From Mageia wiki
Jump to: navigation, search

MGASA-2013-0066

Date: February 22nd, 2013
Affected releases: 2
Media: Core, Nonfree


Description:
This kernel update provides upstream 3.4.32 kernel and resolves the
following security issues:

The xen_failsafe_callback function in Xen for the Linux kernel 2.6.23 and
other versions, when running a 32-bit PVOPS guest, allows local users to
cause a denial of service (guest crash) by triggering an iret fault,
leading to use of an incorrect stack pointer and stack corruption.
(CVE-2013-0190 / XSA-40)

Linux kernel when returning from an iret assumes that %ds segment is safe
and uses it to reference various per-cpu related fields. Unfortunately
the user can modify the LDT and provide a NULL one. Whenever an iret is
called we end up in xen_iret and try to use the %ds segment and cause an
general protection fault.
Malicious or buggy unprivileged user space can cause the guest kernel to
crash, or permit a privilege escalation within the guest, or operate
erroneously. (CVE-2013-0228 / XSA-42)

Access to /dev/cpu/*/msr was protected only using filesystem checks. A
local uid 0 (root) user with all capabilities dropped could use this
flaw to execute arbitrary code in kernel mode. (CVE-2013-0268)

Linux kernel built with Extended Verification Module(EVM) and configured
properly, is vulnerable to a NULL pointer de-reference flaw, caused by
accessing extended attribute routines of sockfs inode object.
An unprivileged user/program could use this to crash the kernel, resulting
in DoS. (CVE-2013-0313)

A flaw was found in the way __skb_recv_datagram() processed skbs with no
payload when MSG_PEEK was requested. An unprivileged local user could use
this flaw to cause local denial of service. (CVE-2013-0290)

A race conditon in ptrace can lead to kernel stack corruption and arbitrary
kernel-mode code execution. (CVE-2013-0871)

A flaw was found in how printk manages buffers when calling log_prefix
function from call_console_drivers creating a buffer overflow.
An unprivileged local user could use this flaw to cause local denial
of service. (CVE pending)


Other fixes in this release:
fixes HP Compaq 6715s freezing on 3.4 series kernels (mga #9079)

adds Intel Lynx Point-LP, Haswell and Wellsburg support to ata/ahci,
smbus, watchdog and sound.

adds sound support for Creative SoundCore3D


Updated Packages:
i586:
cpupower-3.4.32-2.mga2.i586.rpm
cpupower-devel-3.4.32-2.mga2.i586.rpm
kernel-desktop-3.4.32-2.mga2-1-1.mga2.i586.rpm
kernel-desktop586-3.4.32-2.mga2-1-1.mga2.i586.rpm
kernel-desktop586-devel-3.4.32-2.mga2-1-1.mga2.i586.rpm
kernel-desktop586-devel-latest-3.4.32-2.mga2.i586.rpm
kernel-desktop586-latest-3.4.32-2.mga2.i586.rpm
kernel-desktop-devel-3.4.32-2.mga2-1-1.mga2.i586.rpm
kernel-desktop-devel-latest-3.4.32-2.mga2.i586.rpm
kernel-desktop-latest-3.4.32-2.mga2.i586.rpm
kernel-doc-3.4.32-2.mga2.noarch.rpm
kernel-netbook-3.4.32-2.mga2-1-1.mga2.i586.rpm
kernel-netbook-devel-3.4.32-2.mga2-1-1.mga2.i586.rpm
kernel-netbook-devel-latest-3.4.32-2.mga2.i586.rpm
kernel-netbook-latest-3.4.32-2.mga2.i586.rpm
kernel-server-3.4.32-2.mga2-1-1.mga2.i586.rpm
kernel-server-devel-3.4.32-2.mga2-1-1.mga2.i586.rpm
kernel-server-devel-latest-3.4.32-2.mga2.i586.rpm
kernel-server-latest-3.4.32-2.mga2.i586.rpm
kernel-source-3.4.32-2.mga2-1-1.mga2.noarch.rpm
kernel-source-latest-3.4.32-2.mga2.noarch.rpm
perf-3.4.32-2.mga2.i586.rpm
kernel-desktop-3.4.32-2.mga2-debug-1-1.mga2.i586.rpm
kernel-desktop586-3.4.32-2.mga2-debug-1-1.mga2.i586.rpm
kernel-netbook-3.4.32-2.mga2-debug-1-1.mga2.i586.rpm
kernel-server-3.4.32-2.mga2-debug-1-1.mga2.i586.rpm
kernel-userspace-headers-3.4.32-2.mga2.i586.rpm
vboxadditions-kernel-3.4.32-desktop-2.mga2-4.1.24-4.mga2.i586.rpm
vboxadditions-kernel-3.4.32-desktop586-2.mga2-4.1.24-4.mga2.i586.rpm
vboxadditions-kernel-3.4.32-netbook-2.mga2-4.1.24-4.mga2.i586.rpm
vboxadditions-kernel-3.4.32-server-2.mga2-4.1.24-4.mga2.i586.rpm
vboxadditions-kernel-desktop586-latest-4.1.24-4.mga2.i586.rpm
vboxadditions-kernel-desktop-latest-4.1.24-4.mga2.i586.rpm
vboxadditions-kernel-netbook-latest-4.1.24-4.mga2.i586.rpm
vboxadditions-kernel-server-latest-4.1.24-4.mga2.i586.rpm
virtualbox-kernel-3.4.32-desktop-2.mga2-4.1.24-3.mga2.i586.rpm
virtualbox-kernel-3.4.32-desktop586-2.mga2-4.1.24-3.mga2.i586.rpm
virtualbox-kernel-3.4.32-netbook-2.mga2-4.1.24-3.mga2.i586.rpm
virtualbox-kernel-3.4.32-server-2.mga2-4.1.24-3.mga2.i586.rpm
virtualbox-kernel-desktop586-latest-4.1.24-3.mga2.i586.rpm
virtualbox-kernel-desktop-latest-4.1.24-3.mga2.i586.rpm
virtualbox-kernel-netbook-latest-4.1.24-3.mga2.i586.rpm
virtualbox-kernel-server-latest-4.1.24-3.mga2.i586.rpm
xtables-addons-kernel-3.4.32-desktop-2.mga2-1.41-21.mga2.i586.rpm
xtables-addons-kernel-3.4.32-desktop586-2.mga2-1.41-21.mga2.i586.rpm
xtables-addons-kernel-3.4.32-netbook-2.mga2-1.41-21.mga2.i586.rpm
xtables-addons-kernel-3.4.32-server-2.mga2-1.41-21.mga2.i586.rpm
xtables-addons-kernel-desktop586-latest-1.41-21.mga2.i586.rpm
xtables-addons-kernel-desktop-latest-1.41-21.mga2.i586.rpm
xtables-addons-kernel-netbook-latest-1.41-21.mga2.i586.rpm
xtables-addons-kernel-server-latest-1.41-21.mga2.i586.rpm

broadcom-wl-common-5.100.82.112-7.mga2.nonfree.i586.rpm
dkms-broadcom-wl-5.100.82.112-7.mga2.nonfree.i586.rpm
broadcom-wl-debug-5.100.82.112-7.mga2.nonfree.i586.rpm
broadcom-wl-kernel-3.4.32-desktop-2.mga2-5.100.82.112-41.mga2.nonfree.i586.rpm
broadcom-wl-kernel-3.4.32-desktop586-2.mga2-5.100.82.112-41.mga2.nonfree.i586.rpm
broadcom-wl-kernel-3.4.32-netbook-2.mga2-5.100.82.112-41.mga2.nonfree.i586.rpm
broadcom-wl-kernel-3.4.32-server-2.mga2-5.100.82.112-41.mga2.nonfree.i586.rpm
broadcom-wl-kernel-desktop586-latest-5.100.82.112-41.mga2.nonfree.i586.rpm
broadcom-wl-kernel-desktop-latest-5.100.82.112-41.mga2.nonfree.i586.rpm
broadcom-wl-kernel-netbook-latest-5.100.82.112-41.mga2.nonfree.i586.rpm
broadcom-wl-kernel-server-latest-5.100.82.112-41.mga2.nonfree.i586.rpm
fglrx-kernel-3.4.32-desktop-2.mga2-8.961-17.mga2.nonfree.i586.rpm
fglrx-kernel-3.4.32-desktop586-2.mga2-8.961-17.mga2.nonfree.i586.rpm
fglrx-kernel-3.4.32-netbook-2.mga2-8.961-17.mga2.nonfree.i586.rpm
fglrx-kernel-3.4.32-server-2.mga2-8.961-17.mga2.nonfree.i586.rpm
fglrx-kernel-desktop586-latest-8.961-17.mga2.nonfree.i586.rpm
fglrx-kernel-desktop-latest-8.961-17.mga2.nonfree.i586.rpm
fglrx-kernel-netbook-latest-8.961-17.mga2.nonfree.i586.rpm
fglrx-kernel-server-latest-8.961-17.mga2.nonfree.i586.rpm
nvidia-current-kernel-3.4.32-desktop-2.mga2-295.71-12.mga2.nonfree.i586.rpm
nvidia-current-kernel-3.4.32-desktop586-2.mga2-295.71-12.mga2.nonfree.i586.rpm
nvidia-current-kernel-3.4.32-netbook-2.mga2-295.71-12.mga2.nonfree.i586.rpm
nvidia-current-kernel-3.4.32-server-2.mga2-295.71-12.mga2.nonfree.i586.rpm
nvidia-current-kernel-desktop586-latest-295.71-12.mga2.nonfree.i586.rpm
nvidia-current-kernel-desktop-latest-295.71-12.mga2.nonfree.i586.rpm
nvidia-current-kernel-netbook-latest-295.71-12.mga2.nonfree.i586.rpm
nvidia-current-kernel-server-latest-295.71-12.mga2.nonfree.i586.rpm


x86_64:
cpupower-3.4.32-2.mga2.x86_64.rpm
cpupower-devel-3.4.32-2.mga2.x86_64.rpm
kernel-desktop-3.4.32-2.mga2-1-1.mga2.x86_64.rpm
kernel-desktop-devel-3.4.32-2.mga2-1-1.mga2.x86_64.rpm
kernel-desktop-devel-latest-3.4.32-2.mga2.x86_64.rpm
kernel-desktop-latest-3.4.32-2.mga2.x86_64.rpm
kernel-doc-3.4.32-2.mga2.noarch.rpm
kernel-netbook-3.4.32-2.mga2-1-1.mga2.x86_64.rpm
kernel-netbook-devel-3.4.32-2.mga2-1-1.mga2.x86_64.rpm
kernel-netbook-devel-latest-3.4.32-2.mga2.x86_64.rpm
kernel-netbook-latest-3.4.32-2.mga2.x86_64.rpm
kernel-server-3.4.32-2.mga2-1-1.mga2.x86_64.rpm
kernel-server-devel-3.4.32-2.mga2-1-1.mga2.x86_64.rpm
kernel-server-devel-latest-3.4.32-2.mga2.x86_64.rpm
kernel-server-latest-3.4.32-2.mga2.x86_64.rpm
kernel-source-3.4.32-2.mga2-1-1.mga2.noarch.rpm
kernel-source-latest-3.4.32-2.mga2.noarch.rpm
perf-3.4.32-2.mga2.x86_64.rpm
kernel-desktop-3.4.32-2.mga2-debug-1-1.mga2.x86_64.rpm
kernel-netbook-3.4.32-2.mga2-debug-1-1.mga2.x86_64.rpm
kernel-server-3.4.32-2.mga2-debug-1-1.mga2.x86_64.rpm
kernel-userspace-headers-3.4.32-2.mga2.x86_64.rpm
vboxadditions-kernel-3.4.32-desktop-2.mga2-4.1.24-4.mga2.x86_64.rpm
vboxadditions-kernel-3.4.32-netbook-2.mga2-4.1.24-4.mga2.x86_64.rpm
vboxadditions-kernel-3.4.32-server-2.mga2-4.1.24-4.mga2.x86_64.rpm
vboxadditions-kernel-desktop-latest-4.1.24-4.mga2.x86_64.rpm
vboxadditions-kernel-netbook-latest-4.1.24-4.mga2.x86_64.rpm
vboxadditions-kernel-server-latest-4.1.24-4.mga2.x86_64.rpm
virtualbox-kernel-3.4.32-desktop-2.mga2-4.1.24-3.mga2.x86_64.rpm
virtualbox-kernel-3.4.32-netbook-2.mga2-4.1.24-3.mga2.x86_64.rpm
virtualbox-kernel-3.4.32-server-2.mga2-4.1.24-3.mga2.x86_64.rpm
virtualbox-kernel-desktop-latest-4.1.24-3.mga2.x86_64.rpm
virtualbox-kernel-netbook-latest-4.1.24-3.mga2.x86_64.rpm
virtualbox-kernel-server-latest-4.1.24-3.mga2.x86_64.rpm
xtables-addons-kernel-3.4.32-desktop-2.mga2-1.41-21.mga2.x86_64.rpm
xtables-addons-kernel-3.4.32-netbook-2.mga2-1.41-21.mga2.x86_64.rpm
xtables-addons-kernel-3.4.32-server-2.mga2-1.41-21.mga2.x86_64.rpm
xtables-addons-kernel-desktop-latest-1.41-21.mga2.x86_64.rpm
xtables-addons-kernel-netbook-latest-1.41-21.mga2.x86_64.rpm
xtables-addons-kernel-server-latest-1.41-21.mga2.x86_64.rpm

broadcom-wl-common-5.100.82.112-7.mga2.nonfree.x86_64.rpm
dkms-broadcom-wl-5.100.82.112-7.mga2.nonfree.x86_64.rpm
broadcom-wl-debug-5.100.82.112-7.mga2.nonfree.x86_64.rpm
broadcom-wl-kernel-3.4.32-desktop-2.mga2-5.100.82.112-41.mga2.nonfree.x86_64.rpm
broadcom-wl-kernel-3.4.32-netbook-2.mga2-5.100.82.112-41.mga2.nonfree.x86_64.rpm
broadcom-wl-kernel-3.4.32-server-2.mga2-5.100.82.112-41.mga2.nonfree.x86_64.rpm
broadcom-wl-kernel-desktop-latest-5.100.82.112-41.mga2.nonfree.x86_64.rpm
broadcom-wl-kernel-netbook-latest-5.100.82.112-41.mga2.nonfree.x86_64.rpm
broadcom-wl-kernel-server-latest-5.100.82.112-41.mga2.nonfree.x86_64.rpm
fglrx-kernel-3.4.32-desktop-2.mga2-8.961-17.mga2.nonfree.x86_64.rpm
fglrx-kernel-3.4.32-netbook-2.mga2-8.961-17.mga2.nonfree.x86_64.rpm
fglrx-kernel-3.4.32-server-2.mga2-8.961-17.mga2.nonfree.x86_64.rpm
fglrx-kernel-desktop-latest-8.961-17.mga2.nonfree.x86_64.rpm
fglrx-kernel-netbook-latest-8.961-17.mga2.nonfree.x86_64.rpm
fglrx-kernel-server-latest-8.961-17.mga2.nonfree.x86_64.rpm
nvidia-current-kernel-3.4.32-desktop-2.mga2-295.71-12.mga2.nonfree.x86_64.rpm
nvidia-current-kernel-3.4.32-netbook-2.mga2-295.71-12.mga2.nonfree.x86_64.rpm
nvidia-current-kernel-3.4.32-server-2.mga2-295.71-12.mga2.nonfree.x86_64.rpm
nvidia-current-kernel-desktop-latest-295.71-12.mga2.nonfree.x86_64.rpm
nvidia-current-kernel-netbook-latest-295.71-12.mga2.nonfree.x86_64.rpm
nvidia-current-kernel-server-latest-295.71-12.mga2.nonfree.x86_64.rpm


SRPMS:
kernel-3.4.32-2.mga2.src.rpm
kernel-userspace-headers-3.4.32-2.mga2.src.rpm
kmod-vboxadditions-4.1.24-4.mga2.src.rpm
kmod-virtualbox-4.1.24-3.mga2.src.rpm
kmod-xtables-addons-1.41-21.mga2.src.rpm

broadcom-wl-5.100.82.112-7.mga2.nonfree.src.rpm
kmod-broadcom-wl-5.100.82.112-41.mga2.nonfree.src.rpm
kmod-fglrx-8.961-17.mga2.nonfree.src.rpm
kmod-nvidia-current-295.71-12.mga2.nonfree.src.rpm


References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0190
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0228
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0268
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0290
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0313
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0871
http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.4.25
http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.4.26
http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.4.27
http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.4.28
http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.4.29
http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.4.30
http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.4.31
http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.4.32
https://bugs.mageia.org/show_bug.cgi?id=9079
https://bugs.mageia.org/show_bug.cgi?id=9118