14.23-1.mga4.x86_64.rpm kernel-tmb-laptop-3.14.23-1.mga4-1-1.mga4.x86_64.rpm kernel-tmb-laptop-devel-3.14.23-1.mga4-1-1.mga4.x86_64.rpm kernel-tmb-laptop-devel-latest-3.14.23-1.mga4.x86_64.rpm kernel-tmb-laptop-latest-3.14.23-1.mga4.x86_64.rpm kernel-tmb-server-3.14.23-1.mga4-1-1.mga4.x86_64.rpm kernel-tmb-server-devel-3.14.23-1.mga4-1-1.mga4.x86_64.rpm kernel-tmb-server-devel-latest-3.14.23-1.mga4.x86_64.rpm kernel-tmb-server-latest-3.14.23-1.mga4.x86_64.rpm kernel-tmb-source-3.14.23-1.mga4-1-1.mga4.noarch.rpm kernel-tmb-source-latest-3.14.23-1.mga4.noarch.rpm
Source RPM: kernel-tmb-3.14.22-1.mga4.src.rpm => kernel-tmb-3.14.23-1.mga4.src.rpmDepends on: 14235 => (none)Summary: Update request: kernel-tmb-3.14.22-1.mga4 => Update request: kernel-tmb-3.14.23-1.mga4
On real hardware, M4, KDE, 32-bit Package(s) under test: kernel-tmb-desktop-latest install: kernel-tmb-desktop-latest from updates_testing [root@localhost wilcal]# uname -a Linux localhost 3.14.23-tmb-desktop-1.mga4 #1 SMP PREEMPT Sun Nov 2 10:18:00 UTC 2014 i686 i686 i686 GNU/Linux [root@localhost wilcal]# urpmi kernel-tmb-desktop-latest Package kernel-tmb-desktop-latest-3.14.23-1.mga4.i586 is already installed System boots to a working desktop. Common apps work. Screen sizes are correct. Test platform: Intel, P4 530J 3.0 GHz, 800MHz FSB, 1MB L2, LGA 775 GigaByte GA-81915G Pro F4 i915G LGA 775 MoBo Marvel Yukon 88E8001 Gigabit LAN Intel High Def Audio, Azalia (C-Media 9880) (snd-hda-intel) Intel Graphics Media Accelerator 900 (Intel 82915G) Kingston 4GB (2 x 2GB) DDR400 PC-3200 250GB Seagate Kingwin KF-91-BK SATA Mobile Rack Kingwin KF-91-T-BK SATA Mobile Rack Tray Sony CD/DVD-RW DWQ120AB2
On real hardware, M4, KDE, 64-bit Package(s) under test: kernel-tmb-desktop-latest install: kernel-tmb-desktop-latest from updates_testing [root@localhost wilcal]# uname -a Linux localhost 3.14.23-tmb-desktop-1.mga4 #1 SMP PREEMPT Sun Nov 2 10:10:33 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux [root@localhost wilcal]# urpmi kernel-tmb-desktop-latest Package kernel-tmb-desktop-latest-3.14.23-1.mga4.x86_64 is already installed System boots to a working desktop. Common apps work. Screen sizes are correct. Test platform: Intel Core i7-2600K Sandy Bridge 3.4GHz GIGABYTE GA-Z68X-UD3-B3 LGA 1155 MoBo GIGABYTE GV-N440D3-1GI Nvidia GeForce GT 440 (Fermi) 1GB RTL8111/8168B PCI Express 1Gbit Ethernet DRAM 16GB (4 x 4GB) ---------------- Comment x ---------------- In Whiteboard: MGA3-32-OK MGA3-64-OK MGA4-32-OK MGA4-64-OK For me this update works fine. Testing complete for mga3 32-bit & 64-bit Testing complete for mga4 32-bit & 64-bit Validating the update. Could someone from the sysadmin team push this to updates. Thanks
Tested on HP Probook 6555b AMD Quadcore with Radeon 4250 and MGA4-64. Opened Dolphin, MCC and LO on document, spreadsheet and presentation, no issues seen.
CC: (none) => herman.viaene
Validating. Sysadmins, please push this to updates. Thank you.
Keywords: (none) => validated_updateCC: (none) => sysadmin-bugs
Note that Thomas needs to post an updated advisory (and it needs to be uploaded) before this can be pushed.
Whiteboard: (none) => MGA4-32-OK MGA4-64-OK
Advisory This kernel-tmb update provides an upgrade to the upstream 3.14 -longterm branch, currently based on 3.14.23 and fixes the following security issues: The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.16.1 miscalculates the number of pages during the handling of a mapping failure, which allows guest OS users to (1) cause a denial of service (host OS memory corruption) or possibly have unspecified other impact by triggering a large gfn value or (2) cause a denial of service (host OS memory consumption) by triggering a small gfn value that leads to permanently pinned pages (CVE-2014-3601). The assoc_array_gc function in the associative-array implementation in lib/assoc_array.c in the Linux kernel before 3.16.3 does not properly implement garbage collection, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via multiple "keyctl newring" operations followed by a "keyctl timeout" operation (CVE-2014-3631). The xfs_da3_fixhashpath function in fs/xfs/xfs_da_btree.c in the xfs implementation in the Linux kernel before 3.14.2 does not properly compare btree hash values, which allows local users to cause a denial of service (filesystem corruption, and OOPS or panic) via operations on directories that have hash collisions, as demonstrated by rmdir operations (CVE-2014-7283). The net_get_random_once implementation in net/core/utils.c in the Linux kernel 3.13.x and 3.14.x before 3.14.5 on certain Intel processors does not perform the intended slow-path operation to initialize random seeds, which makes it easier for remote attackers to spoof or disrupt IP communication by leveraging the predictability of TCP sequence numbers, TCP and UDP port numbers, and IP ID values (CVE-2014-7284) The pivot_root implementation in fs/namespace.c in the Linux kernel through 3.17 does not properly interact with certain locations of a chroot directory, which allows local users to cause a denial of service (mount-tree loop) via . (dot) values in both arguments to the pivot_root system call (CVE-2014-7970). The do_umount function in fs/namespace.c in the Linux kernel through 3.17 does not require the CAP_SYS_ADMIN capability for do_remount_sb calls that change the root filesystem to read-only, which allows local users to cause a denial of service (loss of writability) by making certain unshare system calls, clearing the / MNT_LOCKED flag, and making an MNT_FORCE umount system call (CVE-2014-7975). Other fixes: The X86_SYSFB config option has been disabled as it prevents proper KMS setup on some systems (mga#13098) BFS cpu scheduler has been updated to 0.454. BFQ io scheduler has been added and set as default. For other fixes included in this update, read the referenced changelogs. References: https://bugs.mageia.org/show_bug.cgi?id=14011 https://bugs.mageia.org/show_bug.cgi?id=13098 http://kernelnewbies.org/Linux_3.13 http://kernelnewbies.org/Linux_3.14 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.1 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.2 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.3 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.4 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.5 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.6 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.7 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.8 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.9 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.10 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.11 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.12 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.13 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.14 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.15 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.16 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.17 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.18 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.19 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.20 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.21 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.22 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.23
Advisory uploaded.
Whiteboard: MGA4-32-OK MGA4-64-OK => MGA4-32-OK MGA4-64-OK advisory
An update for this issue has been pushed to Mageia Updates repository. http://advisories.mageia.org/MGASA-2014-0452.html
Status: NEW => RESOLVEDResolution: (none) => FIXED