Hello community,

here is the log from the commit of package patchinfo.2529 for 
openSUSE:12.3:Update checked in at 2014-02-06 18:10:39
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:12.3:Update/patchinfo.2529 (Old)
 and      /work/SRC/openSUSE:12.3:Update/.patchinfo.2529.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "patchinfo.2529"

Changes:
--------
New Changes file:

NO CHANGES FILE!!!

New:
----
  _patchinfo

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ _patchinfo ++++++
<patchinfo incident="2529">
  <issue id="804950" tracker="bnc">cifs share not working correctly after 
update</issue>
  <issue id="840656" tracker="bnc">btrfs kernel BUG at 
fs/btrfs/extent-tree.c:6621!</issue>
  <issue id="805226" tracker="bnc">VUL-1: CVE-2013-0343: kernel: Linux kernel 
handling of IPv6 temporary addresses</issue>
  <issue id="840226" tracker="bnc">VUL-1 CVE-2013-4345: kernel: ansi_cprng.c 
error in random number generation</issue>
  <issue id="838024" tracker="bnc">NFS mount show id 4294967294 for some 
users.</issue>
  <issue id="854722" tracker="bnc">VUL-0: kernel: net: memory leak in recvmsg 
handler msg_name &amp; msg_namelen logic</issue>
  <issue id="852559" tracker="bnc">VUL-1: CVE-2013-6378: kernel: libertas: 
Marvell 8xxx Libertas WLAN driver support vulnerable to denial of 
service</issue>
  <issue id="852558" tracker="bnc">VUL-1: CVE-2013-6383:  kernel: Adaptec RAID 
controller driver could allow bypass operation restrictions</issue>
  <issue id="853051" tracker="bnc">VUL-1: CVE-2013-6367: kernel: kvm: division 
by zero in apic_get_tmcct()</issue>
  <issue id="853050" tracker="bnc">VUL-1: CVE-2013-4587: kernel: kvm: 
rtc_status.dest_map out-of-bounds access</issue>
  <issue id="853053" tracker="bnc">VUL-1: CVE-2013-6376: kernel: kvm: BUG_ON() 
in apic_cluster_id()</issue>
  <issue id="853052" tracker="bnc">VUL-1: CVE-2013-6368: kernel: kvm: cross 
page vapic_addr access</issue>
  <issue id="825006" tracker="bnc">VUL-1: CVE-2013-2146: kernel: perf/x86: 
offcore_rsp valid mask for SNB/IVB</issue>
  <issue id="808358" tracker="bnc">VUL-1: kernel: CVE-2013-1792 Linux kernel: 
KEYS: race with concurrent install_user_keyrings()</issue>
  <issue id="849034" tracker="bnc">VUL-1: CVE-2013-4515: kernel: staging/bcm: 
kernel memory disclosure via uninitialized structure members</issue>
  <issue id="854173" tracker="bnc">VUL-1: CVE-2013-6431: kernel: net: fib: 
fib6_add: potential NULL pointer dereference</issue>
  <issue id="854634" tracker="bnc">VUL-1: CVE-2013-7027: kernel:  wireless: 
radiotap: fix parsing buffer overrun</issue>
  <issue id="848079" tracker="bnc">VUL-1: CVE-2013-4348: kernel: endless loop 
in skb_flow_dissect</issue>
  <issue id="831836" tracker="bnc">unable to override DSDT</issue>
  <issue id="849362" tracker="bnc">VUL-1: CVE-2013-2930: kernel: perf/ftrace 
local user crash</issue>
  <issue id="811746" tracker="bnc">nfs-kernel bug on 12.3 on X86_64</issue>
  <issue id="852373" tracker="bnc">VUL-1: CVE-2013-6380: kernel: aacraid: 
aacraid: invalid pointer dereference</issue>
  <issue id="844513" tracker="bnc">Broken MSI and MSI-X interrupt remapping on 
Intel 55XX chipsets</issue>
  <issue id="849023" tracker="bnc">VUL-1: CVE-2013-4513: kernel: 
staging/ozwpan: buffer overflow in write syscall</issue>
  <issue id="860993" tracker="bnc">VUL-0: EMBARGOED: CVE-2014-0038: kernel: 
3.4+: arbitrary write with CONFIG_X86_X32</issue>
  <issue id="849021" tracker="bnc">VUL-0: CVE-2013-4511: kernel: mapping of 
physical memory to user space without proper size check</issue>
  <issue id="848255" tracker="bnc">usb device freezes usb host?!?</issue>
  <issue id="849029" tracker="bnc">VUL-1: CVE-2013-4514: kernel: 
staging/wlags49_h2:  buffer overflow when setting station name</issue>
  <issue id="CVE-2013-1792" tracker="cve" />
  <issue id="CVE-2013-4587" tracker="cve" />
  <issue id="CVE-2013-6367" tracker="cve" />
  <issue id="CVE-2013-6376" tracker="cve" />
  <issue id="CVE-2014-0038" tracker="cve" />
  <issue id="CVE-2013-6368" tracker="cve" />
  <issue id="CVE-2013-4514" tracker="cve" />
  <issue id="CVE-2013-6380" tracker="cve" />
  <issue id="CVE-2013-7027" tracker="cve" />
  <issue id="CVE-2013-4348" tracker="cve" />
  <issue id="CVE-2013-4513" tracker="cve" />
  <issue id="CVE-2013-4511" tracker="cve" />
  <issue id="CVE-2013-4515" tracker="cve" />
  <issue id="CVE-2013-6378" tracker="cve" />
  <issue id="CVE-2013-0343" tracker="cve" />
  <issue id="CVE-2013-6431" tracker="cve" />
  <category>security</category>
  <rating>important</rating>
  <packager>msmeissn</packager>
  <description>
The Linux kernel was updated to fix various bugs and security issues:

- mm/page-writeback.c: do not count anon pages as dirtyable memory
  (reclaim stalls).
- mm/page-writeback.c: fix dirty_balance_reserve subtraction
  from dirtyable memory (reclaim stalls).

- compat_sys_recvmmsg X32 fix (bnc#860993 CVE-2014-0038).

- hwmon: (coretemp) Fix truncated name of alarm attributes

- net: fib: fib6_add: fix potential NULL pointer dereference
  (bnc#854173 CVE-2013-6431).

- keys: fix race with concurrent install_user_keyrings()
  (bnc#808358)(CVE-2013-1792).

- KVM: x86: Convert vapic synchronization to _cached functions
  (CVE-2013-6368) (bnc#853052 CVE-2013-6368).

- wireless: radiotap: fix parsing buffer overrun (bnc#854634
  CVE-2013-7027).

- KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376)
  (bnc#853053 CVE-2013-6376).

- KVM: x86: Fix potential divide by 0 in lapic (CVE-2013-6367)
  (bnc#853051 CVE-2013-6367).

- KVM: Improve create VCPU parameter (CVE-2013-4587) (bnc#853050
  CVE-2013-4587).

- staging: ozwpan: prevent overflow in oz_cdev_write() (bnc#849023
  CVE-2013-4513).

- perf/x86: Fix offcore_rsp valid mask for SNB/IVB (bnc#825006).
- perf/x86: Add Intel IvyBridge event scheduling constraints
  (bnc#825006).

- libertas: potential oops in debugfs (bnc#852559 CVE-2013-6378).

- aacraid: prevent invalid pointer dereference (bnc#852373
  CVE-2013-6380).

- staging: wlags49_h2: buffer overflow setting station name
  (bnc#849029 CVE-2013-4514).

- net: flow_dissector: fail on evil iph-&gt;ihl (bnc#848079
  CVE-2013-4348).

- Staging: bcm: info leak in ioctl (bnc#849034 CVE-2013-4515).

- Refresh
  patches.fixes/net-rework-recvmsg-handler-msg_name-and-msg_namelen-logic.patch.

- ipv6: remove max_addresses check from ipv6_create_tempaddr
  (bnc#805226, CVE-2013-0343).

- net: rework recvmsg handler msg_name and msg_namelen logic
  (bnc#854722).

- crypto: ansi_cprng - Fix off by one error in non-block size
  request (bnc#840226).

- x6: Fix reserve_initrd so that acpi_initrd_override is reached
  (bnc#831836).
- Refresh other Xen patches.

- aacraid: missing capable() check in compat ioctl (bnc#852558).

- patches.fixes/gpio-ich-fix-ichx_gpio_check_available-return.patch: Update 
upstream reference

- perf/ftrace: Fix paranoid level for enabling function tracer
  (bnc#849362).

- xhci: fix null pointer dereference on
  ring_doorbell_for_active_rings (bnc#848255).
- xhci: Fix oops happening after address device timeout
  (bnc#848255).
- xhci: Ensure a command structure points to the correct trb on
  the command ring (bnc#848255).

- 
patches.arch/iommu-vt-d-remove-stack-trace-from-broken-irq-remapping-warning.patch:
  Update upstream reference.

- Allow NFSv4 username mapping to work properly (bnc#838024).

- Refresh btrfs attribute publishing patchset to match openSUSE-13.1
  No user-visible changes, but uses kobj_sysfs_ops and better kobject
  lifetime management.

- Fix a few incorrectly checked [io_]remap_pfn_range() calls
  (bnc#849021, CVE-2013-4511).

- drm/radeon: don't set hpd, afmt interrupts when interrupts
  are disabled.

- patches.fixes/cifs-fill-TRANS2_QUERY_FILE_INFO-ByteCount-fields.patch:
  Fix TRANS2_QUERY_FILE_INFO ByteCount fields (bnc#804950).

- iommu: Remove stack trace from broken irq remapping warning
  (bnc#844513).

- Disable patches related to bnc#840656
  patches.suse/btrfs-cleanup-don-t-check-the-same-thing-twice
  patches.suse/btrfs-0220-fix-for-patch-cleanup-don-t-check-the-same-thi.patch

- btrfs: use feature attribute names to print better error
  messages.
- btrfs: add ability to change features via sysfs.
- btrfs: add publishing of unknown features in sysfs.
- btrfs: publish per-super features to sysfs.
- btrfs: add per-super attributes to sysfs.
- btrfs: export supported featured to sysfs.
- kobject: introduce kobj_completion.
- btrfs: add ioctls to query/change feature bits online.
- btrfs: use btrfs_commit_transaction when setting fslabel.

- x86/iommu/vt-d: Expand interrupt remapping quirk to cover x58
  chipset (bnc#844513).

- NFSv4: Fix issues in nfs4_discover_server_trunking (bnc#811746).

- iommu/vt-d: add quirk for broken interrupt remapping on 55XX
  chipsets (bnc#844513).
</description>
  <summary>kernel: security and bugfix update</summary>
  <reboot_needed/>
</patchinfo>
-- 
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to