Bug 9953 - Update request: kernel-3.4.45-1.mga2
Summary: Update request: kernel-3.4.45-1.mga2
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 2
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: mga2-64-ok MGA2-32-OK
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2013-05-02 22:59 CEST by Thomas Backlund
Modified: 2013-05-17 22:06 CEST (History)
5 users (show)

See Also:
Source RPM: kernel-3.4.45-1.mga2.src.rpm
CVE:
Status comment:


Attachments

Description Thomas Backlund 2013-05-02 22:59:31 CEST
Fixes:
- fixes several CVEs, advisory will be written in a day or so...


SRPMS:
kernel-3.4.43-1.mga2.src.rpm
kernel-userspace-headers-3.4.43-1.mga2.src.rpm

kmod-vboxadditions-4.1.24-6.mga2.src.rpm
kmod-virtualbox-4.1.24-5.mga2.src.rpm
kmod-xtables-addons-1.41-23.mga2.src.rpm

kmod-broadcom-wl-5.100.82.112-43.mga2.nonfree.src.rpm
kmod-fglrx-8.961-19.mga2.nonfree.src.rpm
kmod-nvidia173-173.14.36-9.mga2.nonfree.src.rpm
kmod-nvidia96xx-96.43.23-10.mga2.nonfree.src.rpm
kmod-nvidia-current-295.71-14.mga2.nonfree.src.rpm


i586:
cpupower-3.4.43-1.mga2.i586.rpm
cpupower-devel-3.4.43-1.mga2.i586.rpm
kernel-desktop-3.4.43-1.mga2-1-1.mga2.i586.rpm
kernel-desktop586-3.4.43-1.mga2-1-1.mga2.i586.rpm
kernel-desktop586-devel-3.4.43-1.mga2-1-1.mga2.i586.rpm
kernel-desktop586-devel-latest-3.4.43-1.mga2.i586.rpm
kernel-desktop586-latest-3.4.43-1.mga2.i586.rpm
kernel-desktop-devel-3.4.43-1.mga2-1-1.mga2.i586.rpm
kernel-desktop-devel-latest-3.4.43-1.mga2.i586.rpm
kernel-desktop-latest-3.4.43-1.mga2.i586.rpm
kernel-doc-3.4.43-1.mga2.noarch.rpm
kernel-server-3.4.43-1.mga2-1-1.mga2.i586.rpm
kernel-server-devel-3.4.43-1.mga2-1-1.mga2.i586.rpm
kernel-server-devel-latest-3.4.43-1.mga2.i586.rpm
kernel-server-latest-3.4.43-1.mga2.i586.rpm
kernel-source-3.4.43-1.mga2-1-1.mga2.noarch.rpm
kernel-source-latest-3.4.43-1.mga2.noarch.rpm
kernel-userspace-headers-3.4.43-1.mga2.i586.rpm
perf-3.4.43-1.mga2.i586.rpm

vboxadditions-kernel-3.4.43-desktop-1.mga2-4.1.24-6.mga2.i586.rpm
vboxadditions-kernel-3.4.43-desktop586-1.mga2-4.1.24-6.mga2.i586.rpm
vboxadditions-kernel-3.4.43-netbook-1.mga2-4.1.24-6.mga2.i586.rpm
vboxadditions-kernel-3.4.43-server-1.mga2-4.1.24-6.mga2.i586.rpm
vboxadditions-kernel-desktop586-latest-4.1.24-6.mga2.i586.rpm
vboxadditions-kernel-desktop-latest-4.1.24-6.mga2.i586.rpm
vboxadditions-kernel-netbook-latest-4.1.24-6.mga2.i586.rpm
vboxadditions-kernel-server-latest-4.1.24-6.mga2.i586.rpm

virtualbox-kernel-3.4.43-desktop-1.mga2-4.1.24-5.mga2.i586.rpm
virtualbox-kernel-3.4.43-desktop586-1.mga2-4.1.24-5.mga2.i586.rpm
virtualbox-kernel-3.4.43-netbook-1.mga2-4.1.24-5.mga2.i586.rpm
virtualbox-kernel-3.4.43-server-1.mga2-4.1.24-5.mga2.i586.rpm
virtualbox-kernel-desktop586-latest-4.1.24-5.mga2.i586.rpm
virtualbox-kernel-desktop-latest-4.1.24-5.mga2.i586.rpm
virtualbox-kernel-netbook-latest-4.1.24-5.mga2.i586.rpm
virtualbox-kernel-server-latest-4.1.24-5.mga2.i586.rpm

xtables-addons-kernel-3.4.43-desktop-1.mga2-1.41-23.mga2.i586.rpm
xtables-addons-kernel-3.4.43-desktop586-1.mga2-1.41-23.mga2.i586.rpm
xtables-addons-kernel-3.4.43-netbook-1.mga2-1.41-23.mga2.i586.rpm
xtables-addons-kernel-3.4.43-server-1.mga2-1.41-23.mga2.i586.rpm
xtables-addons-kernel-desktop586-latest-1.41-23.mga2.i586.rpm
xtables-addons-kernel-desktop-latest-1.41-23.mga2.i586.rpm
xtables-addons-kernel-netbook-latest-1.41-23.mga2.i586.rpm
xtables-addons-kernel-server-latest-1.41-23.mga2.i586.rpm

broadcom-wl-kernel-3.4.43-desktop-1.mga2-5.100.82.112-43.mga2.nonfree.i586.rpm
broadcom-wl-kernel-3.4.43-desktop586-1.mga2-5.100.82.112-43.mga2.nonfree.i586.rpm
broadcom-wl-kernel-3.4.43-netbook-1.mga2-5.100.82.112-43.mga2.nonfree.i586.rpm
broadcom-wl-kernel-3.4.43-server-1.mga2-5.100.82.112-43.mga2.nonfree.i586.rpm
broadcom-wl-kernel-desktop586-latest-5.100.82.112-43.mga2.nonfree.i586.rpm
broadcom-wl-kernel-desktop-latest-5.100.82.112-43.mga2.nonfree.i586.rpm
broadcom-wl-kernel-netbook-latest-5.100.82.112-43.mga2.nonfree.i586.rpm
broadcom-wl-kernel-server-latest-5.100.82.112-43.mga2.nonfree.i586.rpm

fglrx-kernel-3.4.43-desktop-1.mga2-8.961-19.mga2.nonfree.i586.rpm
fglrx-kernel-3.4.43-desktop586-1.mga2-8.961-19.mga2.nonfree.i586.rpm
fglrx-kernel-3.4.43-netbook-1.mga2-8.961-19.mga2.nonfree.i586.rpm
fglrx-kernel-3.4.43-server-1.mga2-8.961-19.mga2.nonfree.i586.rpm
fglrx-kernel-desktop586-latest-8.961-19.mga2.nonfree.i586.rpm
fglrx-kernel-desktop-latest-8.961-19.mga2.nonfree.i586.rpm
fglrx-kernel-netbook-latest-8.961-19.mga2.nonfree.i586.rpm
fglrx-kernel-server-latest-8.961-19.mga2.nonfree.i586.rpm

nvidia173-kernel-3.4.43-desktop-1.mga2-173.14.36-9.mga2.nonfree.i586.rpm
nvidia173-kernel-3.4.43-desktop586-1.mga2-173.14.36-9.mga2.nonfree.i586.rpm
nvidia173-kernel-3.4.43-netbook-1.mga2-173.14.36-9.mga2.nonfree.i586.rpm
nvidia173-kernel-3.4.43-server-1.mga2-173.14.36-9.mga2.nonfree.i586.rpm
nvidia173-kernel-desktop586-latest-173.14.36-9.mga2.nonfree.i586.rpm
nvidia173-kernel-desktop-latest-173.14.36-9.mga2.nonfree.i586.rpm
nvidia173-kernel-netbook-latest-173.14.36-9.mga2.nonfree.i586.rpm
nvidia173-kernel-server-latest-173.14.36-9.mga2.nonfree.i586.rpm

nvidia96xx-kernel-3.4.43-desktop-1.mga2-96.43.23-10.mga2.nonfree.i586.rpm
nvidia96xx-kernel-3.4.43-desktop586-1.mga2-96.43.23-10.mga2.nonfree.i586.rpm
nvidia96xx-kernel-3.4.43-netbook-1.mga2-96.43.23-10.mga2.nonfree.i586.rpm
nvidia96xx-kernel-3.4.43-server-1.mga2-96.43.23-10.mga2.nonfree.i586.rpm
nvidia96xx-kernel-desktop586-latest-96.43.23-10.mga2.nonfree.i586.rpm
nvidia96xx-kernel-desktop-latest-96.43.23-10.mga2.nonfree.i586.rpm
nvidia96xx-kernel-netbook-latest-96.43.23-10.mga2.nonfree.i586.rpm
nvidia96xx-kernel-server-latest-96.43.23-10.mga2.nonfree.i586.rpm

nvidia-current-kernel-3.4.43-desktop-1.mga2-295.71-14.mga2.nonfree.i586.rpm
nvidia-current-kernel-3.4.43-desktop586-1.mga2-295.71-14.mga2.nonfree.i586.rpm
nvidia-current-kernel-3.4.43-netbook-1.mga2-295.71-14.mga2.nonfree.i586.rpm
nvidia-current-kernel-3.4.43-server-1.mga2-295.71-14.mga2.nonfree.i586.rpm
nvidia-current-kernel-desktop586-latest-295.71-14.mga2.nonfree.i586.rpm
nvidia-current-kernel-desktop-latest-295.71-14.mga2.nonfree.i586.rpm
nvidia-current-kernel-netbook-latest-295.71-14.mga2.nonfree.i586.rpm
nvidia-current-kernel-server-latest-295.71-14.mga2.nonfree.i586.rpm


x86_64:
cpupower-3.4.43-1.mga2.x86_64.rpm
cpupower-devel-3.4.43-1.mga2.x86_64.rpm
kernel-desktop-3.4.43-1.mga2-1-1.mga2.x86_64.rpm
kernel-desktop-devel-3.4.43-1.mga2-1-1.mga2.x86_64.rpm
kernel-desktop-devel-latest-3.4.43-1.mga2.x86_64.rpm
kernel-desktop-latest-3.4.43-1.mga2.x86_64.rpm
kernel-doc-3.4.43-1.mga2.noarch.rpm
kernel-netbook-3.4.43-1.mga2-1-1.mga2.x86_64.rpm
kernel-netbook-devel-3.4.43-1.mga2-1-1.mga2.x86_64.rpm
kernel-netbook-devel-latest-3.4.43-1.mga2.x86_64.rpm
kernel-netbook-latest-3.4.43-1.mga2.x86_64.rpm
kernel-server-3.4.43-1.mga2-1-1.mga2.x86_64.rpm
kernel-server-devel-3.4.43-1.mga2-1-1.mga2.x86_64.rpm
kernel-server-devel-latest-3.4.43-1.mga2.x86_64.rpm
kernel-server-latest-3.4.43-1.mga2.x86_64.rpm
kernel-source-3.4.43-1.mga2-1-1.mga2.noarch.rpm
kernel-source-latest-3.4.43-1.mga2.noarch.rpm
kernel-userspace-headers-3.4.43-1.mga2.x86_64.rpm
perf-3.4.43-1.mga2.x86_64.rpm

vboxadditions-kernel-3.4.43-desktop-1.mga2-4.1.24-6.mga2.x86_64.rpm
vboxadditions-kernel-3.4.43-netbook-1.mga2-4.1.24-6.mga2.x86_64.rpm
vboxadditions-kernel-3.4.43-server-1.mga2-4.1.24-6.mga2.x86_64.rpm
vboxadditions-kernel-desktop-latest-4.1.24-6.mga2.x86_64.rpm
vboxadditions-kernel-netbook-latest-4.1.24-6.mga2.x86_64.rpm
vboxadditions-kernel-server-latest-4.1.24-6.mga2.x86_64.rpm

virtualbox-kernel-3.4.43-desktop-1.mga2-4.1.24-5.mga2.x86_64.rpm
virtualbox-kernel-3.4.43-netbook-1.mga2-4.1.24-5.mga2.x86_64.rpm
virtualbox-kernel-3.4.43-server-1.mga2-4.1.24-5.mga2.x86_64.rpm
virtualbox-kernel-desktop-latest-4.1.24-5.mga2.x86_64.rpm
virtualbox-kernel-netbook-latest-4.1.24-5.mga2.x86_64.rpm
virtualbox-kernel-server-latest-4.1.24-5.mga2.x86_64.rpm

xtables-addons-kernel-3.4.43-desktop-1.mga2-1.41-23.mga2.x86_64.rpm
xtables-addons-kernel-3.4.43-netbook-1.mga2-1.41-23.mga2.x86_64.rpm
xtables-addons-kernel-3.4.43-server-1.mga2-1.41-23.mga2.x86_64.rpm
xtables-addons-kernel-desktop-latest-1.41-23.mga2.x86_64.rpm
xtables-addons-kernel-netbook-latest-1.41-23.mga2.x86_64.rpm
xtables-addons-kernel-server-latest-1.41-23.mga2.x86_64.rpm

broadcom-wl-kernel-3.4.43-desktop-1.mga2-5.100.82.112-43.mga2.nonfree.x86_64.rpm
broadcom-wl-kernel-3.4.43-netbook-1.mga2-5.100.82.112-43.mga2.nonfree.x86_64.rpm
broadcom-wl-kernel-3.4.43-server-1.mga2-5.100.82.112-43.mga2.nonfree.x86_64.rpm
broadcom-wl-kernel-desktop-latest-5.100.82.112-43.mga2.nonfree.x86_64.rpm
broadcom-wl-kernel-netbook-latest-5.100.82.112-43.mga2.nonfree.x86_64.rpm
broadcom-wl-kernel-server-latest-5.100.82.112-43.mga2.nonfree.x86_64.rpm

fglrx-kernel-3.4.43-desktop-1.mga2-8.961-19.mga2.nonfree.x86_64.rpm
fglrx-kernel-3.4.43-netbook-1.mga2-8.961-19.mga2.nonfree.x86_64.rpm
fglrx-kernel-3.4.43-server-1.mga2-8.961-19.mga2.nonfree.x86_64.rpm
fglrx-kernel-desktop-latest-8.961-19.mga2.nonfree.x86_64.rpm
fglrx-kernel-netbook-latest-8.961-19.mga2.nonfree.x86_64.rpm
fglrx-kernel-server-latest-8.961-19.mga2.nonfree.x86_64.rpm

nvidia173-kernel-3.4.43-desktop-1.mga2-173.14.36-9.mga2.nonfree.x86_64.rpm
nvidia173-kernel-3.4.43-netbook-1.mga2-173.14.36-9.mga2.nonfree.x86_64.rpm
nvidia173-kernel-3.4.43-server-1.mga2-173.14.36-9.mga2.nonfree.x86_64.rpm
nvidia173-kernel-desktop-latest-173.14.36-9.mga2.nonfree.x86_64.rpm
nvidia173-kernel-netbook-latest-173.14.36-9.mga2.nonfree.x86_64.rpm
nvidia173-kernel-server-latest-173.14.36-9.mga2.nonfree.x86_64.rpm

nvidia96xx-kernel-3.4.43-desktop-1.mga2-96.43.23-10.mga2.nonfree.x86_64.rpm
nvidia96xx-kernel-3.4.43-netbook-1.mga2-96.43.23-10.mga2.nonfree.x86_64.rpm
nvidia96xx-kernel-3.4.43-server-1.mga2-96.43.23-10.mga2.nonfree.x86_64.rpm
nvidia96xx-kernel-desktop-latest-96.43.23-10.mga2.nonfree.x86_64.rpm
nvidia96xx-kernel-netbook-latest-96.43.23-10.mga2.nonfree.x86_64.rpm
nvidia96xx-kernel-server-latest-96.43.23-10.mga2.nonfree.x86_64.rpm

nvidia-current-kernel-3.4.43-desktop-1.mga2-295.71-14.mga2.nonfree.x86_64.rpm
nvidia-current-kernel-3.4.43-netbook-1.mga2-295.71-14.mga2.nonfree.x86_64.rpm
nvidia-current-kernel-3.4.43-server-1.mga2-295.71-14.mga2.nonfree.x86_64.rpm
nvidia-current-kernel-desktop-latest-295.71-14.mga2.nonfree.x86_64.rpm
nvidia-current-kernel-netbook-latest-295.71-14.mga2.nonfree.x86_64.rpm
nvidia-current-kernel-server-latest-295.71-14.mga2.nonfree.x86_64.rpm


Reproducible: 

Steps to Reproduce:
Comment 1 Thomas Backlund 2013-05-07 10:27:11 CEST
Taking it back, 3.4.44 will land tomorrow with more CVEs fixed.

Assignee: qa-bugs => tmb

Comment 2 David Walser 2013-05-09 18:31:43 CEST
3.4.44 is in updates_testing.  I'm running the i586 kernel-server 3.4.44 on a Dell Optiplex 990 and it's working fine.  If there's any specific tests you want done, let me know.

CC: (none) => luigiwalser

Comment 3 Thomas Backlund 2013-05-09 20:24:10 CEST
Advisory:

This updates kernel to upstream stable 3.4.44.

It also fixes the following security issues:

A security flaw was found in the way "/dev/ptmx", a character device used
to create a pseudo-terminal master (PTM) and slave (PTS) pair, of the
Linux kernel, used to transmit data through the PTM when a keystroke was
pressed. An  unprivileged, local user could use this flaw to determine
inter-keystroke timing (measure latency between keystrokes), possibly
allowing them to determine effective length of an password being typed in.
(CVE-2013-0160)

A flaw was found in the way the vhost kernel module handled descriptors
that spanned multiple regions. A privileged guest user in a KVM guest
could use this flaw to crash the host or, potentially, escalate their
privileges on the host. (CVE-2013-0311)

An integer overflow flaw, leading to a heap-based buffer overflow, was
found in the way the Intel i915 driver in the Linux kernel handled the
allocation of the buffer used for relocation copies. A local user with
console access could use this flaw to cause a denial of service or
escalate their privileges. (CVE-2013-0913)

The flush_signal_handlers function in kernel/signal.c in the Linux kernel
before 3.8.4 preserves the value of the sa_restorer field across an exec
operation, which makes it easier for local users to bypass the ASLR
protection mechanism via a crafted application containing a sigaction
system call. (CVE-2013-0914)

A NULL pointer dereference was found in the Linux kernel's USB Inside
Out Edgeport Serial Driver implementation. An attacker with physical
access to a system could use this flaw to cause a denial of service.
(CVE-2013-1774)

A race condition in install_user_keyrings(), leading to a NULL pointer
dereference, was found in the key management facility. A local,
unprivileged user could use this flaw to cause a denial of service.
(CVE-2013-1792)

A flaw was found in the way KVM handled guest time updates when the
buffer the guest registered by writing to the MSR_KVM_SYSTEM_TIME machine
state register (MSR) crossed a page boundary. A privileged guest user
could use this flaw to crash the host or, potentially, escalate their
privileges, allowing them to execute arbitrary code at the host kernel
level. (CVE-2013-1796)

A potential use-after-free flaw was found in the way KVM handled guest
time updates when the GPA (guest physical address) the guest registered
by writing to the MSR_KVM_SYSTEM_TIME machine state register (MSR) fell
into a movable or removable memory region of the hosting user-space
process (by default, QEMU-KVM) on the host. If that memory region is
deregistered from KVM using KVM_SET_USER_MEMORY_REGION and the allocated
virtual memory reused, a privileged guest user could potentially use this
flaw to escalate their privileges on the host. (CVE-2013-1797)

A flaw was found in the way KVM emulated IOAPIC (I/O Advanced
Programmable Interrupt Controller). A missing validation check in the
ioapic_read_indirect() function could allow a privileged guest user to
crash the host, or read a substantial portion of host kernel memory.
(CVE-2013-1798)

fs/ext3/super.c in the Linux kernel before 3.8.4 uses incorrect arguments
to functions in certain circumstances related to printk input, which
allows local users to conduct format-string attacks and possibly gain
privileges via a crafted application. (CVE-2013-1848)

Heap-based buffer overflow in the wdm_in_callback function in 
drivers/usb/class/cdc-wdm.c in the Linux kernel before 3.8.4 allows
physically proximate attackers to cause a denial of service (system crash)
or possibly execute arbitrary code via a crafted cdc-wdm USB device.
(CVE-2013-1860)

The do_video_set_spu_palette function in fs/compat_ioctl.c in the Linux 
kernel before 3.6.5 on unspecified architectures lacks a certain error
check, which might allow local users to obtain sensitive information from
kernel stack memory via a crafted VIDEO_SET_SPU_PALETTE ioctl call on a
/dev/dvb device. (CVE-2013-1928)

Linux kernel built with the Broadcom tg3 ethernet driver is vulnerable
to a buffer overflow. This could occur when the tg3 driver reads and
copies firmware string from hardware's product data(VPD), if it exceeds
32 characters. A user with physical access to a machine could use this
flaw to crash the system or, potentially, escalate their privileges on
the system. (CVE-2013-1929)

The scm_set_cred function in include/net/scm.h in the Linux kernel before
3.8.11 uses incorrect uid and gid values during credentials passing, which
allows local users to gain privileges via a crafted application.
(CVE-2013-1979)

The report API in the crypto user configuration API in the Linux kernel
through 3.8.2 uses an incorrect C library function for copying strings,
which allows local users to obtain sensitive information from kernel
stack memory by leveraging the CAP_NET_ADMIN capability. (CVE-2013-2546)

The crypto_report_one function in crypto/crypto_user.c in the reportAPI
in the crypto user configuration API in the Linux kernel through 3.8.2
does not initialize certain structure members, which allows local users
to obtain sensitive information from kernel heap memory by leveraging
the CAP_NET_ADMIN capability. (CVE-2013-2547)

The crypto_report_one function in crypto/crypto_user.c in the report API
in the crypto user configuration API in the Linux kernel through 3.8.2
uses an incorrect length value during a copy operation, whichallows local
users to obtain sensitive information from kernel memory by leveraging
the CAP_NET_ADMIN capability. (CVE-2013-2548)

net/dcb/dcbnl.c in the Linux kernel before 3.8.4 does not initialize
certain structures, which allows local users to obtain sensitive
information from kernel stack memory via a crafted application.
(CVE-2013-2634)

The rtnl_fill_ifinfo function in net/core/rtnetlink.c in the Linux kernel
before 3.8.4 does not initialize a certain structure member, which allows
local users to obtain sensitive information from kernel stack memory via
a crafted application. (CVE-2013-2635)

net/bridge/br_mdb.c in the Linux kernel before 3.8.4 does not initialize
certain structures, which allows local users to obtain sensitive
information from kernel memory via a crafted application. (CVE-2013-2636)

The crypto API in the Linux kernel through 3.9-rc8 does not initialize
certain length variables, which allows local users to obtain sensitive
information from kernel stack memory via a crafted recvmsg or recvfrom
system call, related to the hash_recvmsg function in crypto/algif_hash.c
and the skcipher_recvmsg function in crypto/algif_skcipher.c.
(CVE-2013-3076)

The vcc_recvmsg function in net/atm/common.c in the Linux kernel before
3.9-rc7 does not initialize a certain length variable, which allows local
users to obtain sensitive information from kernel stack memory via a
crafted recvmsg or recvfrom system call. (CVE-2013-3222)

The ax25_recvmsg function in net/ax25/af_ax25.c in the Linux kernel before
3.9-rc7 does not initialize a certain data structure, which allows local
users to obtain sensitive information from kernel stack memory via a
crafted recvmsg or recvfrom system call. (CVE-2013-3223)

The bt_sock_recvmsg function in net/bluetooth/af_bluetooth.c in the Linux
kernel before 3.9-rc7 does not properly initialize a certain length
variable, which allows local users to obtain sensitive information from
kernel stack memory via a crafted recvmsg or recvfrom system call.
(CVE-2013-3224)

The rfcomm_sock_recvmsg function in net/bluetooth/rfcomm/sock.c in the
Linux kernel before 3.9-rc7 does not initialize a certain length variable,
which allows local users to obtain sensitive information from kernel stack
memory via a crafted recvmsg or recvfrom system call. (CVE-2013-3225)

The caif_seqpkt_recvmsg function in net/caif/caif_socket.c in the Linux
kernel before 3.9-rc7 does not initialize a certain length variable, which
allows local users to obtain sensitive information from kernel stack
memory via a crafted recvmsg or recvfrom system call. (CVE-2013-3227)

The irda_recvmsg_dgram function in net/irda/af_irda.c in the Linux kernel
before 3.9-rc7 does not initialize a certain length variable, which allows
local users to obtain sensitive information from kernel stack memory via
a crafted recvmsg or recvfrom system call. (CVE-2013-3228)

The iucv_sock_recvmsg function in net/iucv/af_iucv.c in the Linux kernel
before 3.9-rc7 does not initialize a certain length variable, which allows
local users to obtain sensitive information from kernel stack memory via
a crafted recvmsg or recvfrom system call. (CVE-2013-3229)

The llc_ui_recvmsg function in net/llc/af_llc.c in the Linux kernel before
3.9-rc7 does not initialize a certain length variable, which allows local
users to obtain sensitive information from kernel stack memory via a
crafted recvmsg or recvfrom system call. (CVE-2013-3231)

The nr_recvmsg function in net/netrom/af_netrom.c in the Linux kernel
before 3.9-rc7 does not initialize a certain data structure, which allows
local users to obtain sensitive information from kernel stack memory via
a crafted recvmsg or recvfrom system call. (CVE-2013-3232)


The llcp_sock_recvmsg function in net/nfc/llcp/sock.c in the Linux kernel
before 3.9-rc7 does not initialize a certain length variable and a certain
data structure, which allows local users to obtain sensitive information
from kernel stack memory via a crafted recvmsg or recvfrom system call. 
(CVE-2013-3233)

The rose_recvmsg function in net/rose/af_rose.c in the Linux kernel before
3.9-rc7 does not initialize a certain data structure, which allows local
users to obtain sensitive information from kernel stack memory via a
crafted recvmsg or recvfrom system call. (CVE-2013-3234)

net/tipc/socket.c in the Linux kernel before 3.9-rc7 does not initialize
a certain data structure and a certain length variable, which allows local
users to obtain sensitive information from kernel stack memory via a
crafted recvmsg or recvfrom system call. (CVE-2013-3235)

Other changes:
Atheros alx gigabit ethernet is to latest upstream to support more hw,
including Atheros Killer e2200 ethernet (mga #9979)

For other changes in the -stable kernels, see the referenced changelogs.


References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0160
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0311
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0913
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0914
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1774
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1792
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1796
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1797
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1798
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1848
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1860
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1928
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1929
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2546
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2547
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2548
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2634
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2635
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2636
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3076
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3222
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3223
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3224
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3225
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3227
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3228
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3229
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3231
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3232
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3233
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3234
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3235
http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.4.35
http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.4.36
http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.4.37
http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.4.38
http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.4.39
http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.4.40
http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.4.41
http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.4.42
http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.4.43
http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.4.44
https://bugs.mageia.org/show_bug.cgi?id=9979
https://bugs.mageia.org/show_bug.cgi?id=9953

Assignee: tmb => qa-bugs
Summary: Update request: kernel-3.4.43-1.mga2 => Update request: kernel-3.4.44-1.mga2
Source RPM: kernel-3.4.43-1.mga2.src.rpm => kernel-3.4.44-1.mga2.src.rpm

Comment 4 Thomas Backlund 2013-05-09 20:30:29 CEST
SRPMS:
kernel-3.4.44-1.mga2.src.rpm
kernel-userspace-headers-3.4.44-1.mga2.src.rpm

kmod-vboxadditions-4.1.24-7.mga2.src.rpm
kmod-virtualbox-4.1.24-7.mga2.src.rpm
kmod-xtables-addons-1.41-24.mga2.src.rpm

kmod-broadcom-wl-5.100.82.112-44.mga2.nonfree.src.rpm
kmod-fglrx-8.961-20.mga2.nonfree.src.rpm
kmod-nvidia173-173.14.36-10.mga2.nonfree.src.rpm
kmod-nvidia96xx-96.43.23-11.mga2.nonfree.src.rpm
kmod-nvidia-current-295.71-15.mga2.nonfree.src.rpm


i586:
cpupower-3.4.44-1.mga2.i586.rpm
cpupower-devel-3.4.44-1.mga2.i586.rpm
kernel-desktop-3.4.44-1.mga2-1-1.mga2.i586.rpm
kernel-desktop586-3.4.44-1.mga2-1-1.mga2.i586.rpm
kernel-desktop586-devel-3.4.44-1.mga2-1-1.mga2.i586.rpm
kernel-desktop586-devel-latest-3.4.44-1.mga2.i586.rpm
kernel-desktop586-latest-3.4.44-1.mga2.i586.rpm
kernel-desktop-devel-3.4.44-1.mga2-1-1.mga2.i586.rpm
kernel-desktop-devel-latest-3.4.44-1.mga2.i586.rpm
kernel-desktop-latest-3.4.44-1.mga2.i586.rpm
kernel-doc-3.4.44-1.mga2.noarch.rpm
kernel-server-3.4.44-1.mga2-1-1.mga2.i586.rpm
kernel-server-devel-3.4.44-1.mga2-1-1.mga2.i586.rpm
kernel-server-devel-latest-3.4.44-1.mga2.i586.rpm
kernel-server-latest-3.4.44-1.mga2.i586.rpm
kernel-source-3.4.44-1.mga2-1-1.mga2.noarch.rpm
kernel-source-latest-3.4.44-1.mga2.noarch.rpm
kernel-userspace-headers-3.4.44-1.mga2.i586.rpm
perf-3.4.44-1.mga2.i586.rpm

vboxadditions-kernel-3.4.44-desktop-1.mga2-4.1.24-7.mga2.i586.rpm
vboxadditions-kernel-3.4.44-desktop586-1.mga2-4.1.24-7.mga2.i586.rpm
vboxadditions-kernel-3.4.44-netbook-1.mga2-4.1.24-7.mga2.i586.rpm
vboxadditions-kernel-3.4.44-server-1.mga2-4.1.24-7.mga2.i586.rpm
vboxadditions-kernel-desktop586-latest-4.1.24-7.mga2.i586.rpm
vboxadditions-kernel-desktop-latest-4.1.24-7.mga2.i586.rpm
vboxadditions-kernel-netbook-latest-4.1.24-7.mga2.i586.rpm
vboxadditions-kernel-server-latest-4.1.24-7.mga2.i586.rpm

virtualbox-kernel-3.4.44-desktop-1.mga2-4.1.24-7.mga2.i586.rpm
virtualbox-kernel-3.4.44-desktop586-1.mga2-4.1.24-7.mga2.i586.rpm
virtualbox-kernel-3.4.44-netbook-1.mga2-4.1.24-7.mga2.i586.rpm
virtualbox-kernel-3.4.44-server-1.mga2-4.1.24-7.mga2.i586.rpm
virtualbox-kernel-desktop586-latest-4.1.24-7.mga2.i586.rpm
virtualbox-kernel-desktop-latest-4.1.24-7.mga2.i586.rpm
virtualbox-kernel-netbook-latest-4.1.24-7.mga2.i586.rpm
virtualbox-kernel-server-latest-4.1.24-7.mga2.i586.rpm

xtables-addons-kernel-3.4.44-desktop-1.mga2-1.41-24.mga2.i586.rpm
xtables-addons-kernel-3.4.44-desktop586-1.mga2-1.41-24.mga2.i586.rpm
xtables-addons-kernel-3.4.44-netbook-1.mga2-1.41-24.mga2.i586.rpm
xtables-addons-kernel-3.4.44-server-1.mga2-1.41-24.mga2.i586.rpm
xtables-addons-kernel-desktop586-latest-1.41-24.mga2.i586.rpm
xtables-addons-kernel-desktop-latest-1.41-24.mga2.i586.rpm
xtables-addons-kernel-netbook-latest-1.41-24.mga2.i586.rpm
xtables-addons-kernel-server-latest-1.41-24.mga2.i586.rpm

broadcom-wl-kernel-3.4.44-desktop-1.mga2-5.100.82.112-44.mga2.nonfree.i586.rpm
broadcom-wl-kernel-3.4.44-desktop586-1.mga2-5.100.82.112-44.mga2.nonfree.i586.rpm
broadcom-wl-kernel-3.4.44-netbook-1.mga2-5.100.82.112-44.mga2.nonfree.i586.rpm
broadcom-wl-kernel-3.4.44-server-1.mga2-5.100.82.112-44.mga2.nonfree.i586.rpm
broadcom-wl-kernel-desktop586-latest-5.100.82.112-44.mga2.nonfree.i586.rpm
broadcom-wl-kernel-desktop-latest-5.100.82.112-44.mga2.nonfree.i586.rpm
broadcom-wl-kernel-netbook-latest-5.100.82.112-44.mga2.nonfree.i586.rpm
broadcom-wl-kernel-server-latest-5.100.82.112-44.mga2.nonfree.i586.rpm

fglrx-kernel-3.4.44-desktop-1.mga2-8.961-20.mga2.nonfree.i586.rpm
fglrx-kernel-3.4.44-desktop586-1.mga2-8.961-20.mga2.nonfree.i586.rpm
fglrx-kernel-3.4.44-netbook-1.mga2-8.961-20.mga2.nonfree.i586.rpm
fglrx-kernel-3.4.44-server-1.mga2-8.961-20.mga2.nonfree.i586.rpm
fglrx-kernel-desktop586-latest-8.961-20.mga2.nonfree.i586.rpm
fglrx-kernel-desktop-latest-8.961-20.mga2.nonfree.i586.rpm
fglrx-kernel-netbook-latest-8.961-20.mga2.nonfree.i586.rpm
fglrx-kernel-server-latest-8.961-20.mga2.nonfree.i586.rpm

nvidia173-kernel-3.4.44-desktop-1.mga2-173.14.36-10.mga2.nonfree.i586.rpm
nvidia173-kernel-3.4.44-desktop586-1.mga2-173.14.36-10.mga2.nonfree.i586.rpm
nvidia173-kernel-3.4.44-netbook-1.mga2-173.14.36-10.mga2.nonfree.i586.rpm
nvidia173-kernel-3.4.44-server-1.mga2-173.14.36-10.mga2.nonfree.i586.rpm
nvidia173-kernel-desktop586-latest-173.14.36-10.mga2.nonfree.i586.rpm
nvidia173-kernel-desktop-latest-173.14.36-10.mga2.nonfree.i586.rpm
nvidia173-kernel-netbook-latest-173.14.36-10.mga2.nonfree.i586.rpm
nvidia173-kernel-server-latest-173.14.36-10.mga2.nonfree.i586.rpm

nvidia96xx-kernel-3.4.44-desktop-1.mga2-96.43.23-11.mga2.nonfree.i586.rpm
nvidia96xx-kernel-3.4.44-desktop586-1.mga2-96.43.23-11.mga2.nonfree.i586.rpm
nvidia96xx-kernel-3.4.44-netbook-1.mga2-96.43.23-11.mga2.nonfree.i586.rpm
nvidia96xx-kernel-3.4.44-server-1.mga2-96.43.23-11.mga2.nonfree.i586.rpm
nvidia96xx-kernel-desktop586-latest-96.43.23-11.mga2.nonfree.i586.rpm
nvidia96xx-kernel-desktop-latest-96.43.23-11.mga2.nonfree.i586.rpm
nvidia96xx-kernel-netbook-latest-96.43.23-11.mga2.nonfree.i586.rpm
nvidia96xx-kernel-server-latest-96.43.23-11.mga2.nonfree.i586.rpm

nvidia-current-kernel-3.4.44-desktop-1.mga2-295.71-15.mga2.nonfree.i586.rpm
nvidia-current-kernel-3.4.44-desktop586-1.mga2-295.71-15.mga2.nonfree.i586.rpm
nvidia-current-kernel-3.4.44-netbook-1.mga2-295.71-15.mga2.nonfree.i586.rpm
nvidia-current-kernel-3.4.44-server-1.mga2-295.71-15.mga2.nonfree.i586.rpm
nvidia-current-kernel-desktop586-latest-295.71-15.mga2.nonfree.i586.rpm
nvidia-current-kernel-desktop-latest-295.71-15.mga2.nonfree.i586.rpm
nvidia-current-kernel-netbook-latest-295.71-15.mga2.nonfree.i586.rpm
nvidia-current-kernel-server-latest-295.71-15.mga2.nonfree.i586.rpm


x86_64:
cpupower-3.4.44-1.mga2.x86_64.rpm
cpupower-devel-3.4.44-1.mga2.x86_64.rpm
kernel-desktop-3.4.44-1.mga2-1-1.mga2.x86_64.rpm
kernel-desktop-devel-3.4.44-1.mga2-1-1.mga2.x86_64.rpm
kernel-desktop-devel-latest-3.4.44-1.mga2.x86_64.rpm
kernel-desktop-latest-3.4.44-1.mga2.x86_64.rpm
kernel-doc-3.4.44-1.mga2.noarch.rpm
kernel-netbook-3.4.44-1.mga2-1-1.mga2.x86_64.rpm
kernel-netbook-devel-3.4.44-1.mga2-1-1.mga2.x86_64.rpm
kernel-netbook-devel-latest-3.4.44-1.mga2.x86_64.rpm
kernel-netbook-latest-3.4.44-1.mga2.x86_64.rpm
kernel-server-3.4.44-1.mga2-1-1.mga2.x86_64.rpm
kernel-server-devel-3.4.44-1.mga2-1-1.mga2.x86_64.rpm
kernel-server-devel-latest-3.4.44-1.mga2.x86_64.rpm
kernel-server-latest-3.4.44-1.mga2.x86_64.rpm
kernel-source-3.4.44-1.mga2-1-1.mga2.noarch.rpm
kernel-source-latest-3.4.44-1.mga2.noarch.rpm
kernel-userspace-headers-3.4.44-1.mga2.x86_64.rpm
perf-3.4.44-1.mga2.x86_64.rpm

vboxadditions-kernel-3.4.44-desktop-1.mga2-4.1.24-7.mga2.x86_64.rpm
vboxadditions-kernel-3.4.44-netbook-1.mga2-4.1.24-7.mga2.x86_64.rpm
vboxadditions-kernel-3.4.44-server-1.mga2-4.1.24-7.mga2.x86_64.rpm
vboxadditions-kernel-desktop-latest-4.1.24-7.mga2.x86_64.rpm
vboxadditions-kernel-netbook-latest-4.1.24-7.mga2.x86_64.rpm
vboxadditions-kernel-server-latest-4.1.24-7.mga2.x86_64.rpm

virtualbox-kernel-3.4.44-desktop-1.mga2-4.1.24-7.mga2.x86_64.rpm
virtualbox-kernel-3.4.44-netbook-1.mga2-4.1.24-7.mga2.x86_64.rpm
virtualbox-kernel-3.4.44-server-1.mga2-4.1.24-7.mga2.x86_64.rpm
virtualbox-kernel-desktop-latest-4.1.24-7.mga2.x86_64.rpm
virtualbox-kernel-netbook-latest-4.1.24-7.mga2.x86_64.rpm
virtualbox-kernel-server-latest-4.1.24-7.mga2.x86_64.rpm

xtables-addons-kernel-3.4.44-desktop-1.mga2-1.41-24.mga2.x86_64.rpm
xtables-addons-kernel-3.4.44-netbook-1.mga2-1.41-24.mga2.x86_64.rpm
xtables-addons-kernel-3.4.44-server-1.mga2-1.41-24.mga2.x86_64.rpm
xtables-addons-kernel-desktop-latest-1.41-24.mga2.x86_64.rpm
xtables-addons-kernel-netbook-latest-1.41-24.mga2.x86_64.rpm
xtables-addons-kernel-server-latest-1.41-24.mga2.x86_64.rpm

broadcom-wl-kernel-3.4.44-desktop-1.mga2-5.100.82.112-44.mga2.nonfree.x86_64.rpm
broadcom-wl-kernel-3.4.44-netbook-1.mga2-5.100.82.112-44.mga2.nonfree.x86_64.rpm
broadcom-wl-kernel-3.4.44-server-1.mga2-5.100.82.112-44.mga2.nonfree.x86_64.rpm
broadcom-wl-kernel-desktop-latest-5.100.82.112-44.mga2.nonfree.x86_64.rpm
broadcom-wl-kernel-netbook-latest-5.100.82.112-44.mga2.nonfree.x86_64.rpm
broadcom-wl-kernel-server-latest-5.100.82.112-44.mga2.nonfree.x86_64.rpm

fglrx-kernel-3.4.44-desktop-1.mga2-8.961-20.mga2.nonfree.x86_64.rpm
fglrx-kernel-3.4.44-netbook-1.mga2-8.961-20.mga2.nonfree.x86_64.rpm
fglrx-kernel-3.4.44-server-1.mga2-8.961-20.mga2.nonfree.x86_64.rpm
fglrx-kernel-desktop-latest-8.961-20.mga2.nonfree.x86_64.rpm
fglrx-kernel-netbook-latest-8.961-20.mga2.nonfree.x86_64.rpm
fglrx-kernel-server-latest-8.961-20.mga2.nonfree.x86_64.rpm

nvidia173-kernel-3.4.44-desktop-1.mga2-173.14.36-10.mga2.nonfree.x86_64.rpm
nvidia173-kernel-3.4.44-netbook-1.mga2-173.14.36-10.mga2.nonfree.x86_64.rpm
nvidia173-kernel-3.4.44-server-1.mga2-173.14.36-10.mga2.nonfree.x86_64.rpm
nvidia173-kernel-desktop-latest-173.14.36-10.mga2.nonfree.x86_64.rpm
nvidia173-kernel-netbook-latest-173.14.36-10.mga2.nonfree.x86_64.rpm
nvidia173-kernel-server-latest-173.14.36-10.mga2.nonfree.x86_64.rpm

nvidia96xx-kernel-3.4.44-desktop-1.mga2-96.43.23-11.mga2.nonfree.x86_64.rpm
nvidia96xx-kernel-3.4.44-netbook-1.mga2-96.43.23-11.mga2.nonfree.x86_64.rpm
nvidia96xx-kernel-3.4.44-server-1.mga2-96.43.23-11.mga2.nonfree.x86_64.rpm
nvidia96xx-kernel-desktop-latest-96.43.23-11.mga2.nonfree.x86_64.rpm
nvidia96xx-kernel-netbook-latest-96.43.23-11.mga2.nonfree.x86_64.rpm
nvidia96xx-kernel-server-latest-96.43.23-11.mga2.nonfree.x86_64.rpm

nvidia-current-kernel-3.4.44-desktop-1.mga2-295.71-15.mga2.nonfree.x86_64.rpm
nvidia-current-kernel-3.4.44-netbook-1.mga2-295.71-15.mga2.nonfree.x86_64.rpm
nvidia-current-kernel-3.4.44-server-1.mga2-295.71-15.mga2.nonfree.x86_64.rpm
nvidia-current-kernel-desktop-latest-295.71-15.mga2.nonfree.x86_64.rpm
nvidia-current-kernel-netbook-latest-295.71-15.mga2.nonfree.x86_64.rpm
nvidia-current-kernel-server-latest-295.71-15.mga2.nonfree.x86_64.rpm
Comment 5 Thomas Backlund 2013-05-10 12:50:58 CEST
and taking it back... 3.4.45 is being "rushed out" tomorrow for another security fix...

Assignee: qa-bugs => tmb

Comment 6 Dave Hodgins 2013-05-11 03:59:28 CEST
Just fyi, during an upgrade test, I got ...
May 10 21:52:30 x3v perl: [RPM] filesystem-2.1.9-20.mga3.x86_64 installed
May 10 21:52:31 x3v kernel: [ 1099.635314] sh[23282]: segfault at 28 ip 00007fdb9691e383 sp 00007fff45ddf4c0 error 4 in ld-2.17.so[7fdb96910000+1f000]
May 10 21:52:35 x3v perl: [RPM] glibc-6:2.17-5.mga3.x86_64 installed

This was during the beginning of the first upgrade transaction, so still
mostly a mageia 2 system.

Other then the syslog message, didn't seem to cause any problems.

CC: (none) => davidwhodgins

Comment 7 Thomas Backlund 2013-05-12 19:53:17 CEST
And 3.4.45 is ready for test:

SRPMS:
kernel-3.4.45-1.mga2.src.rpm
kernel-userspace-headers-3.4.45-1.mga2.src.rpm

kmod-vboxadditions-4.1.24-8.mga2.src.rpm
kmod-virtualbox-4.1.24-8.mga2.src.rpm
kmod-xtables-addons-1.41-25.mga2.src.rpm

kmod-broadcom-wl-5.100.82.112-45.mga2.nonfree.src.rpm
kmod-fglrx-8.961-21.mga2.nonfree.src.rpm
kmod-nvidia173-173.14.36-11.mga2.nonfree.src.rpm
kmod-nvidia96xx-96.43.23-12.mga2.nonfree.src.rpm
kmod-nvidia-current-295.71-16.mga2.nonfree.src.rpm


i586:
cpupower-3.4.45-1.mga2.i586.rpm
cpupower-devel-3.4.45-1.mga2.i586.rpm
kernel-desktop-3.4.45-1.mga2-1-1.mga2.i586.rpm
kernel-desktop586-3.4.45-1.mga2-1-1.mga2.i586.rpm
kernel-desktop586-devel-3.4.45-1.mga2-1-1.mga2.i586.rpm
kernel-desktop586-devel-latest-3.4.45-1.mga2.i586.rpm
kernel-desktop586-latest-3.4.45-1.mga2.i586.rpm
kernel-desktop-devel-3.4.45-1.mga2-1-1.mga2.i586.rpm
kernel-desktop-devel-latest-3.4.45-1.mga2.i586.rpm
kernel-desktop-latest-3.4.45-1.mga2.i586.rpm
kernel-doc-3.4.45-1.mga2.noarch.rpm
kernel-server-3.4.45-1.mga2-1-1.mga2.i586.rpm
kernel-server-devel-3.4.45-1.mga2-1-1.mga2.i586.rpm
kernel-server-devel-latest-3.4.45-1.mga2.i586.rpm
kernel-server-latest-3.4.45-1.mga2.i586.rpm
kernel-source-3.4.45-1.mga2-1-1.mga2.noarch.rpm
kernel-source-latest-3.4.45-1.mga2.noarch.rpm
kernel-userspace-headers-3.4.45-1.mga2.i586.rpm
perf-3.4.45-1.mga2.i586.rpm

vboxadditions-kernel-3.4.45-desktop-1.mga2-4.1.24-8.mga2.i586.rpm
vboxadditions-kernel-3.4.45-desktop586-1.mga2-4.1.24-8.mga2.i586.rpm
vboxadditions-kernel-3.4.45-netbook-1.mga2-4.1.24-8.mga2.i586.rpm
vboxadditions-kernel-3.4.45-server-1.mga2-4.1.24-8.mga2.i586.rpm
vboxadditions-kernel-desktop586-latest-4.1.24-8.mga2.i586.rpm
vboxadditions-kernel-desktop-latest-4.1.24-8.mga2.i586.rpm
vboxadditions-kernel-netbook-latest-4.1.24-8.mga2.i586.rpm
vboxadditions-kernel-server-latest-4.1.24-8.mga2.i586.rpm

virtualbox-kernel-3.4.45-desktop-1.mga2-4.1.24-8.mga2.i586.rpm
virtualbox-kernel-3.4.45-desktop586-1.mga2-4.1.24-8.mga2.i586.rpm
virtualbox-kernel-3.4.45-netbook-1.mga2-4.1.24-8.mga2.i586.rpm
virtualbox-kernel-3.4.45-server-1.mga2-4.1.24-8.mga2.i586.rpm
virtualbox-kernel-desktop586-latest-4.1.24-8.mga2.i586.rpm
virtualbox-kernel-desktop-latest-4.1.24-8.mga2.i586.rpm
virtualbox-kernel-netbook-latest-4.1.24-8.mga2.i586.rpm
virtualbox-kernel-server-latest-4.1.24-8.mga2.i586.rpm

xtables-addons-kernel-3.4.45-desktop-1.mga2-1.41-25.mga2.i586.rpm
xtables-addons-kernel-3.4.45-desktop586-1.mga2-1.41-25.mga2.i586.rpm
xtables-addons-kernel-3.4.45-netbook-1.mga2-1.41-25.mga2.i586.rpm
xtables-addons-kernel-3.4.45-server-1.mga2-1.41-25.mga2.i586.rpm
xtables-addons-kernel-desktop586-latest-1.41-25.mga2.i586.rpm
xtables-addons-kernel-desktop-latest-1.41-25.mga2.i586.rpm
xtables-addons-kernel-netbook-latest-1.41-25.mga2.i586.rpm
xtables-addons-kernel-server-latest-1.41-25.mga2.i586.rpm

broadcom-wl-kernel-3.4.45-desktop-1.mga2-5.100.82.112-45.mga2.nonfree.i586.rpm
broadcom-wl-kernel-3.4.45-desktop586-1.mga2-5.100.82.112-45.mga2.nonfree.i586.rpm
broadcom-wl-kernel-3.4.45-netbook-1.mga2-5.100.82.112-45.mga2.nonfree.i586.rpm
broadcom-wl-kernel-3.4.45-server-1.mga2-5.100.82.112-45.mga2.nonfree.i586.rpm
broadcom-wl-kernel-desktop586-latest-5.100.82.112-45.mga2.nonfree.i586.rpm
broadcom-wl-kernel-desktop-latest-5.100.82.112-45.mga2.nonfree.i586.rpm
broadcom-wl-kernel-netbook-latest-5.100.82.112-45.mga2.nonfree.i586.rpm
broadcom-wl-kernel-server-latest-5.100.82.112-45.mga2.nonfree.i586.rpm

fglrx-kernel-3.4.45-desktop-1.mga2-8.961-21.mga2.nonfree.i586.rpm
fglrx-kernel-3.4.45-desktop586-1.mga2-8.961-21.mga2.nonfree.i586.rpm
fglrx-kernel-3.4.45-netbook-1.mga2-8.961-21.mga2.nonfree.i586.rpm
fglrx-kernel-3.4.45-server-1.mga2-8.961-21.mga2.nonfree.i586.rpm
fglrx-kernel-desktop586-latest-8.961-21.mga2.nonfree.i586.rpm
fglrx-kernel-desktop-latest-8.961-21.mga2.nonfree.i586.rpm
fglrx-kernel-netbook-latest-8.961-21.mga2.nonfree.i586.rpm
fglrx-kernel-server-latest-8.961-21.mga2.nonfree.i586.rpm

nvidia173-kernel-3.4.45-desktop-1.mga2-173.14.36-11.mga2.nonfree.i586.rpm
nvidia173-kernel-3.4.45-desktop586-1.mga2-173.14.36-11.mga2.nonfree.i586.rpm
nvidia173-kernel-3.4.45-netbook-1.mga2-173.14.36-11.mga2.nonfree.i586.rpm
nvidia173-kernel-3.4.45-server-1.mga2-173.14.36-11.mga2.nonfree.i586.rpm
nvidia173-kernel-desktop586-latest-173.14.36-11.mga2.nonfree.i586.rpm
nvidia173-kernel-desktop-latest-173.14.36-11.mga2.nonfree.i586.rpm
nvidia173-kernel-netbook-latest-173.14.36-11.mga2.nonfree.i586.rpm
nvidia173-kernel-server-latest-173.14.36-11.mga2.nonfree.i586.rpm

nvidia96xx-kernel-3.4.45-desktop-1.mga2-96.43.23-12.mga2.nonfree.i586.rpm
nvidia96xx-kernel-3.4.45-desktop586-1.mga2-96.43.23-12.mga2.nonfree.i586.rpm
nvidia96xx-kernel-3.4.45-netbook-1.mga2-96.43.23-12.mga2.nonfree.i586.rpm
nvidia96xx-kernel-3.4.45-server-1.mga2-96.43.23-12.mga2.nonfree.i586.rpm
nvidia96xx-kernel-desktop586-latest-96.43.23-12.mga2.nonfree.i586.rpm
nvidia96xx-kernel-desktop-latest-96.43.23-12.mga2.nonfree.i586.rpm
nvidia96xx-kernel-netbook-latest-96.43.23-12.mga2.nonfree.i586.rpm
nvidia96xx-kernel-server-latest-96.43.23-12.mga2.nonfree.i586.rpm

nvidia-current-kernel-3.4.45-desktop-1.mga2-295.71-16.mga2.nonfree.i586.rpm
nvidia-current-kernel-3.4.45-desktop586-1.mga2-295.71-16.mga2.nonfree.i586.rpm
nvidia-current-kernel-3.4.45-netbook-1.mga2-295.71-16.mga2.nonfree.i586.rpm
nvidia-current-kernel-3.4.45-server-1.mga2-295.71-16.mga2.nonfree.i586.rpm
nvidia-current-kernel-desktop586-latest-295.71-16.mga2.nonfree.i586.rpm
nvidia-current-kernel-desktop-latest-295.71-16.mga2.nonfree.i586.rpm
nvidia-current-kernel-netbook-latest-295.71-16.mga2.nonfree.i586.rpm
nvidia-current-kernel-server-latest-295.71-16.mga2.nonfree.i586.rpm


x86_64:
cpupower-3.4.45-1.mga2.x86_64.rpm
cpupower-devel-3.4.45-1.mga2.x86_64.rpm
kernel-desktop-3.4.45-1.mga2-1-1.mga2.x86_64.rpm
kernel-desktop-devel-3.4.45-1.mga2-1-1.mga2.x86_64.rpm
kernel-desktop-devel-latest-3.4.45-1.mga2.x86_64.rpm
kernel-desktop-latest-3.4.45-1.mga2.x86_64.rpm
kernel-doc-3.4.45-1.mga2.noarch.rpm
kernel-netbook-3.4.45-1.mga2-1-1.mga2.x86_64.rpm
kernel-netbook-devel-3.4.45-1.mga2-1-1.mga2.x86_64.rpm
kernel-netbook-devel-latest-3.4.45-1.mga2.x86_64.rpm
kernel-netbook-latest-3.4.45-1.mga2.x86_64.rpm
kernel-server-3.4.45-1.mga2-1-1.mga2.x86_64.rpm
kernel-server-devel-3.4.45-1.mga2-1-1.mga2.x86_64.rpm
kernel-server-devel-latest-3.4.45-1.mga2.x86_64.rpm
kernel-server-latest-3.4.45-1.mga2.x86_64.rpm
kernel-source-3.4.45-1.mga2-1-1.mga2.noarch.rpm
kernel-source-latest-3.4.45-1.mga2.noarch.rpm
kernel-userspace-headers-3.4.45-1.mga2.x86_64.rpm
perf-3.4.45-1.mga2.x86_64.rpm

vboxadditions-kernel-3.4.45-desktop-1.mga2-4.1.24-8.mga2.x86_64.rpm
vboxadditions-kernel-3.4.45-netbook-1.mga2-4.1.24-8.mga2.x86_64.rpm
vboxadditions-kernel-3.4.45-server-1.mga2-4.1.24-8.mga2.x86_64.rpm
vboxadditions-kernel-desktop-latest-4.1.24-8.mga2.x86_64.rpm
vboxadditions-kernel-netbook-latest-4.1.24-8.mga2.x86_64.rpm
vboxadditions-kernel-server-latest-4.1.24-8.mga2.x86_64.rpm

virtualbox-kernel-3.4.45-desktop-1.mga2-4.1.24-8.mga2.x86_64.rpm
virtualbox-kernel-3.4.45-netbook-1.mga2-4.1.24-8.mga2.x86_64.rpm
virtualbox-kernel-3.4.45-server-1.mga2-4.1.24-8.mga2.x86_64.rpm
virtualbox-kernel-desktop-latest-4.1.24-8.mga2.x86_64.rpm
virtualbox-kernel-netbook-latest-4.1.24-8.mga2.x86_64.rpm
virtualbox-kernel-server-latest-4.1.24-8.mga2.x86_64.rpm

xtables-addons-kernel-3.4.45-desktop-1.mga2-1.41-25.mga2.x86_64.rpm
xtables-addons-kernel-3.4.45-netbook-1.mga2-1.41-25.mga2.x86_64.rpm
xtables-addons-kernel-3.4.45-server-1.mga2-1.41-25.mga2.x86_64.rpm
xtables-addons-kernel-desktop-latest-1.41-25.mga2.x86_64.rpm
xtables-addons-kernel-netbook-latest-1.41-25.mga2.x86_64.rpm
xtables-addons-kernel-server-latest-1.41-25.mga2.x86_64.rpm

broadcom-wl-kernel-3.4.45-desktop-1.mga2-5.100.82.112-45.mga2.nonfree.x86_64.rpm
broadcom-wl-kernel-3.4.45-netbook-1.mga2-5.100.82.112-45.mga2.nonfree.x86_64.rpm
broadcom-wl-kernel-3.4.45-server-1.mga2-5.100.82.112-45.mga2.nonfree.x86_64.rpm
broadcom-wl-kernel-desktop-latest-5.100.82.112-45.mga2.nonfree.x86_64.rpm
broadcom-wl-kernel-netbook-latest-5.100.82.112-45.mga2.nonfree.x86_64.rpm
broadcom-wl-kernel-server-latest-5.100.82.112-45.mga2.nonfree.x86_64.rpm

fglrx-kernel-3.4.45-desktop-1.mga2-8.961-21.mga2.nonfree.x86_64.rpm
fglrx-kernel-3.4.45-netbook-1.mga2-8.961-21.mga2.nonfree.x86_64.rpm
fglrx-kernel-3.4.45-server-1.mga2-8.961-21.mga2.nonfree.x86_64.rpm
fglrx-kernel-desktop-latest-8.961-21.mga2.nonfree.x86_64.rpm
fglrx-kernel-netbook-latest-8.961-21.mga2.nonfree.x86_64.rpm
fglrx-kernel-server-latest-8.961-21.mga2.nonfree.x86_64.rpm

nvidia173-kernel-3.4.45-desktop-1.mga2-173.14.36-11.mga2.nonfree.x86_64.rpm
nvidia173-kernel-3.4.45-netbook-1.mga2-173.14.36-11.mga2.nonfree.x86_64.rpm
nvidia173-kernel-3.4.45-server-1.mga2-173.14.36-11.mga2.nonfree.x86_64.rpm
nvidia173-kernel-desktop-latest-173.14.36-11.mga2.nonfree.x86_64.rpm
nvidia173-kernel-netbook-latest-173.14.36-11.mga2.nonfree.x86_64.rpm
nvidia173-kernel-server-latest-173.14.36-11.mga2.nonfree.x86_64.rpm

nvidia96xx-kernel-3.4.45-desktop-1.mga2-96.43.23-12.mga2.nonfree.x86_64.rpm
nvidia96xx-kernel-3.4.45-netbook-1.mga2-96.43.23-12.mga2.nonfree.x86_64.rpm
nvidia96xx-kernel-3.4.45-server-1.mga2-96.43.23-12.mga2.nonfree.x86_64.rpm
nvidia96xx-kernel-desktop-latest-96.43.23-12.mga2.nonfree.x86_64.rpm
nvidia96xx-kernel-netbook-latest-96.43.23-12.mga2.nonfree.x86_64.rpm
nvidia96xx-kernel-server-latest-96.43.23-12.mga2.nonfree.x86_64.rpm

nvidia-current-kernel-3.4.45-desktop-1.mga2-295.71-16.mga2.nonfree.x86_64.rpm
nvidia-current-kernel-3.4.45-netbook-1.mga2-295.71-16.mga2.nonfree.x86_64.rpm
nvidia-current-kernel-3.4.45-server-1.mga2-295.71-16.mga2.nonfree.x86_64.rpm
nvidia-current-kernel-desktop-latest-295.71-16.mga2.nonfree.x86_64.rpm
nvidia-current-kernel-netbook-latest-295.71-16.mga2.nonfree.x86_64.rpm
nvidia-current-kernel-server-latest-295.71-16.mga2.nonfree.x86_64.rpm

Assignee: tmb => qa-bugs
Summary: Update request: kernel-3.4.44-1.mga2 => Update request: kernel-3.4.45-1.mga2
Source RPM: kernel-3.4.44-1.mga2.src.rpm => kernel-3.4.45-1.mga2.src.rpm

Comment 8 David Walser 2013-05-13 03:27:02 CEST
i586 kernel-desktop 3.4.45 working fine on my computer at home:
Core 2 Duo E8400
Intel P45 chipset
Radeon HD 4650
Comment 9 David Walser 2013-05-13 20:06:36 CEST
i586 kernel-server 3.4.45 working fine on my Dell Optiplex 990 at work.
Core i7-2600
Intel 6 Series/C200 chipset (according to lspcidrake, tmb says Sandy Bridge)
Radeon HD 5450
Comment 10 Thomas Backlund 2013-05-13 20:29:24 CEST
(In reply to David Walser from comment #9)
> i586 kernel-server 3.4.45 working fine on my Dell Optiplex 990 at work.
> Core i7-2600
> Intel 6 Series/C200 chipset (according to lspcidrake, tmb says Sandy Bridge)

Yep, the i7-2600 is Sandy Bridge, and the 6 Series/C200 is called Cougar point...

Hm, I wonder if you have one of the problematic C200 that could explain the oom in the other BR ... I'll review the Cougar Point stuff
Dave Hodgins 2013-05-14 02:17:18 CEST

Depends on: (none) => 10088

Comment 11 Thomas Backlund 2013-05-14 18:15:43 CEST
Addendum to advisory... CVE-2013-2094 also fixed
Dave Hodgins 2013-05-14 21:16:15 CEST

Depends on: 10088 => (none)

Comment 12 David GEIGER 2013-05-15 17:13:14 CEST
Testing complete for kernel-desktop-3.4.45-1.mga2 on Mageia release 2 (Official) for x86_64, for me it's ok, nothing to report, work fine.


Testing complete for kernel-tmb-laptop-3.4.45-1.mga2-1-1.mga2, work fine too.

Laptop Asus K73S, core i3-2350M, 2.3GHz
 
Intel Corporation2nd Generation Core Processor Family Integrated Graphics Controller + nVidia Corporation GeForce 610M (Optimus).

CC: (none) => geiger.david68210

Comment 13 Bill Wilkinson 2013-05-15 18:26:24 CEST
Tested MGA2 x86_64

desktop, netbook and server all build dkms modules for nvidia and virtualbox at install, boot normally.

laptop compaq presario v6000, amd turion x2.

CC: (none) => wrw105
Whiteboard: (none) => mga2-64-ok

Comment 14 David Walser 2013-05-15 18:43:42 CEST
(In reply to Bill Wilkinson from comment #13)
> Tested MGA2 x86_64
> 
> desktop, netbook and server all build dkms modules for nvidia and virtualbox
> at install, boot normally.
> 
> laptop compaq presario v6000, amd turion x2.

I guess ideally you should make sure that the appropriate virtualbox-kernel* and nvidia*-kernel* packages work for you too instead of the dkms ones.
Comment 15 Bill Wilkinson 2013-05-16 02:18:15 CEST
Nvidia current kernel and virtualbox kernel both work normally with x86_64.  Virtual machine boots and accesses network normally.
Comment 16 Dave Hodgins 2013-05-17 03:57:38 CEST
Testing complete on Mageia 2 i586 and x86_64.

Could someone from the sysadmin push the kernel updates
from Mageia 2 Core Updates Testing to Core Updates.

See above for list of srpms and advisory.

Keywords: (none) => validated_update
Whiteboard: mga2-64-ok => mga2-64-ok MGA2-32-OK
CC: (none) => sysadmin-bugs

Comment 17 Thomas Backlund 2013-05-17 22:06:00 CEST
Update pushed:
https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0147

Status: NEW => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.