Comment # 3
on bug 825904
from Jeff Mahoney
openSUSE 12.3 has passed out of maintenance. The final openSUSE 12.3 kernel
update was released 19 Dec 2014.
The final commit in the changelog reads:
Source Timestamp: 2014-12-16 21:27:58 +0100
GIT Revision: 4c885a114e790eff4a123e7617a06547021a5fb2
GIT Branch: openSUSE-12.3
Distribution: openSUSE 12.3
* Tue Dec 16 2014 bp@suse.de
- Update config files.
- commit 4c885a1
* Tue Dec 16 2014 bp@suse.de
- x86-64, espfix: Don't leak bits 31:16 of %esp returning to
16-bit stack (bsc#907818,CVE-2014-9090).
- x86, espfix: Make espfix64 a Kconfig option, fix UML
(bsc#907818,CVE-2014-9090).
- x86, espfix: Make it possible to disable 16-bit support
(bsc#907818,CVE-2014-9090).
- x86_64/entry/xen: Do not invoke espfix64 on Xen
(bsc#907818,CVE-2014-9090).
- x86_64, traps: Fix the espfix64 #DF fixup and rewrite it in C
(bsc#907818,CVE-2014-9090).
- x86_64, traps: Rework bad_iret (bsc#909077,CVE-2014-8133).
- x86_64, traps: Stop using IST for #SS (bsc#907818,
CVE-2014-9090, CVE-2014-9322).
- Update config files.
- Refresh
patches.arch/stack-unwind-cfi_ignore-takes-more-arguments.
- Refresh patches.arch/x86_64-unwind-annotations.
- Refresh patches.xen/xen3-patch-2.6.31.
- commit 23e4e06
If you are still experiencing the reported issue, please re-test with openSUSE
13.1, 13.2, or (ideally) openSUSE Factory. If the issue still exists
Comment # 2
on bug 825904
from Joschi Brauchle
The problem persists with openSUSE 12.3 and each and every kernel update, cause
many unbootable systems at our institute.
On the other hand, a simple change in the bash script
/usr/lib/module-init-tools/weak-modules2 is sufficient to handle any errors of
mkinitrd instead of always returning success.
As a workaround, the check for space on the /boot device could be changed from
20 to eg. 50 (12.3) or 80 (13.1) MB.