Bug 22178 - Update request: kernel-4.4.105
Summary: Update request: kernel-4.4.105
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 5
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA5-32-OK MGA5-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2017-12-12 09:29 CET by Thomas Backlund
Modified: 2017-12-24 15:34 CET (History)
5 users (show)

See Also:
Source RPM: kernel
CVE:
Status comment:


Attachments

Description Thomas Backlund 2017-12-12 09:29:36 CET
New security issues fixed.

Advisory will follow...

SRPMS:
kernel-4.4.105-1.mga5.src.rpm
kernel-userspace-headers-4.4.105-1.mga5.src.rpm

kmod-vboxadditions-5.1.30-2.mga5.src.rpm
kmod-virtualbox-5.1.30-2.mga5.src.rpm
kmod-xtables-addons-2.10-50.mga5.src.rpm


i586:
cpupower-4.4.105-1.mga5.i586.rpm
cpupower-devel-4.4.105-1.mga5.i586.rpm
kernel-desktop-4.4.105-1.mga5-1-1.mga5.i586.rpm
kernel-desktop586-4.4.105-1.mga5-1-1.mga5.i586.rpm
kernel-desktop586-devel-4.4.105-1.mga5-1-1.mga5.i586.rpm
kernel-desktop586-devel-latest-4.4.105-1.mga5.i586.rpm
kernel-desktop586-latest-4.4.105-1.mga5.i586.rpm
kernel-desktop-devel-4.4.105-1.mga5-1-1.mga5.i586.rpm
kernel-desktop-devel-latest-4.4.105-1.mga5.i586.rpm
kernel-desktop-latest-4.4.105-1.mga5.i586.rpm
kernel-doc-4.4.105-1.mga5.noarch.rpm

kernel-server-4.4.105-1.mga5-1-1.mga5.i586.rpm
kernel-server-devel-4.4.105-1.mga5-1-1.mga5.i586.rpm
kernel-server-devel-latest-4.4.105-1.mga5.i586.rpm
kernel-server-latest-4.4.105-1.mga5.i586.rpm
kernel-source-4.4.105-1.mga5-1-1.mga5.noarch.rpm
kernel-source-latest-4.4.105-1.mga5.noarch.rpm
kernel-userspace-headers-4.4.105-1.mga5.i586.rpm
perf-4.4.105-1.mga5.i586.rpm

vboxadditions-kernel-4.4.105-desktop-1.mga5-5.1.30-2.mga5.i586.rpm
vboxadditions-kernel-4.4.105-desktop586-1.mga5-5.1.30-2.mga5.i586.rpm
vboxadditions-kernel-4.4.105-server-1.mga5-5.1.30-2.mga5.i586.rpm
vboxadditions-kernel-desktop586-latest-5.1.30-2.mga5.i586.rpm
vboxadditions-kernel-desktop-latest-5.1.30-2.mga5.i586.rpm
vboxadditions-kernel-server-latest-5.1.30-2.mga5.i586.rpm

virtualbox-kernel-4.4.105-desktop-1.mga5-5.1.30-2.mga5.i586.rpm
virtualbox-kernel-4.4.105-desktop586-1.mga5-5.1.30-2.mga5.i586.rpm
virtualbox-kernel-4.4.105-server-1.mga5-5.1.30-2.mga5.i586.rpm
virtualbox-kernel-desktop586-latest-5.1.30-2.mga5.i586.rpm
virtualbox-kernel-desktop-latest-5.1.30-2.mga5.i586.rpm
virtualbox-kernel-server-latest-5.1.30-2.mga5.i586.rpm

xtables-addons-kernel-4.4.105-desktop-1.mga5-2.10-50.mga5.i586.rpm
xtables-addons-kernel-4.4.105-desktop586-1.mga5-2.10-50.mga5.i586.rpm
xtables-addons-kernel-4.4.105-server-1.mga5-2.10-50.mga5.i586.rpm
xtables-addons-kernel-desktop586-latest-2.10-50.mga5.i586.rpm
xtables-addons-kernel-desktop-latest-2.10-50.mga5.i586.rpm
xtables-addons-kernel-server-latest-2.10-50.mga5.i586.rpm


x86_64:
cpupower-4.4.105-1.mga5.x86_64.rpm
cpupower-devel-4.4.105-1.mga5.x86_64.rpm
kernel-desktop-4.4.105-1.mga5-1-1.mga5.x86_64.rpm
kernel-desktop-devel-4.4.105-1.mga5-1-1.mga5.x86_64.rpm
kernel-desktop-devel-latest-4.4.105-1.mga5.x86_64.rpm
kernel-desktop-latest-4.4.105-1.mga5.x86_64.rpm
kernel-doc-4.4.105-1.mga5.noarch.rpm

kernel-server-4.4.105-1.mga5-1-1.mga5.x86_64.rpm
kernel-server-devel-4.4.105-1.mga5-1-1.mga5.x86_64.rpm
kernel-server-devel-latest-4.4.105-1.mga5.x86_64.rpm
kernel-server-latest-4.4.105-1.mga5.x86_64.rpm
kernel-source-4.4.105-1.mga5-1-1.mga5.noarch.rpm
kernel-source-latest-4.4.105-1.mga5.noarch.rpm
kernel-userspace-headers-4.4.105-1.mga5.x86_64.rpm
perf-4.4.105-1.mga5.x86_64.rpm

vboxadditions-kernel-4.4.105-desktop-1.mga5-5.1.30-2.mga5.x86_64.rpm
vboxadditions-kernel-4.4.105-server-1.mga5-5.1.30-2.mga5.x86_64.rpm
vboxadditions-kernel-desktop-latest-5.1.30-2.mga5.x86_64.rpm
vboxadditions-kernel-server-latest-5.1.30-2.mga5.x86_64.rpm

virtualbox-kernel-4.4.105-desktop-1.mga5-5.1.30-2.mga5.x86_64.rpm
virtualbox-kernel-4.4.105-server-1.mga5-5.1.30-2.mga5.x86_64.rpm
virtualbox-kernel-desktop-latest-5.1.30-2.mga5.x86_64.rpm
virtualbox-kernel-server-latest-5.1.30-2.mga5.x86_64.rpm

xtables-addons-kernel-4.4.105-desktop-1.mga5-2.10-50.mga5.x86_64.rpm
xtables-addons-kernel-4.4.105-server-1.mga5-2.10-50.mga5.x86_64.rpm
xtables-addons-kernel-desktop-latest-2.10-50.mga5.x86_64.rpm
xtables-addons-kernel-server-latest-2.10-50.mga5.x86_64.rpm
Comment 1 James Kerr 2017-12-14 11:14:25 CET
on mga5-64

packages installed cleanly:
- cpupower-4.4.105-1.mga5.x86_64
- kernel-desktop-4.4.105-1.mga5-1-1.mga5.x86_64
- kernel-desktop-latest-4.4.105-1.mga5.x86_64
- virtualbox-kernel-4.4.105-desktop-1.mga5-5.1.30-2.mga5.x86_64
- virtualbox-kernel-desktop-latest-5.1.30-2.mga5.x86_64

uname -r
4.4.105-desktop-1.mga5

vbox and client (mga5-32) running normally

no regressions noted

OK for mga5-64 on this system:

PC-BIOS (legacy) boot
GPT partitions
Dell product: Precision Tower 3620
Mobo: Dell model: 09WH54 
Card: Intel HD Graphics 530
CPU: Quad core Intel Core i7-6700 (-HT-MCP-)

CC: (none) => jim

Comment 2 Herman Viaene 2017-12-14 11:28:03 CET
MGA5-32 on Dell Latitude D600 Xfce
Installed desktop packages, no vbox stuff
After reboot exercized sound files, video, documents, presentation, nfs access, reading newspaper on internet including pictures and video. All looks OK

CC: (none) => herman.viaene
Whiteboard: (none) => MGA5-32-OK

Comment 3 James Kerr 2017-12-14 12:19:31 CET
On mga5-32 in a vbox VM

packages installed cleanly:
- cpupower-4.4.105-1.mga5.i586
- kernel-desktop-4.4.105-1.mga5-1-1.mga5.i586
- kernel-desktop-latest-4.4.105-1.mga5.i586
- kernel-userspace-headers-4.4.105-1.mga5.i586
- vboxadditions-kernel-4.4.105-desktop-1.mga5-5.1.30-2.mga5.i586
- vboxadditions-kernel-desktop-latest-5.1.30-2.mga5.i586

VM rebooted normally
 uname -r
4.4.105-desktop-1.mga5

no regressions noted

OK for maga5-32 in a vbox VM
Comment 4 Thomas Andrews 2017-12-15 23:22:30 CET
MGA5-32 on real hardware, Intel Core 2 Duo, Intel motherboard, 8GB, Intel graphics, wired Internet.

Updated server kernel, rebooted, tried several apps, all looks good.

CC: (none) => andrewsfarm

Comment 5 Thomas Andrews 2017-12-16 00:02:11 CET
MGA5-64 on real hardware, ASRock motherboard, Athlon X2 7750 processor, 8GB, nvidia 9800GT graphics, Atheros wifi.

Updated server kernel, rebooted. Wifi OK, tried several apps, all looks good.
Comment 6 Lewis Smith 2017-12-18 22:19:08 CET
Testing M5/64 real hardware, ATI/Radeon video.

 $ uname -r
 4.4.105-desktop-1.mga5

I have been using this extensively to test at length an update. Plus briefly sound & video. Looks OK. In the light of earlier comments, I am validating this.
@Thomas It still needs its advisory.

Whiteboard: MGA5-32-OK => MGA5-32-OK MGA5-64-OK
Keywords: (none) => advisory
CC: (none) => lewyssmith

Lewis Smith 2017-12-18 22:20:30 CET

Keywords: advisory => validated_update
CC: (none) => sysadmin-bugs

Comment 7 Thomas Backlund 2017-12-21 22:45:11 CET
Advisory added to svn:

  This kernel update is based on upstream 4.4.105 and fixes atleast the
  following security issues:

  An elevation of privilege vulnerability in the Broadcom wi-fi driver
  (CVE-2017-0786).

  Linux kernel built with the Kernel-based Virtual Machine(CONFIG_KVM)
  support is vulnerable to an incorrect debug exception(#DB) error. It
  could occur while emulating a syscall instruction. A user/process
  inside guest could use this flaw to potentially escalate their
  privileges inside guest. Linux guests are not affected.(CVE-2017-7518).

  The bio_map_user_iov and bio_unmap_user functions in block/bio.c in the
  Linux kernel before 4.13.8 do unbalanced refcounting when a SCSI I/O
  vector has small consecutive buffers belonging to the same page. The
  bio_add_pc_page function merges them into one, but the page reference
  is never dropped. This causes a memory leak and possible system lockup
  (exploitable against the host OS by a guest OS user, if a SCSI disk is
  passed through to a virtual machine) due to an out-of-memory condition
  (CVE-2017-12190).

  The assoc_array_insert_into_terminal_node function in lib/assoc_array.c
  in the Linux kernel before 4.13.11 mishandles node splitting, which allows
  local users to cause a denial of service (NULL pointer dereference and
  panic) via a crafted application, as demonstrated by the keyring key type,
  and key addition and link creation operations (CVE-2017-12193).

  Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group
  Temporal Key (GTK) during the group key handshake, allowing an attacker
  within radio range to replay frames from access points to clients
  (CVE-2017-13080).

  The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel
  before 4.14 does not check whether the intended netns is used in a
  peel-off action, which allows local users to cause a denial of
  service (use-after-free and system crash) or possibly have unspecified
  other impact via crafted system calls (CVE-2017-15115).

  Race condition in the ALSA subsystem in the Linux kernel before 4.13.8
  allows local users to cause a denial of service (use-after-free) or
  possibly have unspecified other impact via crafted /dev/snd/seq ioctl
  calls, related to sound/core/seq/seq_clientmgr.c and 
  sound/core/seq/seq_ports.c (CVE-2017-15265)

  The KEYS subsystem in the Linux kernel through 4.13.7 mishandles use of
  add_key for a key that already exists but is uninstantiated, which allows
  local users to cause a denial of service (NULL pointer dereference and
  system crash) or possibly have unspecified other impact via a crafted
  system call (CVE-2017-15299).

  The XFRM dump policy implementation in net/xfrm/xfrm_user.c in the Linux
  kernel before 4.13.11 allows local users to gain privileges or cause a
  denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt
  system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages
  (CVE-2017-16939).

  The walk_hugetlb_range function in mm/pagewalk.c in the Linux kernel
  before 4.14.2 mishandles holes in hugetlb ranges, which allows local
  users to obtain sensitive information from uninitialized kernel memory
  via crafted use of the mincore() system call. (CVE-2017-16994).

Keywords: (none) => advisory

Comment 8 Mageia Robot 2017-12-21 23:15:09 CET
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2017-0463.html

Resolution: (none) => FIXED
Status: NEW => RESOLVED

Comment 9 Mageia Robot 2017-12-22 11:31:57 CET
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2017-0463.html
Comment 10 Mageia Robot 2017-12-24 15:34:57 CET
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2017-0463.html

Note You need to log in before you can comment on or make changes to this bug.