Hello community,

here is the log from the commit of package patchinfo.2805 for 
openSUSE:12.3:Update checked in at 2014-05-19 11:28:15
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:12.3:Update/patchinfo.2805 (Old)
 and      /work/SRC/openSUSE:12.3:Update/.patchinfo.2805.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "patchinfo.2805"

Changes:
--------
New Changes file:

NO CHANGES FILE!!!

New:
----
  _patchinfo

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ _patchinfo ++++++
<patchinfo>
  <issue id="869414" tracker="bnc">Fix Oops in cirrus, mgag200 and ast KMS 
drivers</issue>
  <issue id="875798" tracker="bnc">VUL-0: CVE-2014-1737, CVE-2014-1738: kernel: 
floppy: ignore kernel-only members in FDRAWCMD ioctl input</issue>
  <issue id="858869" tracker="bnc">VUL-0: CVE-2014-1444: Kernel: farsync: 
information leak in ioctl</issue>
  <issue id="852652" tracker="bnc">Xen DomU, upgraded from Opensuse 12.3 -&gt; 
13.1, takes ~ 3mins to boot, up from ~ 20 secs in 12.3</issue>
  <issue id="875690" tracker="bnc">VUL-0: CVE-2014-0196: kernel: memory 
corruption via a race in pty write handling</issue>
  <issue id="851426" tracker="bnc">VUL-1: CVE-2013-4579: kernel: ath9k_htc  
ath9k_htc improperly updates MAC address</issue>
  <issue id="837111" tracker="bnc">VUL-1: CVE-2013-4254: kernel: arm: 
linux-kernel priviledge escalation on ARM/perf</issue>
  <issue id="869898" tracker="bnc">panic in fib6_age</issue>
  <issue id="864025" tracker="bnc">VUL-0: CVE-2014-0069: kernel: cifs: memory 
corruption resulting in local DoS</issue>
  <issue id="871252" tracker="bnc">L3: forked pty with lots of throughput 
crashes the kernel</issue>
  <issue id="863335" tracker="bnc">VUL-0: CVE-2014-1874: kernel: SELinux: local 
denial-of-service</issue>
  <issue id="858638" tracker="bnc">VUL-0: CVE-2014-1438:  kernel: missing 
CPU-state sanitation during task-switch causes DOS / privilege 
escalation</issue>
  <issue id="858233" tracker="bnc">Patch openSUSE-2013-1034 breaks 
xfs_growfs</issue>
  <issue id="862145" tracker="bnc">kernel bug at dcache.c (cifs bug)</issue>
  <issue id="833968" tracker="bnc">VUL-0: kernel: quick blind TCP connection 
spoofing with SYN Cookies</issue>
  <issue id="858872" tracker="bnc">VUL-0: CVE-2014-1446: Kernel: hamradio/yam: 
information leak in ioctl</issue>
  <issue id="811746" tracker="bnc">nfs-kernel bug on 12.3 on X86_64</issue>
  <issue id="858870" tracker="bnc">VUL-0: CVE-2014-1445: Kernel: wanxl: 
information leak in ioctl</issue>
  <issue id="860835" tracker="bnc">VUL-0: CVE-2014-1690: kernel: netfilter: 
nf_nat: leakage of uninitialized buffer in IRC NAT helper</issue>
  <issue id="873717" tracker="bnc">nf_conntrack_sip: doesn't track SIP 
connections initiated from ports != 5060</issue>
  <issue id="733022" tracker="bnc">xen guest - login takes very long</issue>
  <issue id="852967" tracker="bnc">VUL-1: CVE-2013-6885: kernel-source: AMD CPU 
erratum may cause core hang</issue>
  <issue id="871325" tracker="bnc">twofish crypto algorithm support 
missing</issue>
  <issue id="866102" tracker="bnc">VUL-0: CVE-2014-0101: kernel: net: sctp: fix 
sctp_sf_do_5_1D_ce to verify if peer is AUTH capable</issue>
  <issue id="868653" tracker="bnc">VUL-0: CVE-2014-2523: kernel: remote issue 
in nf_conntrack_proto_dccp.c</issue>
  <issue id="871148" tracker="bnc">VUL-1: CVE-2014-2672: kernel: 
compat-wireless: ath9k: potential crash problem</issue>
  <issue id="CVE-2013-4579" tracker="cve" />
  <issue id="CVE-2014-0101" tracker="cve" />
  <issue id="CVE-2014-2523" tracker="cve" />
  <issue id="CVE-2014-2672" tracker="cve" />
  <issue id="CVE-2014-1737" tracker="cve" />
  <issue id="CVE-2014-1446" tracker="cve" />
  <issue id="CVE-2014-1738" tracker="cve" />
  <issue id="CVE-2013-6885" tracker="cve" />
  <issue id="CVE-2014-0196" tracker="cve" />
  <issue id="CVE-2014-1445" tracker="cve" />
  <issue id="CVE-2014-0691" tracker="cve" />
  <issue id="CVE-2013-4254" tracker="cve" />
  <issue id="CVE-2014-1690" tracker="cve" />
  <issue id="CVE-2014-1874" tracker="cve" />
  <issue id="CVE-2014-1438" tracker="cve" />
  <issue id="CVE-2014-1444" tracker="cve" />
  <category>security</category>
  <rating>important</rating>
  <packager>jeff_mahoney</packager>
  <description>
The Linux Kernel was updated to fix various security issues and bugs.

Main security issues fixed:

A security issue in the tty layer that was fixed that could be used
by local attackers for code execution (CVE-2014-0196).

Two security issues in the floppy driver were fixed that could be
used by local attackers on machines with the floppy to crash the kernel
or potentially execute code in the kernel (CVE-2014-1737 CVE-2014-1738).

Other security issues and bugs that were fixed:
- netfilter: nf_nat: fix access to uninitialized buffer in IRC NAT helper
  (bnc#860835 CVE-2014-1690).

- net: sctp: fix sctp_sf_do_5_1D_ce to verify if we/peer is AUTH
  (bnc#866102, CVE-2014-0101).

- n_tty: Fix a n_tty_write crash and code execution when echoing in raw
  mode (bnc#871252 bnc#875690 CVE-2014-0196).

- netfilter: nf_ct_sip: support Cisco 7941/7945 IP phones (bnc#873717).

- Update config files: re-enable twofish crypto support
  Software twofish crypto support was disabled in several architectures
  since openSUSE 10.3. For i386 and x86_64 it was on purpose, because
  hardware-accelerated alternatives exist. However for all other
  architectures it was by accident.
  Re-enable software twofish crypto support in arm, ia64 and ppc
  configuration files, to guarantee that at least one implementation is
  always available (bnc#871325).

- Update config files: disable CONFIG_TOUCHSCREEN_W90X900
  The w90p910_ts driver only makes sense on the W90x900 architecture,
  which we do not support.

- ath9k: protect tid-&gt;sched check (bnc#871148,CVE-2014-2672).

- Fix dst_neigh_lookup/dst_neigh_lookup_skb return value handling
  bug (bnc#869898).

- SELinux:  Fix kernel BUG on empty security contexts
  (bnc#863335,CVE-2014-1874).

- hamradio/yam: fix info leak in ioctl (bnc#858872, CVE-2014-1446).

- wanxl: fix info leak in ioctl (bnc#858870, CVE-2014-1445).

- farsync: fix info leak in ioctl (bnc#858869, CVE-2014-1444).

- ARM: 7809/1: perf: fix event validation for software group
  leaders (CVE-2013-4254, bnc#837111).

- netfilter: nf_conntrack_dccp: fix skb_header_pointer API usages
  (bnc#868653, CVE-2014-2523).

- ath9k_htc: properly set MAC address and BSSID mask
  (bnc#851426, CVE-2013-4579).

- drm/ttm: don't oops if no invalidate_caches() (bnc#869414).

- Apply missing patches.fixes/drm-nouveau-hwmon-rename-fan0-to-fan1.patch

- xfs: growfs: use uncached buffers for new headers (bnc#858233).

- xfs: use btree block initialisation functions in growfs
  (bnc#858233).

- Revert "Delete 
patches.fixes/xfs-fix-xfs_buf_find-oops-on-blocks-beyond-the-filesystem-end." 
(bnc#858233)
  Put back again the patch
  patches.fixes/xfs-fix-xfs_buf_find-oops-on-blocks-beyond-the-filesystem-end 
back
  as there is a better fix than reverting the affecting patch.

- Delete 
patches.fixes/xfs-fix-xfs_buf_find-oops-on-blocks-beyond-the-filesystem-end.
  It turned out that this patch causes regressions (bnc#858233)
  The upstream 3.7.x also reverted it in the end (commit c3793e0d94af2).

- tcp: syncookies: reduce cookie lifetime to 128 seconds
  (bnc#833968).
- tcp: syncookies: reduce mss table to four values (bnc#833968).

- x86, cpu, amd: Add workaround for family 16h, erratum 793
  (bnc#852967 CVE-2013-6885).

- cifs: ensure that uncached writes handle unmapped areas
  correctly (bnc#864025 CVE-2014-0691).

- x86, fpu, amd: Clear exceptions in AMD FXSAVE workaround (bnc#858638 
CVE-2014-1438).

- xencons: generalize use of add_preferred_console() (bnc#733022,
  bnc#852652).
- balloon: don't crash in HVM-with-PoD guests.
- hwmon: (coretemp) Fix truncated name of alarm attributes.

- NFS: Avoid PUTROOTFH when managing leases (bnc#811746).

- cifs: delay super block destruction until all cifsFileInfo
  objects are gone (bnc#862145).
</description>
  <reboot_needed/>
  <summary>kernel: security and bugfix update</summary>
</patchinfo>
-- 
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to