Security and data corruption fixes, advisory will follow... SRPMS: kernel-linus-4.4.55-1.mga5.src.rpm i586: kernel-linus-4.4.55-1.mga5-1-1.mga5.i586.rpm kernel-linus-devel-4.4.55-1.mga5-1-1.mga5.i586.rpm kernel-linus-devel-latest-4.4.55-1.mga5.i586.rpm kernel-linus-doc-4.4.55-1.mga5.noarch.rpm kernel-linus-latest-4.4.55-1.mga5.i586.rpm kernel-linus-source-4.4.55-1.mga5-1-1.mga5.noarch.rpm kernel-linus-source-latest-4.4.55-1.mga5.noarch.rpm x86_64: kernel-linus-4.4.55-1.mga5-1-1.mga5.x86_64.rpm kernel-linus-devel-4.4.55-1.mga5-1-1.mga5.x86_64.rpm kernel-linus-devel-latest-4.4.55-1.mga5.x86_64.rpm kernel-linus-doc-4.4.55-1.mga5.noarch.rpm kernel-linus-latest-4.4.55-1.mga5.x86_64.rpm kernel-linus-source-4.4.55-1.mga5-1-1.mga5.noarch.rpm kernel-linus-source-latest-4.4.55-1.mga5.noarch.rpm
Summary: Update request: kernel-linua-4.4.55-1.mga5 => Update request: kernel-linus-4.4.55-1.mga5
Raising priority as atleast one CVE is classed as a local privilegie escalation
Priority: Normal => HighSeverity: normal => critical
Blocks: (none) => 20553
x86_64 : Intel(R) Core(TM) i7-4790K CPU @ 4.00GHz : nVidia GeForce GTX 770 Installed: kernel-linus-4.4.55-1.mga5-1-1.mga5 kernel-linus-devel-4.4.55-1.mga5-1-1.mga5 kernel-linus-devel-latest-4.4.55-1.mga5 kernel-linus-doc-4.4.55-1.mga5.noarch kernel-linus-latest-4.4.55-1.mga5 kernel-linus-source-4.4.55-1.mga5-1-1.mga5.noarch kernel-linus-source-latest-4.4.55-1.mga5.noarch A clean install apart from: 1/2: kernel-linus-4.4.55-1.mga5 ############################################# cannot get info for device (6:0:0:1) at /usr/lib/libDrakX/detect_devices.pm line 272. Rebooted without problems, rebuilding kernel modules and installing them. $ uname -r 4.4.55-1.mga5 No apparent regressions.
CC: (none) => tarazed25
Advisory (already added to svn) subject: Updated kernel-linus packages fixes security vulnerabilities CVE: - CVE-2017-2636 - CVE-2017-6346 - CVE-2017-6347 - CVE-2017-6348 src: 5: core: - kernel-linus-4.4.55-1.mga5 description: | This kernel-linus update is based on upstream 4.4.55 and fixes atleast the following security issues: Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (CVE-2017-2636). Race condition in net/packet/af_packet.c in the Linux kernel before 4.9.13 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a multithreaded application that makes PACKET_FANOUT setsockopt system calls (CVE-2017-6346). The ip_cmsg_recv_checksum function in net/ipv4/ip_sockglue.c in the Linux kernel before 4.10.1 has incorrect expectations about skb data layout, which allows local users to cause a denial of service (buffer over-read) or possibly have unspecified other impact via crafted system calls, as demonstrated by use of the MSG_MORE flag in conjunction with loopback UDP transmission (CVE-2017-6347). The hashbin_delete function in net/irda/irqueue.c in the Linux kernel before 4.9.13 improperly manages lock dropping, which allows local users to cause a denial of service (deadlock) via crafted operations on IrDA devices (CVE-2017-6348). For other upstream fixes in this update, see the referenced changelogs. references: - https://bugs.mageia.org/show_bug.cgi?id=20529 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.51 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.52 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.53 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.54 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.55
Whiteboard: (none) => advisory
Testing complete on both i586 and x86_64, both on real hardware and under vb. Validating the update.
Keywords: (none) => validated_updateWhiteboard: advisory => advisory MGA5-64-OK MGA5-32-OKCC: (none) => davidwhodgins, sysadmin-bugs
An update for this issue has been pushed to the Mageia Updates repository. http://advisories.mageia.org/MGASA-2017-0090.html
Status: NEW => RESOLVEDResolution: (none) => FIXED