Fixes: - fixes several CVEs, advisory will be written in a day or so... SRPMS: kernel-3.4.43-1.mga2.src.rpm kernel-userspace-headers-3.4.43-1.mga2.src.rpm kmod-vboxadditions-4.1.24-6.mga2.src.rpm kmod-virtualbox-4.1.24-5.mga2.src.rpm kmod-xtables-addons-1.41-23.mga2.src.rpm kmod-broadcom-wl-5.100.82.112-43.mga2.nonfree.src.rpm kmod-fglrx-8.961-19.mga2.nonfree.src.rpm kmod-nvidia173-173.14.36-9.mga2.nonfree.src.rpm kmod-nvidia96xx-96.43.23-10.mga2.nonfree.src.rpm kmod-nvidia-current-295.71-14.mga2.nonfree.src.rpm i586: cpupower-3.4.43-1.mga2.i586.rpm cpupower-devel-3.4.43-1.mga2.i586.rpm kernel-desktop-3.4.43-1.mga2-1-1.mga2.i586.rpm kernel-desktop586-3.4.43-1.mga2-1-1.mga2.i586.rpm kernel-desktop586-devel-3.4.43-1.mga2-1-1.mga2.i586.rpm kernel-desktop586-devel-latest-3.4.43-1.mga2.i586.rpm kernel-desktop586-latest-3.4.43-1.mga2.i586.rpm kernel-desktop-devel-3.4.43-1.mga2-1-1.mga2.i586.rpm kernel-desktop-devel-latest-3.4.43-1.mga2.i586.rpm kernel-desktop-latest-3.4.43-1.mga2.i586.rpm kernel-doc-3.4.43-1.mga2.noarch.rpm kernel-server-3.4.43-1.mga2-1-1.mga2.i586.rpm kernel-server-devel-3.4.43-1.mga2-1-1.mga2.i586.rpm kernel-server-devel-latest-3.4.43-1.mga2.i586.rpm kernel-server-latest-3.4.43-1.mga2.i586.rpm kernel-source-3.4.43-1.mga2-1-1.mga2.noarch.rpm kernel-source-latest-3.4.43-1.mga2.noarch.rpm kernel-userspace-headers-3.4.43-1.mga2.i586.rpm perf-3.4.43-1.mga2.i586.rpm vboxadditions-kernel-3.4.43-desktop-1.mga2-4.1.24-6.mga2.i586.rpm vboxadditions-kernel-3.4.43-desktop586-1.mga2-4.1.24-6.mga2.i586.rpm vboxadditions-kernel-3.4.43-netbook-1.mga2-4.1.24-6.mga2.i586.rpm vboxadditions-kernel-3.4.43-server-1.mga2-4.1.24-6.mga2.i586.rpm vboxadditions-kernel-desktop586-latest-4.1.24-6.mga2.i586.rpm vboxadditions-kernel-desktop-latest-4.1.24-6.mga2.i586.rpm vboxadditions-kernel-netbook-latest-4.1.24-6.mga2.i586.rpm vboxadditions-kernel-server-latest-4.1.24-6.mga2.i586.rpm virtualbox-kernel-3.4.43-desktop-1.mga2-4.1.24-5.mga2.i586.rpm virtualbox-kernel-3.4.43-desktop586-1.mga2-4.1.24-5.mga2.i586.rpm virtualbox-kernel-3.4.43-netbook-1.mga2-4.1.24-5.mga2.i586.rpm virtualbox-kernel-3.4.43-server-1.mga2-4.1.24-5.mga2.i586.rpm virtualbox-kernel-desktop586-latest-4.1.24-5.mga2.i586.rpm virtualbox-kernel-desktop-latest-4.1.24-5.mga2.i586.rpm virtualbox-kernel-netbook-latest-4.1.24-5.mga2.i586.rpm virtualbox-kernel-server-latest-4.1.24-5.mga2.i586.rpm xtables-addons-kernel-3.4.43-desktop-1.mga2-1.41-23.mga2.i586.rpm xtables-addons-kernel-3.4.43-desktop586-1.mga2-1.41-23.mga2.i586.rpm xtables-addons-kernel-3.4.43-netbook-1.mga2-1.41-23.mga2.i586.rpm xtables-addons-kernel-3.4.43-server-1.mga2-1.41-23.mga2.i586.rpm xtables-addons-kernel-desktop586-latest-1.41-23.mga2.i586.rpm xtables-addons-kernel-desktop-latest-1.41-23.mga2.i586.rpm xtables-addons-kernel-netbook-latest-1.41-23.mga2.i586.rpm xtables-addons-kernel-server-latest-1.41-23.mga2.i586.rpm broadcom-wl-kernel-3.4.43-desktop-1.mga2-5.100.82.112-43.mga2.nonfree.i586.rpm broadcom-wl-kernel-3.4.43-desktop586-1.mga2-5.100.82.112-43.mga2.nonfree.i586.rpm broadcom-wl-kernel-3.4.43-netbook-1.mga2-5.100.82.112-43.mga2.nonfree.i586.rpm broadcom-wl-kernel-3.4.43-server-1.mga2-5.100.82.112-43.mga2.nonfree.i586.rpm broadcom-wl-kernel-desktop586-latest-5.100.82.112-43.mga2.nonfree.i586.rpm broadcom-wl-kernel-desktop-latest-5.100.82.112-43.mga2.nonfree.i586.rpm broadcom-wl-kernel-netbook-latest-5.100.82.112-43.mga2.nonfree.i586.rpm broadcom-wl-kernel-server-latest-5.100.82.112-43.mga2.nonfree.i586.rpm fglrx-kernel-3.4.43-desktop-1.mga2-8.961-19.mga2.nonfree.i586.rpm fglrx-kernel-3.4.43-desktop586-1.mga2-8.961-19.mga2.nonfree.i586.rpm fglrx-kernel-3.4.43-netbook-1.mga2-8.961-19.mga2.nonfree.i586.rpm fglrx-kernel-3.4.43-server-1.mga2-8.961-19.mga2.nonfree.i586.rpm fglrx-kernel-desktop586-latest-8.961-19.mga2.nonfree.i586.rpm fglrx-kernel-desktop-latest-8.961-19.mga2.nonfree.i586.rpm fglrx-kernel-netbook-latest-8.961-19.mga2.nonfree.i586.rpm fglrx-kernel-server-latest-8.961-19.mga2.nonfree.i586.rpm nvidia173-kernel-3.4.43-desktop-1.mga2-173.14.36-9.mga2.nonfree.i586.rpm nvidia173-kernel-3.4.43-desktop586-1.mga2-173.14.36-9.mga2.nonfree.i586.rpm nvidia173-kernel-3.4.43-netbook-1.mga2-173.14.36-9.mga2.nonfree.i586.rpm nvidia173-kernel-3.4.43-server-1.mga2-173.14.36-9.mga2.nonfree.i586.rpm nvidia173-kernel-desktop586-latest-173.14.36-9.mga2.nonfree.i586.rpm nvidia173-kernel-desktop-latest-173.14.36-9.mga2.nonfree.i586.rpm nvidia173-kernel-netbook-latest-173.14.36-9.mga2.nonfree.i586.rpm nvidia173-kernel-server-latest-173.14.36-9.mga2.nonfree.i586.rpm nvidia96xx-kernel-3.4.43-desktop-1.mga2-96.43.23-10.mga2.nonfree.i586.rpm nvidia96xx-kernel-3.4.43-desktop586-1.mga2-96.43.23-10.mga2.nonfree.i586.rpm nvidia96xx-kernel-3.4.43-netbook-1.mga2-96.43.23-10.mga2.nonfree.i586.rpm nvidia96xx-kernel-3.4.43-server-1.mga2-96.43.23-10.mga2.nonfree.i586.rpm nvidia96xx-kernel-desktop586-latest-96.43.23-10.mga2.nonfree.i586.rpm nvidia96xx-kernel-desktop-latest-96.43.23-10.mga2.nonfree.i586.rpm nvidia96xx-kernel-netbook-latest-96.43.23-10.mga2.nonfree.i586.rpm nvidia96xx-kernel-server-latest-96.43.23-10.mga2.nonfree.i586.rpm nvidia-current-kernel-3.4.43-desktop-1.mga2-295.71-14.mga2.nonfree.i586.rpm nvidia-current-kernel-3.4.43-desktop586-1.mga2-295.71-14.mga2.nonfree.i586.rpm nvidia-current-kernel-3.4.43-netbook-1.mga2-295.71-14.mga2.nonfree.i586.rpm nvidia-current-kernel-3.4.43-server-1.mga2-295.71-14.mga2.nonfree.i586.rpm nvidia-current-kernel-desktop586-latest-295.71-14.mga2.nonfree.i586.rpm nvidia-current-kernel-desktop-latest-295.71-14.mga2.nonfree.i586.rpm nvidia-current-kernel-netbook-latest-295.71-14.mga2.nonfree.i586.rpm nvidia-current-kernel-server-latest-295.71-14.mga2.nonfree.i586.rpm x86_64: cpupower-3.4.43-1.mga2.x86_64.rpm cpupower-devel-3.4.43-1.mga2.x86_64.rpm kernel-desktop-3.4.43-1.mga2-1-1.mga2.x86_64.rpm kernel-desktop-devel-3.4.43-1.mga2-1-1.mga2.x86_64.rpm kernel-desktop-devel-latest-3.4.43-1.mga2.x86_64.rpm kernel-desktop-latest-3.4.43-1.mga2.x86_64.rpm kernel-doc-3.4.43-1.mga2.noarch.rpm kernel-netbook-3.4.43-1.mga2-1-1.mga2.x86_64.rpm kernel-netbook-devel-3.4.43-1.mga2-1-1.mga2.x86_64.rpm kernel-netbook-devel-latest-3.4.43-1.mga2.x86_64.rpm kernel-netbook-latest-3.4.43-1.mga2.x86_64.rpm kernel-server-3.4.43-1.mga2-1-1.mga2.x86_64.rpm kernel-server-devel-3.4.43-1.mga2-1-1.mga2.x86_64.rpm kernel-server-devel-latest-3.4.43-1.mga2.x86_64.rpm kernel-server-latest-3.4.43-1.mga2.x86_64.rpm kernel-source-3.4.43-1.mga2-1-1.mga2.noarch.rpm kernel-source-latest-3.4.43-1.mga2.noarch.rpm kernel-userspace-headers-3.4.43-1.mga2.x86_64.rpm perf-3.4.43-1.mga2.x86_64.rpm vboxadditions-kernel-3.4.43-desktop-1.mga2-4.1.24-6.mga2.x86_64.rpm vboxadditions-kernel-3.4.43-netbook-1.mga2-4.1.24-6.mga2.x86_64.rpm vboxadditions-kernel-3.4.43-server-1.mga2-4.1.24-6.mga2.x86_64.rpm vboxadditions-kernel-desktop-latest-4.1.24-6.mga2.x86_64.rpm vboxadditions-kernel-netbook-latest-4.1.24-6.mga2.x86_64.rpm vboxadditions-kernel-server-latest-4.1.24-6.mga2.x86_64.rpm virtualbox-kernel-3.4.43-desktop-1.mga2-4.1.24-5.mga2.x86_64.rpm virtualbox-kernel-3.4.43-netbook-1.mga2-4.1.24-5.mga2.x86_64.rpm virtualbox-kernel-3.4.43-server-1.mga2-4.1.24-5.mga2.x86_64.rpm virtualbox-kernel-desktop-latest-4.1.24-5.mga2.x86_64.rpm virtualbox-kernel-netbook-latest-4.1.24-5.mga2.x86_64.rpm virtualbox-kernel-server-latest-4.1.24-5.mga2.x86_64.rpm xtables-addons-kernel-3.4.43-desktop-1.mga2-1.41-23.mga2.x86_64.rpm xtables-addons-kernel-3.4.43-netbook-1.mga2-1.41-23.mga2.x86_64.rpm xtables-addons-kernel-3.4.43-server-1.mga2-1.41-23.mga2.x86_64.rpm xtables-addons-kernel-desktop-latest-1.41-23.mga2.x86_64.rpm xtables-addons-kernel-netbook-latest-1.41-23.mga2.x86_64.rpm xtables-addons-kernel-server-latest-1.41-23.mga2.x86_64.rpm broadcom-wl-kernel-3.4.43-desktop-1.mga2-5.100.82.112-43.mga2.nonfree.x86_64.rpm broadcom-wl-kernel-3.4.43-netbook-1.mga2-5.100.82.112-43.mga2.nonfree.x86_64.rpm broadcom-wl-kernel-3.4.43-server-1.mga2-5.100.82.112-43.mga2.nonfree.x86_64.rpm broadcom-wl-kernel-desktop-latest-5.100.82.112-43.mga2.nonfree.x86_64.rpm broadcom-wl-kernel-netbook-latest-5.100.82.112-43.mga2.nonfree.x86_64.rpm broadcom-wl-kernel-server-latest-5.100.82.112-43.mga2.nonfree.x86_64.rpm fglrx-kernel-3.4.43-desktop-1.mga2-8.961-19.mga2.nonfree.x86_64.rpm fglrx-kernel-3.4.43-netbook-1.mga2-8.961-19.mga2.nonfree.x86_64.rpm fglrx-kernel-3.4.43-server-1.mga2-8.961-19.mga2.nonfree.x86_64.rpm fglrx-kernel-desktop-latest-8.961-19.mga2.nonfree.x86_64.rpm fglrx-kernel-netbook-latest-8.961-19.mga2.nonfree.x86_64.rpm fglrx-kernel-server-latest-8.961-19.mga2.nonfree.x86_64.rpm nvidia173-kernel-3.4.43-desktop-1.mga2-173.14.36-9.mga2.nonfree.x86_64.rpm nvidia173-kernel-3.4.43-netbook-1.mga2-173.14.36-9.mga2.nonfree.x86_64.rpm nvidia173-kernel-3.4.43-server-1.mga2-173.14.36-9.mga2.nonfree.x86_64.rpm nvidia173-kernel-desktop-latest-173.14.36-9.mga2.nonfree.x86_64.rpm nvidia173-kernel-netbook-latest-173.14.36-9.mga2.nonfree.x86_64.rpm nvidia173-kernel-server-latest-173.14.36-9.mga2.nonfree.x86_64.rpm nvidia96xx-kernel-3.4.43-desktop-1.mga2-96.43.23-10.mga2.nonfree.x86_64.rpm nvidia96xx-kernel-3.4.43-netbook-1.mga2-96.43.23-10.mga2.nonfree.x86_64.rpm nvidia96xx-kernel-3.4.43-server-1.mga2-96.43.23-10.mga2.nonfree.x86_64.rpm nvidia96xx-kernel-desktop-latest-96.43.23-10.mga2.nonfree.x86_64.rpm nvidia96xx-kernel-netbook-latest-96.43.23-10.mga2.nonfree.x86_64.rpm nvidia96xx-kernel-server-latest-96.43.23-10.mga2.nonfree.x86_64.rpm nvidia-current-kernel-3.4.43-desktop-1.mga2-295.71-14.mga2.nonfree.x86_64.rpm nvidia-current-kernel-3.4.43-netbook-1.mga2-295.71-14.mga2.nonfree.x86_64.rpm nvidia-current-kernel-3.4.43-server-1.mga2-295.71-14.mga2.nonfree.x86_64.rpm nvidia-current-kernel-desktop-latest-295.71-14.mga2.nonfree.x86_64.rpm nvidia-current-kernel-netbook-latest-295.71-14.mga2.nonfree.x86_64.rpm nvidia-current-kernel-server-latest-295.71-14.mga2.nonfree.x86_64.rpm Reproducible: Steps to Reproduce:
Taking it back, 3.4.44 will land tomorrow with more CVEs fixed.
Assignee: qa-bugs => tmb
3.4.44 is in updates_testing. I'm running the i586 kernel-server 3.4.44 on a Dell Optiplex 990 and it's working fine. If there's any specific tests you want done, let me know.
CC: (none) => luigiwalser
Advisory: This updates kernel to upstream stable 3.4.44. It also fixes the following security issues: A security flaw was found in the way "/dev/ptmx", a character device used to create a pseudo-terminal master (PTM) and slave (PTS) pair, of the Linux kernel, used to transmit data through the PTM when a keystroke was pressed. An unprivileged, local user could use this flaw to determine inter-keystroke timing (measure latency between keystrokes), possibly allowing them to determine effective length of an password being typed in. (CVE-2013-0160) A flaw was found in the way the vhost kernel module handled descriptors that spanned multiple regions. A privileged guest user in a KVM guest could use this flaw to crash the host or, potentially, escalate their privileges on the host. (CVE-2013-0311) An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way the Intel i915 driver in the Linux kernel handled the allocation of the buffer used for relocation copies. A local user with console access could use this flaw to cause a denial of service or escalate their privileges. (CVE-2013-0913) The flush_signal_handlers function in kernel/signal.c in the Linux kernel before 3.8.4 preserves the value of the sa_restorer field across an exec operation, which makes it easier for local users to bypass the ASLR protection mechanism via a crafted application containing a sigaction system call. (CVE-2013-0914) A NULL pointer dereference was found in the Linux kernel's USB Inside Out Edgeport Serial Driver implementation. An attacker with physical access to a system could use this flaw to cause a denial of service. (CVE-2013-1774) A race condition in install_user_keyrings(), leading to a NULL pointer dereference, was found in the key management facility. A local, unprivileged user could use this flaw to cause a denial of service. (CVE-2013-1792) A flaw was found in the way KVM handled guest time updates when the buffer the guest registered by writing to the MSR_KVM_SYSTEM_TIME machine state register (MSR) crossed a page boundary. A privileged guest user could use this flaw to crash the host or, potentially, escalate their privileges, allowing them to execute arbitrary code at the host kernel level. (CVE-2013-1796) A potential use-after-free flaw was found in the way KVM handled guest time updates when the GPA (guest physical address) the guest registered by writing to the MSR_KVM_SYSTEM_TIME machine state register (MSR) fell into a movable or removable memory region of the hosting user-space process (by default, QEMU-KVM) on the host. If that memory region is deregistered from KVM using KVM_SET_USER_MEMORY_REGION and the allocated virtual memory reused, a privileged guest user could potentially use this flaw to escalate their privileges on the host. (CVE-2013-1797) A flaw was found in the way KVM emulated IOAPIC (I/O Advanced Programmable Interrupt Controller). A missing validation check in the ioapic_read_indirect() function could allow a privileged guest user to crash the host, or read a substantial portion of host kernel memory. (CVE-2013-1798) fs/ext3/super.c in the Linux kernel before 3.8.4 uses incorrect arguments to functions in certain circumstances related to printk input, which allows local users to conduct format-string attacks and possibly gain privileges via a crafted application. (CVE-2013-1848) Heap-based buffer overflow in the wdm_in_callback function in drivers/usb/class/cdc-wdm.c in the Linux kernel before 3.8.4 allows physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted cdc-wdm USB device. (CVE-2013-1860) The do_video_set_spu_palette function in fs/compat_ioctl.c in the Linux kernel before 3.6.5 on unspecified architectures lacks a certain error check, which might allow local users to obtain sensitive information from kernel stack memory via a crafted VIDEO_SET_SPU_PALETTE ioctl call on a /dev/dvb device. (CVE-2013-1928) Linux kernel built with the Broadcom tg3 ethernet driver is vulnerable to a buffer overflow. This could occur when the tg3 driver reads and copies firmware string from hardware's product data(VPD), if it exceeds 32 characters. A user with physical access to a machine could use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2013-1929) The scm_set_cred function in include/net/scm.h in the Linux kernel before 3.8.11 uses incorrect uid and gid values during credentials passing, which allows local users to gain privileges via a crafted application. (CVE-2013-1979) The report API in the crypto user configuration API in the Linux kernel through 3.8.2 uses an incorrect C library function for copying strings, which allows local users to obtain sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability. (CVE-2013-2546) The crypto_report_one function in crypto/crypto_user.c in the reportAPI in the crypto user configuration API in the Linux kernel through 3.8.2 does not initialize certain structure members, which allows local users to obtain sensitive information from kernel heap memory by leveraging the CAP_NET_ADMIN capability. (CVE-2013-2547) The crypto_report_one function in crypto/crypto_user.c in the report API in the crypto user configuration API in the Linux kernel through 3.8.2 uses an incorrect length value during a copy operation, whichallows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability. (CVE-2013-2548) net/dcb/dcbnl.c in the Linux kernel before 3.8.4 does not initialize certain structures, which allows local users to obtain sensitive information from kernel stack memory via a crafted application. (CVE-2013-2634) The rtnl_fill_ifinfo function in net/core/rtnetlink.c in the Linux kernel before 3.8.4 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel stack memory via a crafted application. (CVE-2013-2635) net/bridge/br_mdb.c in the Linux kernel before 3.8.4 does not initialize certain structures, which allows local users to obtain sensitive information from kernel memory via a crafted application. (CVE-2013-2636) The crypto API in the Linux kernel through 3.9-rc8 does not initialize certain length variables, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call, related to the hash_recvmsg function in crypto/algif_hash.c and the skcipher_recvmsg function in crypto/algif_skcipher.c. (CVE-2013-3076) The vcc_recvmsg function in net/atm/common.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call. (CVE-2013-3222) The ax25_recvmsg function in net/ax25/af_ax25.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call. (CVE-2013-3223) The bt_sock_recvmsg function in net/bluetooth/af_bluetooth.c in the Linux kernel before 3.9-rc7 does not properly initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call. (CVE-2013-3224) The rfcomm_sock_recvmsg function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call. (CVE-2013-3225) The caif_seqpkt_recvmsg function in net/caif/caif_socket.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call. (CVE-2013-3227) The irda_recvmsg_dgram function in net/irda/af_irda.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call. (CVE-2013-3228) The iucv_sock_recvmsg function in net/iucv/af_iucv.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call. (CVE-2013-3229) The llc_ui_recvmsg function in net/llc/af_llc.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call. (CVE-2013-3231) The nr_recvmsg function in net/netrom/af_netrom.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call. (CVE-2013-3232) The llcp_sock_recvmsg function in net/nfc/llcp/sock.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable and a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call. (CVE-2013-3233) The rose_recvmsg function in net/rose/af_rose.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call. (CVE-2013-3234) net/tipc/socket.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure and a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call. (CVE-2013-3235) Other changes: Atheros alx gigabit ethernet is to latest upstream to support more hw, including Atheros Killer e2200 ethernet (mga #9979) For other changes in the -stable kernels, see the referenced changelogs. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0160 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0311 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0913 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0914 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1774 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1792 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1796 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1797 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1798 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1848 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1860 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1928 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1929 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2546 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2547 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2548 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2634 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2635 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2636 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3076 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3222 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3223 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3224 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3225 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3227 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3228 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3229 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3231 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3232 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3233 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3234 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3235 http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.4.35 http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.4.36 http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.4.37 http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.4.38 http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.4.39 http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.4.40 http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.4.41 http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.4.42 http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.4.43 http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.4.44 https://bugs.mageia.org/show_bug.cgi?id=9979 https://bugs.mageia.org/show_bug.cgi?id=9953
Assignee: tmb => qa-bugsSummary: Update request: kernel-3.4.43-1.mga2 => Update request: kernel-3.4.44-1.mga2Source RPM: kernel-3.4.43-1.mga2.src.rpm => kernel-3.4.44-1.mga2.src.rpm
SRPMS: kernel-3.4.44-1.mga2.src.rpm kernel-userspace-headers-3.4.44-1.mga2.src.rpm kmod-vboxadditions-4.1.24-7.mga2.src.rpm kmod-virtualbox-4.1.24-7.mga2.src.rpm kmod-xtables-addons-1.41-24.mga2.src.rpm kmod-broadcom-wl-5.100.82.112-44.mga2.nonfree.src.rpm kmod-fglrx-8.961-20.mga2.nonfree.src.rpm kmod-nvidia173-173.14.36-10.mga2.nonfree.src.rpm kmod-nvidia96xx-96.43.23-11.mga2.nonfree.src.rpm kmod-nvidia-current-295.71-15.mga2.nonfree.src.rpm i586: cpupower-3.4.44-1.mga2.i586.rpm cpupower-devel-3.4.44-1.mga2.i586.rpm kernel-desktop-3.4.44-1.mga2-1-1.mga2.i586.rpm kernel-desktop586-3.4.44-1.mga2-1-1.mga2.i586.rpm kernel-desktop586-devel-3.4.44-1.mga2-1-1.mga2.i586.rpm kernel-desktop586-devel-latest-3.4.44-1.mga2.i586.rpm kernel-desktop586-latest-3.4.44-1.mga2.i586.rpm kernel-desktop-devel-3.4.44-1.mga2-1-1.mga2.i586.rpm kernel-desktop-devel-latest-3.4.44-1.mga2.i586.rpm kernel-desktop-latest-3.4.44-1.mga2.i586.rpm kernel-doc-3.4.44-1.mga2.noarch.rpm kernel-server-3.4.44-1.mga2-1-1.mga2.i586.rpm kernel-server-devel-3.4.44-1.mga2-1-1.mga2.i586.rpm kernel-server-devel-latest-3.4.44-1.mga2.i586.rpm kernel-server-latest-3.4.44-1.mga2.i586.rpm kernel-source-3.4.44-1.mga2-1-1.mga2.noarch.rpm kernel-source-latest-3.4.44-1.mga2.noarch.rpm kernel-userspace-headers-3.4.44-1.mga2.i586.rpm perf-3.4.44-1.mga2.i586.rpm vboxadditions-kernel-3.4.44-desktop-1.mga2-4.1.24-7.mga2.i586.rpm vboxadditions-kernel-3.4.44-desktop586-1.mga2-4.1.24-7.mga2.i586.rpm vboxadditions-kernel-3.4.44-netbook-1.mga2-4.1.24-7.mga2.i586.rpm vboxadditions-kernel-3.4.44-server-1.mga2-4.1.24-7.mga2.i586.rpm vboxadditions-kernel-desktop586-latest-4.1.24-7.mga2.i586.rpm vboxadditions-kernel-desktop-latest-4.1.24-7.mga2.i586.rpm vboxadditions-kernel-netbook-latest-4.1.24-7.mga2.i586.rpm vboxadditions-kernel-server-latest-4.1.24-7.mga2.i586.rpm virtualbox-kernel-3.4.44-desktop-1.mga2-4.1.24-7.mga2.i586.rpm virtualbox-kernel-3.4.44-desktop586-1.mga2-4.1.24-7.mga2.i586.rpm virtualbox-kernel-3.4.44-netbook-1.mga2-4.1.24-7.mga2.i586.rpm virtualbox-kernel-3.4.44-server-1.mga2-4.1.24-7.mga2.i586.rpm virtualbox-kernel-desktop586-latest-4.1.24-7.mga2.i586.rpm virtualbox-kernel-desktop-latest-4.1.24-7.mga2.i586.rpm virtualbox-kernel-netbook-latest-4.1.24-7.mga2.i586.rpm virtualbox-kernel-server-latest-4.1.24-7.mga2.i586.rpm xtables-addons-kernel-3.4.44-desktop-1.mga2-1.41-24.mga2.i586.rpm xtables-addons-kernel-3.4.44-desktop586-1.mga2-1.41-24.mga2.i586.rpm xtables-addons-kernel-3.4.44-netbook-1.mga2-1.41-24.mga2.i586.rpm xtables-addons-kernel-3.4.44-server-1.mga2-1.41-24.mga2.i586.rpm xtables-addons-kernel-desktop586-latest-1.41-24.mga2.i586.rpm xtables-addons-kernel-desktop-latest-1.41-24.mga2.i586.rpm xtables-addons-kernel-netbook-latest-1.41-24.mga2.i586.rpm xtables-addons-kernel-server-latest-1.41-24.mga2.i586.rpm broadcom-wl-kernel-3.4.44-desktop-1.mga2-5.100.82.112-44.mga2.nonfree.i586.rpm broadcom-wl-kernel-3.4.44-desktop586-1.mga2-5.100.82.112-44.mga2.nonfree.i586.rpm broadcom-wl-kernel-3.4.44-netbook-1.mga2-5.100.82.112-44.mga2.nonfree.i586.rpm broadcom-wl-kernel-3.4.44-server-1.mga2-5.100.82.112-44.mga2.nonfree.i586.rpm broadcom-wl-kernel-desktop586-latest-5.100.82.112-44.mga2.nonfree.i586.rpm broadcom-wl-kernel-desktop-latest-5.100.82.112-44.mga2.nonfree.i586.rpm broadcom-wl-kernel-netbook-latest-5.100.82.112-44.mga2.nonfree.i586.rpm broadcom-wl-kernel-server-latest-5.100.82.112-44.mga2.nonfree.i586.rpm fglrx-kernel-3.4.44-desktop-1.mga2-8.961-20.mga2.nonfree.i586.rpm fglrx-kernel-3.4.44-desktop586-1.mga2-8.961-20.mga2.nonfree.i586.rpm fglrx-kernel-3.4.44-netbook-1.mga2-8.961-20.mga2.nonfree.i586.rpm fglrx-kernel-3.4.44-server-1.mga2-8.961-20.mga2.nonfree.i586.rpm fglrx-kernel-desktop586-latest-8.961-20.mga2.nonfree.i586.rpm fglrx-kernel-desktop-latest-8.961-20.mga2.nonfree.i586.rpm fglrx-kernel-netbook-latest-8.961-20.mga2.nonfree.i586.rpm fglrx-kernel-server-latest-8.961-20.mga2.nonfree.i586.rpm nvidia173-kernel-3.4.44-desktop-1.mga2-173.14.36-10.mga2.nonfree.i586.rpm nvidia173-kernel-3.4.44-desktop586-1.mga2-173.14.36-10.mga2.nonfree.i586.rpm nvidia173-kernel-3.4.44-netbook-1.mga2-173.14.36-10.mga2.nonfree.i586.rpm nvidia173-kernel-3.4.44-server-1.mga2-173.14.36-10.mga2.nonfree.i586.rpm nvidia173-kernel-desktop586-latest-173.14.36-10.mga2.nonfree.i586.rpm nvidia173-kernel-desktop-latest-173.14.36-10.mga2.nonfree.i586.rpm nvidia173-kernel-netbook-latest-173.14.36-10.mga2.nonfree.i586.rpm nvidia173-kernel-server-latest-173.14.36-10.mga2.nonfree.i586.rpm nvidia96xx-kernel-3.4.44-desktop-1.mga2-96.43.23-11.mga2.nonfree.i586.rpm nvidia96xx-kernel-3.4.44-desktop586-1.mga2-96.43.23-11.mga2.nonfree.i586.rpm nvidia96xx-kernel-3.4.44-netbook-1.mga2-96.43.23-11.mga2.nonfree.i586.rpm nvidia96xx-kernel-3.4.44-server-1.mga2-96.43.23-11.mga2.nonfree.i586.rpm nvidia96xx-kernel-desktop586-latest-96.43.23-11.mga2.nonfree.i586.rpm nvidia96xx-kernel-desktop-latest-96.43.23-11.mga2.nonfree.i586.rpm nvidia96xx-kernel-netbook-latest-96.43.23-11.mga2.nonfree.i586.rpm nvidia96xx-kernel-server-latest-96.43.23-11.mga2.nonfree.i586.rpm nvidia-current-kernel-3.4.44-desktop-1.mga2-295.71-15.mga2.nonfree.i586.rpm nvidia-current-kernel-3.4.44-desktop586-1.mga2-295.71-15.mga2.nonfree.i586.rpm nvidia-current-kernel-3.4.44-netbook-1.mga2-295.71-15.mga2.nonfree.i586.rpm nvidia-current-kernel-3.4.44-server-1.mga2-295.71-15.mga2.nonfree.i586.rpm nvidia-current-kernel-desktop586-latest-295.71-15.mga2.nonfree.i586.rpm nvidia-current-kernel-desktop-latest-295.71-15.mga2.nonfree.i586.rpm nvidia-current-kernel-netbook-latest-295.71-15.mga2.nonfree.i586.rpm nvidia-current-kernel-server-latest-295.71-15.mga2.nonfree.i586.rpm x86_64: cpupower-3.4.44-1.mga2.x86_64.rpm cpupower-devel-3.4.44-1.mga2.x86_64.rpm kernel-desktop-3.4.44-1.mga2-1-1.mga2.x86_64.rpm kernel-desktop-devel-3.4.44-1.mga2-1-1.mga2.x86_64.rpm kernel-desktop-devel-latest-3.4.44-1.mga2.x86_64.rpm kernel-desktop-latest-3.4.44-1.mga2.x86_64.rpm kernel-doc-3.4.44-1.mga2.noarch.rpm kernel-netbook-3.4.44-1.mga2-1-1.mga2.x86_64.rpm kernel-netbook-devel-3.4.44-1.mga2-1-1.mga2.x86_64.rpm kernel-netbook-devel-latest-3.4.44-1.mga2.x86_64.rpm kernel-netbook-latest-3.4.44-1.mga2.x86_64.rpm kernel-server-3.4.44-1.mga2-1-1.mga2.x86_64.rpm kernel-server-devel-3.4.44-1.mga2-1-1.mga2.x86_64.rpm kernel-server-devel-latest-3.4.44-1.mga2.x86_64.rpm kernel-server-latest-3.4.44-1.mga2.x86_64.rpm kernel-source-3.4.44-1.mga2-1-1.mga2.noarch.rpm kernel-source-latest-3.4.44-1.mga2.noarch.rpm kernel-userspace-headers-3.4.44-1.mga2.x86_64.rpm perf-3.4.44-1.mga2.x86_64.rpm vboxadditions-kernel-3.4.44-desktop-1.mga2-4.1.24-7.mga2.x86_64.rpm vboxadditions-kernel-3.4.44-netbook-1.mga2-4.1.24-7.mga2.x86_64.rpm vboxadditions-kernel-3.4.44-server-1.mga2-4.1.24-7.mga2.x86_64.rpm vboxadditions-kernel-desktop-latest-4.1.24-7.mga2.x86_64.rpm vboxadditions-kernel-netbook-latest-4.1.24-7.mga2.x86_64.rpm vboxadditions-kernel-server-latest-4.1.24-7.mga2.x86_64.rpm virtualbox-kernel-3.4.44-desktop-1.mga2-4.1.24-7.mga2.x86_64.rpm virtualbox-kernel-3.4.44-netbook-1.mga2-4.1.24-7.mga2.x86_64.rpm virtualbox-kernel-3.4.44-server-1.mga2-4.1.24-7.mga2.x86_64.rpm virtualbox-kernel-desktop-latest-4.1.24-7.mga2.x86_64.rpm virtualbox-kernel-netbook-latest-4.1.24-7.mga2.x86_64.rpm virtualbox-kernel-server-latest-4.1.24-7.mga2.x86_64.rpm xtables-addons-kernel-3.4.44-desktop-1.mga2-1.41-24.mga2.x86_64.rpm xtables-addons-kernel-3.4.44-netbook-1.mga2-1.41-24.mga2.x86_64.rpm xtables-addons-kernel-3.4.44-server-1.mga2-1.41-24.mga2.x86_64.rpm xtables-addons-kernel-desktop-latest-1.41-24.mga2.x86_64.rpm xtables-addons-kernel-netbook-latest-1.41-24.mga2.x86_64.rpm xtables-addons-kernel-server-latest-1.41-24.mga2.x86_64.rpm broadcom-wl-kernel-3.4.44-desktop-1.mga2-5.100.82.112-44.mga2.nonfree.x86_64.rpm broadcom-wl-kernel-3.4.44-netbook-1.mga2-5.100.82.112-44.mga2.nonfree.x86_64.rpm broadcom-wl-kernel-3.4.44-server-1.mga2-5.100.82.112-44.mga2.nonfree.x86_64.rpm broadcom-wl-kernel-desktop-latest-5.100.82.112-44.mga2.nonfree.x86_64.rpm broadcom-wl-kernel-netbook-latest-5.100.82.112-44.mga2.nonfree.x86_64.rpm broadcom-wl-kernel-server-latest-5.100.82.112-44.mga2.nonfree.x86_64.rpm fglrx-kernel-3.4.44-desktop-1.mga2-8.961-20.mga2.nonfree.x86_64.rpm fglrx-kernel-3.4.44-netbook-1.mga2-8.961-20.mga2.nonfree.x86_64.rpm fglrx-kernel-3.4.44-server-1.mga2-8.961-20.mga2.nonfree.x86_64.rpm fglrx-kernel-desktop-latest-8.961-20.mga2.nonfree.x86_64.rpm fglrx-kernel-netbook-latest-8.961-20.mga2.nonfree.x86_64.rpm fglrx-kernel-server-latest-8.961-20.mga2.nonfree.x86_64.rpm nvidia173-kernel-3.4.44-desktop-1.mga2-173.14.36-10.mga2.nonfree.x86_64.rpm nvidia173-kernel-3.4.44-netbook-1.mga2-173.14.36-10.mga2.nonfree.x86_64.rpm nvidia173-kernel-3.4.44-server-1.mga2-173.14.36-10.mga2.nonfree.x86_64.rpm nvidia173-kernel-desktop-latest-173.14.36-10.mga2.nonfree.x86_64.rpm nvidia173-kernel-netbook-latest-173.14.36-10.mga2.nonfree.x86_64.rpm nvidia173-kernel-server-latest-173.14.36-10.mga2.nonfree.x86_64.rpm nvidia96xx-kernel-3.4.44-desktop-1.mga2-96.43.23-11.mga2.nonfree.x86_64.rpm nvidia96xx-kernel-3.4.44-netbook-1.mga2-96.43.23-11.mga2.nonfree.x86_64.rpm nvidia96xx-kernel-3.4.44-server-1.mga2-96.43.23-11.mga2.nonfree.x86_64.rpm nvidia96xx-kernel-desktop-latest-96.43.23-11.mga2.nonfree.x86_64.rpm nvidia96xx-kernel-netbook-latest-96.43.23-11.mga2.nonfree.x86_64.rpm nvidia96xx-kernel-server-latest-96.43.23-11.mga2.nonfree.x86_64.rpm nvidia-current-kernel-3.4.44-desktop-1.mga2-295.71-15.mga2.nonfree.x86_64.rpm nvidia-current-kernel-3.4.44-netbook-1.mga2-295.71-15.mga2.nonfree.x86_64.rpm nvidia-current-kernel-3.4.44-server-1.mga2-295.71-15.mga2.nonfree.x86_64.rpm nvidia-current-kernel-desktop-latest-295.71-15.mga2.nonfree.x86_64.rpm nvidia-current-kernel-netbook-latest-295.71-15.mga2.nonfree.x86_64.rpm nvidia-current-kernel-server-latest-295.71-15.mga2.nonfree.x86_64.rpm
and taking it back... 3.4.45 is being "rushed out" tomorrow for another security fix...
Just fyi, during an upgrade test, I got ... May 10 21:52:30 x3v perl: [RPM] filesystem-2.1.9-20.mga3.x86_64 installed May 10 21:52:31 x3v kernel: [ 1099.635314] sh[23282]: segfault at 28 ip 00007fdb9691e383 sp 00007fff45ddf4c0 error 4 in ld-2.17.so[7fdb96910000+1f000] May 10 21:52:35 x3v perl: [RPM] glibc-6:2.17-5.mga3.x86_64 installed This was during the beginning of the first upgrade transaction, so still mostly a mageia 2 system. Other then the syslog message, didn't seem to cause any problems.
CC: (none) => davidwhodgins
And 3.4.45 is ready for test: SRPMS: kernel-3.4.45-1.mga2.src.rpm kernel-userspace-headers-3.4.45-1.mga2.src.rpm kmod-vboxadditions-4.1.24-8.mga2.src.rpm kmod-virtualbox-4.1.24-8.mga2.src.rpm kmod-xtables-addons-1.41-25.mga2.src.rpm kmod-broadcom-wl-5.100.82.112-45.mga2.nonfree.src.rpm kmod-fglrx-8.961-21.mga2.nonfree.src.rpm kmod-nvidia173-173.14.36-11.mga2.nonfree.src.rpm kmod-nvidia96xx-96.43.23-12.mga2.nonfree.src.rpm kmod-nvidia-current-295.71-16.mga2.nonfree.src.rpm i586: cpupower-3.4.45-1.mga2.i586.rpm cpupower-devel-3.4.45-1.mga2.i586.rpm kernel-desktop-3.4.45-1.mga2-1-1.mga2.i586.rpm kernel-desktop586-3.4.45-1.mga2-1-1.mga2.i586.rpm kernel-desktop586-devel-3.4.45-1.mga2-1-1.mga2.i586.rpm kernel-desktop586-devel-latest-3.4.45-1.mga2.i586.rpm kernel-desktop586-latest-3.4.45-1.mga2.i586.rpm kernel-desktop-devel-3.4.45-1.mga2-1-1.mga2.i586.rpm kernel-desktop-devel-latest-3.4.45-1.mga2.i586.rpm kernel-desktop-latest-3.4.45-1.mga2.i586.rpm kernel-doc-3.4.45-1.mga2.noarch.rpm kernel-server-3.4.45-1.mga2-1-1.mga2.i586.rpm kernel-server-devel-3.4.45-1.mga2-1-1.mga2.i586.rpm kernel-server-devel-latest-3.4.45-1.mga2.i586.rpm kernel-server-latest-3.4.45-1.mga2.i586.rpm kernel-source-3.4.45-1.mga2-1-1.mga2.noarch.rpm kernel-source-latest-3.4.45-1.mga2.noarch.rpm kernel-userspace-headers-3.4.45-1.mga2.i586.rpm perf-3.4.45-1.mga2.i586.rpm vboxadditions-kernel-3.4.45-desktop-1.mga2-4.1.24-8.mga2.i586.rpm vboxadditions-kernel-3.4.45-desktop586-1.mga2-4.1.24-8.mga2.i586.rpm vboxadditions-kernel-3.4.45-netbook-1.mga2-4.1.24-8.mga2.i586.rpm vboxadditions-kernel-3.4.45-server-1.mga2-4.1.24-8.mga2.i586.rpm vboxadditions-kernel-desktop586-latest-4.1.24-8.mga2.i586.rpm vboxadditions-kernel-desktop-latest-4.1.24-8.mga2.i586.rpm vboxadditions-kernel-netbook-latest-4.1.24-8.mga2.i586.rpm vboxadditions-kernel-server-latest-4.1.24-8.mga2.i586.rpm virtualbox-kernel-3.4.45-desktop-1.mga2-4.1.24-8.mga2.i586.rpm virtualbox-kernel-3.4.45-desktop586-1.mga2-4.1.24-8.mga2.i586.rpm virtualbox-kernel-3.4.45-netbook-1.mga2-4.1.24-8.mga2.i586.rpm virtualbox-kernel-3.4.45-server-1.mga2-4.1.24-8.mga2.i586.rpm virtualbox-kernel-desktop586-latest-4.1.24-8.mga2.i586.rpm virtualbox-kernel-desktop-latest-4.1.24-8.mga2.i586.rpm virtualbox-kernel-netbook-latest-4.1.24-8.mga2.i586.rpm virtualbox-kernel-server-latest-4.1.24-8.mga2.i586.rpm xtables-addons-kernel-3.4.45-desktop-1.mga2-1.41-25.mga2.i586.rpm xtables-addons-kernel-3.4.45-desktop586-1.mga2-1.41-25.mga2.i586.rpm xtables-addons-kernel-3.4.45-netbook-1.mga2-1.41-25.mga2.i586.rpm xtables-addons-kernel-3.4.45-server-1.mga2-1.41-25.mga2.i586.rpm xtables-addons-kernel-desktop586-latest-1.41-25.mga2.i586.rpm xtables-addons-kernel-desktop-latest-1.41-25.mga2.i586.rpm xtables-addons-kernel-netbook-latest-1.41-25.mga2.i586.rpm xtables-addons-kernel-server-latest-1.41-25.mga2.i586.rpm broadcom-wl-kernel-3.4.45-desktop-1.mga2-5.100.82.112-45.mga2.nonfree.i586.rpm broadcom-wl-kernel-3.4.45-desktop586-1.mga2-5.100.82.112-45.mga2.nonfree.i586.rpm broadcom-wl-kernel-3.4.45-netbook-1.mga2-5.100.82.112-45.mga2.nonfree.i586.rpm broadcom-wl-kernel-3.4.45-server-1.mga2-5.100.82.112-45.mga2.nonfree.i586.rpm broadcom-wl-kernel-desktop586-latest-5.100.82.112-45.mga2.nonfree.i586.rpm broadcom-wl-kernel-desktop-latest-5.100.82.112-45.mga2.nonfree.i586.rpm broadcom-wl-kernel-netbook-latest-5.100.82.112-45.mga2.nonfree.i586.rpm broadcom-wl-kernel-server-latest-5.100.82.112-45.mga2.nonfree.i586.rpm fglrx-kernel-3.4.45-desktop-1.mga2-8.961-21.mga2.nonfree.i586.rpm fglrx-kernel-3.4.45-desktop586-1.mga2-8.961-21.mga2.nonfree.i586.rpm fglrx-kernel-3.4.45-netbook-1.mga2-8.961-21.mga2.nonfree.i586.rpm fglrx-kernel-3.4.45-server-1.mga2-8.961-21.mga2.nonfree.i586.rpm fglrx-kernel-desktop586-latest-8.961-21.mga2.nonfree.i586.rpm fglrx-kernel-desktop-latest-8.961-21.mga2.nonfree.i586.rpm fglrx-kernel-netbook-latest-8.961-21.mga2.nonfree.i586.rpm fglrx-kernel-server-latest-8.961-21.mga2.nonfree.i586.rpm nvidia173-kernel-3.4.45-desktop-1.mga2-173.14.36-11.mga2.nonfree.i586.rpm nvidia173-kernel-3.4.45-desktop586-1.mga2-173.14.36-11.mga2.nonfree.i586.rpm nvidia173-kernel-3.4.45-netbook-1.mga2-173.14.36-11.mga2.nonfree.i586.rpm nvidia173-kernel-3.4.45-server-1.mga2-173.14.36-11.mga2.nonfree.i586.rpm nvidia173-kernel-desktop586-latest-173.14.36-11.mga2.nonfree.i586.rpm nvidia173-kernel-desktop-latest-173.14.36-11.mga2.nonfree.i586.rpm nvidia173-kernel-netbook-latest-173.14.36-11.mga2.nonfree.i586.rpm nvidia173-kernel-server-latest-173.14.36-11.mga2.nonfree.i586.rpm nvidia96xx-kernel-3.4.45-desktop-1.mga2-96.43.23-12.mga2.nonfree.i586.rpm nvidia96xx-kernel-3.4.45-desktop586-1.mga2-96.43.23-12.mga2.nonfree.i586.rpm nvidia96xx-kernel-3.4.45-netbook-1.mga2-96.43.23-12.mga2.nonfree.i586.rpm nvidia96xx-kernel-3.4.45-server-1.mga2-96.43.23-12.mga2.nonfree.i586.rpm nvidia96xx-kernel-desktop586-latest-96.43.23-12.mga2.nonfree.i586.rpm nvidia96xx-kernel-desktop-latest-96.43.23-12.mga2.nonfree.i586.rpm nvidia96xx-kernel-netbook-latest-96.43.23-12.mga2.nonfree.i586.rpm nvidia96xx-kernel-server-latest-96.43.23-12.mga2.nonfree.i586.rpm nvidia-current-kernel-3.4.45-desktop-1.mga2-295.71-16.mga2.nonfree.i586.rpm nvidia-current-kernel-3.4.45-desktop586-1.mga2-295.71-16.mga2.nonfree.i586.rpm nvidia-current-kernel-3.4.45-netbook-1.mga2-295.71-16.mga2.nonfree.i586.rpm nvidia-current-kernel-3.4.45-server-1.mga2-295.71-16.mga2.nonfree.i586.rpm nvidia-current-kernel-desktop586-latest-295.71-16.mga2.nonfree.i586.rpm nvidia-current-kernel-desktop-latest-295.71-16.mga2.nonfree.i586.rpm nvidia-current-kernel-netbook-latest-295.71-16.mga2.nonfree.i586.rpm nvidia-current-kernel-server-latest-295.71-16.mga2.nonfree.i586.rpm x86_64: cpupower-3.4.45-1.mga2.x86_64.rpm cpupower-devel-3.4.45-1.mga2.x86_64.rpm kernel-desktop-3.4.45-1.mga2-1-1.mga2.x86_64.rpm kernel-desktop-devel-3.4.45-1.mga2-1-1.mga2.x86_64.rpm kernel-desktop-devel-latest-3.4.45-1.mga2.x86_64.rpm kernel-desktop-latest-3.4.45-1.mga2.x86_64.rpm kernel-doc-3.4.45-1.mga2.noarch.rpm kernel-netbook-3.4.45-1.mga2-1-1.mga2.x86_64.rpm kernel-netbook-devel-3.4.45-1.mga2-1-1.mga2.x86_64.rpm kernel-netbook-devel-latest-3.4.45-1.mga2.x86_64.rpm kernel-netbook-latest-3.4.45-1.mga2.x86_64.rpm kernel-server-3.4.45-1.mga2-1-1.mga2.x86_64.rpm kernel-server-devel-3.4.45-1.mga2-1-1.mga2.x86_64.rpm kernel-server-devel-latest-3.4.45-1.mga2.x86_64.rpm kernel-server-latest-3.4.45-1.mga2.x86_64.rpm kernel-source-3.4.45-1.mga2-1-1.mga2.noarch.rpm kernel-source-latest-3.4.45-1.mga2.noarch.rpm kernel-userspace-headers-3.4.45-1.mga2.x86_64.rpm perf-3.4.45-1.mga2.x86_64.rpm vboxadditions-kernel-3.4.45-desktop-1.mga2-4.1.24-8.mga2.x86_64.rpm vboxadditions-kernel-3.4.45-netbook-1.mga2-4.1.24-8.mga2.x86_64.rpm vboxadditions-kernel-3.4.45-server-1.mga2-4.1.24-8.mga2.x86_64.rpm vboxadditions-kernel-desktop-latest-4.1.24-8.mga2.x86_64.rpm vboxadditions-kernel-netbook-latest-4.1.24-8.mga2.x86_64.rpm vboxadditions-kernel-server-latest-4.1.24-8.mga2.x86_64.rpm virtualbox-kernel-3.4.45-desktop-1.mga2-4.1.24-8.mga2.x86_64.rpm virtualbox-kernel-3.4.45-netbook-1.mga2-4.1.24-8.mga2.x86_64.rpm virtualbox-kernel-3.4.45-server-1.mga2-4.1.24-8.mga2.x86_64.rpm virtualbox-kernel-desktop-latest-4.1.24-8.mga2.x86_64.rpm virtualbox-kernel-netbook-latest-4.1.24-8.mga2.x86_64.rpm virtualbox-kernel-server-latest-4.1.24-8.mga2.x86_64.rpm xtables-addons-kernel-3.4.45-desktop-1.mga2-1.41-25.mga2.x86_64.rpm xtables-addons-kernel-3.4.45-netbook-1.mga2-1.41-25.mga2.x86_64.rpm xtables-addons-kernel-3.4.45-server-1.mga2-1.41-25.mga2.x86_64.rpm xtables-addons-kernel-desktop-latest-1.41-25.mga2.x86_64.rpm xtables-addons-kernel-netbook-latest-1.41-25.mga2.x86_64.rpm xtables-addons-kernel-server-latest-1.41-25.mga2.x86_64.rpm broadcom-wl-kernel-3.4.45-desktop-1.mga2-5.100.82.112-45.mga2.nonfree.x86_64.rpm broadcom-wl-kernel-3.4.45-netbook-1.mga2-5.100.82.112-45.mga2.nonfree.x86_64.rpm broadcom-wl-kernel-3.4.45-server-1.mga2-5.100.82.112-45.mga2.nonfree.x86_64.rpm broadcom-wl-kernel-desktop-latest-5.100.82.112-45.mga2.nonfree.x86_64.rpm broadcom-wl-kernel-netbook-latest-5.100.82.112-45.mga2.nonfree.x86_64.rpm broadcom-wl-kernel-server-latest-5.100.82.112-45.mga2.nonfree.x86_64.rpm fglrx-kernel-3.4.45-desktop-1.mga2-8.961-21.mga2.nonfree.x86_64.rpm fglrx-kernel-3.4.45-netbook-1.mga2-8.961-21.mga2.nonfree.x86_64.rpm fglrx-kernel-3.4.45-server-1.mga2-8.961-21.mga2.nonfree.x86_64.rpm fglrx-kernel-desktop-latest-8.961-21.mga2.nonfree.x86_64.rpm fglrx-kernel-netbook-latest-8.961-21.mga2.nonfree.x86_64.rpm fglrx-kernel-server-latest-8.961-21.mga2.nonfree.x86_64.rpm nvidia173-kernel-3.4.45-desktop-1.mga2-173.14.36-11.mga2.nonfree.x86_64.rpm nvidia173-kernel-3.4.45-netbook-1.mga2-173.14.36-11.mga2.nonfree.x86_64.rpm nvidia173-kernel-3.4.45-server-1.mga2-173.14.36-11.mga2.nonfree.x86_64.rpm nvidia173-kernel-desktop-latest-173.14.36-11.mga2.nonfree.x86_64.rpm nvidia173-kernel-netbook-latest-173.14.36-11.mga2.nonfree.x86_64.rpm nvidia173-kernel-server-latest-173.14.36-11.mga2.nonfree.x86_64.rpm nvidia96xx-kernel-3.4.45-desktop-1.mga2-96.43.23-12.mga2.nonfree.x86_64.rpm nvidia96xx-kernel-3.4.45-netbook-1.mga2-96.43.23-12.mga2.nonfree.x86_64.rpm nvidia96xx-kernel-3.4.45-server-1.mga2-96.43.23-12.mga2.nonfree.x86_64.rpm nvidia96xx-kernel-desktop-latest-96.43.23-12.mga2.nonfree.x86_64.rpm nvidia96xx-kernel-netbook-latest-96.43.23-12.mga2.nonfree.x86_64.rpm nvidia96xx-kernel-server-latest-96.43.23-12.mga2.nonfree.x86_64.rpm nvidia-current-kernel-3.4.45-desktop-1.mga2-295.71-16.mga2.nonfree.x86_64.rpm nvidia-current-kernel-3.4.45-netbook-1.mga2-295.71-16.mga2.nonfree.x86_64.rpm nvidia-current-kernel-3.4.45-server-1.mga2-295.71-16.mga2.nonfree.x86_64.rpm nvidia-current-kernel-desktop-latest-295.71-16.mga2.nonfree.x86_64.rpm nvidia-current-kernel-netbook-latest-295.71-16.mga2.nonfree.x86_64.rpm nvidia-current-kernel-server-latest-295.71-16.mga2.nonfree.x86_64.rpm
Assignee: tmb => qa-bugsSummary: Update request: kernel-3.4.44-1.mga2 => Update request: kernel-3.4.45-1.mga2Source RPM: kernel-3.4.44-1.mga2.src.rpm => kernel-3.4.45-1.mga2.src.rpm
i586 kernel-desktop 3.4.45 working fine on my computer at home: Core 2 Duo E8400 Intel P45 chipset Radeon HD 4650
i586 kernel-server 3.4.45 working fine on my Dell Optiplex 990 at work. Core i7-2600 Intel 6 Series/C200 chipset (according to lspcidrake, tmb says Sandy Bridge) Radeon HD 5450
(In reply to David Walser from comment #9) > i586 kernel-server 3.4.45 working fine on my Dell Optiplex 990 at work. > Core i7-2600 > Intel 6 Series/C200 chipset (according to lspcidrake, tmb says Sandy Bridge) Yep, the i7-2600 is Sandy Bridge, and the 6 Series/C200 is called Cougar point... Hm, I wonder if you have one of the problematic C200 that could explain the oom in the other BR ... I'll review the Cougar Point stuff
Depends on: (none) => 10088
Addendum to advisory... CVE-2013-2094 also fixed
Depends on: 10088 => (none)
Testing complete for kernel-desktop-3.4.45-1.mga2 on Mageia release 2 (Official) for x86_64, for me it's ok, nothing to report, work fine. Testing complete for kernel-tmb-laptop-3.4.45-1.mga2-1-1.mga2, work fine too. Laptop Asus K73S, core i3-2350M, 2.3GHz Intel Corporation2nd Generation Core Processor Family Integrated Graphics Controller + nVidia Corporation GeForce 610M (Optimus).
CC: (none) => geiger.david68210
Tested MGA2 x86_64 desktop, netbook and server all build dkms modules for nvidia and virtualbox at install, boot normally. laptop compaq presario v6000, amd turion x2.
CC: (none) => wrw105Whiteboard: (none) => mga2-64-ok
(In reply to Bill Wilkinson from comment #13) > Tested MGA2 x86_64 > > desktop, netbook and server all build dkms modules for nvidia and virtualbox > at install, boot normally. > > laptop compaq presario v6000, amd turion x2. I guess ideally you should make sure that the appropriate virtualbox-kernel* and nvidia*-kernel* packages work for you too instead of the dkms ones.
Nvidia current kernel and virtualbox kernel both work normally with x86_64. Virtual machine boots and accesses network normally.
Testing complete on Mageia 2 i586 and x86_64. Could someone from the sysadmin push the kernel updates from Mageia 2 Core Updates Testing to Core Updates. See above for list of srpms and advisory.
Keywords: (none) => validated_updateWhiteboard: mga2-64-ok => mga2-64-ok MGA2-32-OKCC: (none) => sysadmin-bugs
Update pushed: https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0147
Status: NEW => RESOLVEDResolution: (none) => FIXED