New security issues fixed. Advisory will follow... SRPMS: kernel-4.4.105-1.mga5.src.rpm kernel-userspace-headers-4.4.105-1.mga5.src.rpm kmod-vboxadditions-5.1.30-2.mga5.src.rpm kmod-virtualbox-5.1.30-2.mga5.src.rpm kmod-xtables-addons-2.10-50.mga5.src.rpm i586: cpupower-4.4.105-1.mga5.i586.rpm cpupower-devel-4.4.105-1.mga5.i586.rpm kernel-desktop-4.4.105-1.mga5-1-1.mga5.i586.rpm kernel-desktop586-4.4.105-1.mga5-1-1.mga5.i586.rpm kernel-desktop586-devel-4.4.105-1.mga5-1-1.mga5.i586.rpm kernel-desktop586-devel-latest-4.4.105-1.mga5.i586.rpm kernel-desktop586-latest-4.4.105-1.mga5.i586.rpm kernel-desktop-devel-4.4.105-1.mga5-1-1.mga5.i586.rpm kernel-desktop-devel-latest-4.4.105-1.mga5.i586.rpm kernel-desktop-latest-4.4.105-1.mga5.i586.rpm kernel-doc-4.4.105-1.mga5.noarch.rpm kernel-server-4.4.105-1.mga5-1-1.mga5.i586.rpm kernel-server-devel-4.4.105-1.mga5-1-1.mga5.i586.rpm kernel-server-devel-latest-4.4.105-1.mga5.i586.rpm kernel-server-latest-4.4.105-1.mga5.i586.rpm kernel-source-4.4.105-1.mga5-1-1.mga5.noarch.rpm kernel-source-latest-4.4.105-1.mga5.noarch.rpm kernel-userspace-headers-4.4.105-1.mga5.i586.rpm perf-4.4.105-1.mga5.i586.rpm vboxadditions-kernel-4.4.105-desktop-1.mga5-5.1.30-2.mga5.i586.rpm vboxadditions-kernel-4.4.105-desktop586-1.mga5-5.1.30-2.mga5.i586.rpm vboxadditions-kernel-4.4.105-server-1.mga5-5.1.30-2.mga5.i586.rpm vboxadditions-kernel-desktop586-latest-5.1.30-2.mga5.i586.rpm vboxadditions-kernel-desktop-latest-5.1.30-2.mga5.i586.rpm vboxadditions-kernel-server-latest-5.1.30-2.mga5.i586.rpm virtualbox-kernel-4.4.105-desktop-1.mga5-5.1.30-2.mga5.i586.rpm virtualbox-kernel-4.4.105-desktop586-1.mga5-5.1.30-2.mga5.i586.rpm virtualbox-kernel-4.4.105-server-1.mga5-5.1.30-2.mga5.i586.rpm virtualbox-kernel-desktop586-latest-5.1.30-2.mga5.i586.rpm virtualbox-kernel-desktop-latest-5.1.30-2.mga5.i586.rpm virtualbox-kernel-server-latest-5.1.30-2.mga5.i586.rpm xtables-addons-kernel-4.4.105-desktop-1.mga5-2.10-50.mga5.i586.rpm xtables-addons-kernel-4.4.105-desktop586-1.mga5-2.10-50.mga5.i586.rpm xtables-addons-kernel-4.4.105-server-1.mga5-2.10-50.mga5.i586.rpm xtables-addons-kernel-desktop586-latest-2.10-50.mga5.i586.rpm xtables-addons-kernel-desktop-latest-2.10-50.mga5.i586.rpm xtables-addons-kernel-server-latest-2.10-50.mga5.i586.rpm x86_64: cpupower-4.4.105-1.mga5.x86_64.rpm cpupower-devel-4.4.105-1.mga5.x86_64.rpm kernel-desktop-4.4.105-1.mga5-1-1.mga5.x86_64.rpm kernel-desktop-devel-4.4.105-1.mga5-1-1.mga5.x86_64.rpm kernel-desktop-devel-latest-4.4.105-1.mga5.x86_64.rpm kernel-desktop-latest-4.4.105-1.mga5.x86_64.rpm kernel-doc-4.4.105-1.mga5.noarch.rpm kernel-server-4.4.105-1.mga5-1-1.mga5.x86_64.rpm kernel-server-devel-4.4.105-1.mga5-1-1.mga5.x86_64.rpm kernel-server-devel-latest-4.4.105-1.mga5.x86_64.rpm kernel-server-latest-4.4.105-1.mga5.x86_64.rpm kernel-source-4.4.105-1.mga5-1-1.mga5.noarch.rpm kernel-source-latest-4.4.105-1.mga5.noarch.rpm kernel-userspace-headers-4.4.105-1.mga5.x86_64.rpm perf-4.4.105-1.mga5.x86_64.rpm vboxadditions-kernel-4.4.105-desktop-1.mga5-5.1.30-2.mga5.x86_64.rpm vboxadditions-kernel-4.4.105-server-1.mga5-5.1.30-2.mga5.x86_64.rpm vboxadditions-kernel-desktop-latest-5.1.30-2.mga5.x86_64.rpm vboxadditions-kernel-server-latest-5.1.30-2.mga5.x86_64.rpm virtualbox-kernel-4.4.105-desktop-1.mga5-5.1.30-2.mga5.x86_64.rpm virtualbox-kernel-4.4.105-server-1.mga5-5.1.30-2.mga5.x86_64.rpm virtualbox-kernel-desktop-latest-5.1.30-2.mga5.x86_64.rpm virtualbox-kernel-server-latest-5.1.30-2.mga5.x86_64.rpm xtables-addons-kernel-4.4.105-desktop-1.mga5-2.10-50.mga5.x86_64.rpm xtables-addons-kernel-4.4.105-server-1.mga5-2.10-50.mga5.x86_64.rpm xtables-addons-kernel-desktop-latest-2.10-50.mga5.x86_64.rpm xtables-addons-kernel-server-latest-2.10-50.mga5.x86_64.rpm
on mga5-64 packages installed cleanly: - cpupower-4.4.105-1.mga5.x86_64 - kernel-desktop-4.4.105-1.mga5-1-1.mga5.x86_64 - kernel-desktop-latest-4.4.105-1.mga5.x86_64 - virtualbox-kernel-4.4.105-desktop-1.mga5-5.1.30-2.mga5.x86_64 - virtualbox-kernel-desktop-latest-5.1.30-2.mga5.x86_64 uname -r 4.4.105-desktop-1.mga5 vbox and client (mga5-32) running normally no regressions noted OK for mga5-64 on this system: PC-BIOS (legacy) boot GPT partitions Dell product: Precision Tower 3620 Mobo: Dell model: 09WH54 Card: Intel HD Graphics 530 CPU: Quad core Intel Core i7-6700 (-HT-MCP-)
CC: (none) => jim
MGA5-32 on Dell Latitude D600 Xfce Installed desktop packages, no vbox stuff After reboot exercized sound files, video, documents, presentation, nfs access, reading newspaper on internet including pictures and video. All looks OK
CC: (none) => herman.viaeneWhiteboard: (none) => MGA5-32-OK
On mga5-32 in a vbox VM packages installed cleanly: - cpupower-4.4.105-1.mga5.i586 - kernel-desktop-4.4.105-1.mga5-1-1.mga5.i586 - kernel-desktop-latest-4.4.105-1.mga5.i586 - kernel-userspace-headers-4.4.105-1.mga5.i586 - vboxadditions-kernel-4.4.105-desktop-1.mga5-5.1.30-2.mga5.i586 - vboxadditions-kernel-desktop-latest-5.1.30-2.mga5.i586 VM rebooted normally uname -r 4.4.105-desktop-1.mga5 no regressions noted OK for maga5-32 in a vbox VM
MGA5-32 on real hardware, Intel Core 2 Duo, Intel motherboard, 8GB, Intel graphics, wired Internet. Updated server kernel, rebooted, tried several apps, all looks good.
CC: (none) => andrewsfarm
MGA5-64 on real hardware, ASRock motherboard, Athlon X2 7750 processor, 8GB, nvidia 9800GT graphics, Atheros wifi. Updated server kernel, rebooted. Wifi OK, tried several apps, all looks good.
Testing M5/64 real hardware, ATI/Radeon video. $ uname -r 4.4.105-desktop-1.mga5 I have been using this extensively to test at length an update. Plus briefly sound & video. Looks OK. In the light of earlier comments, I am validating this. @Thomas It still needs its advisory.
Whiteboard: MGA5-32-OK => MGA5-32-OK MGA5-64-OKKeywords: (none) => advisoryCC: (none) => lewyssmith
Keywords: advisory => validated_updateCC: (none) => sysadmin-bugs
Advisory added to svn: This kernel update is based on upstream 4.4.105 and fixes atleast the following security issues: An elevation of privilege vulnerability in the Broadcom wi-fi driver (CVE-2017-0786). Linux kernel built with the Kernel-based Virtual Machine(CONFIG_KVM) support is vulnerable to an incorrect debug exception(#DB) error. It could occur while emulating a syscall instruction. A user/process inside guest could use this flaw to potentially escalate their privileges inside guest. Linux guests are not affected.(CVE-2017-7518). The bio_map_user_iov and bio_unmap_user functions in block/bio.c in the Linux kernel before 4.13.8 do unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition (CVE-2017-12190). The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel before 4.13.11 mishandles node splitting, which allows local users to cause a denial of service (NULL pointer dereference and panic) via a crafted application, as demonstrated by the keyring key type, and key addition and link creation operations (CVE-2017-12193). Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients (CVE-2017-13080). The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel before 4.14 does not check whether the intended netns is used in a peel-off action, which allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls (CVE-2017-15115). Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c (CVE-2017-15265) The KEYS subsystem in the Linux kernel through 4.13.7 mishandles use of add_key for a key that already exists but is uninstantiated, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted system call (CVE-2017-15299). The XFRM dump policy implementation in net/xfrm/xfrm_user.c in the Linux kernel before 4.13.11 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages (CVE-2017-16939). The walk_hugetlb_range function in mm/pagewalk.c in the Linux kernel before 4.14.2 mishandles holes in hugetlb ranges, which allows local users to obtain sensitive information from uninitialized kernel memory via crafted use of the mincore() system call. (CVE-2017-16994).
Keywords: (none) => advisory
An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2017-0463.html
Resolution: (none) => FIXEDStatus: NEW => RESOLVED