http://bugzilla.suse.com/show_bug.cgi?id=852887
Jeff Mahoney changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution|--- |WONTFIX
--- Comment #7 from Jeff Mahoney ---
openSUSE 12.3 has passed out of maintenance. The final openSUSE 12.3 kernel
update was released 19 Dec 2014.
The final commit in the changelog reads:
Source Timestamp: 2014-12-16 21:27:58 +0100
GIT Revision: 4c885a114e790eff4a123e7617a06547021a5fb2
GIT Branch: openSUSE-12.3
Distribution: openSUSE 12.3
* Tue Dec 16 2014 bp@suse.de
- Update config files.
- commit 4c885a1
* Tue Dec 16 2014 bp@suse.de
- x86-64, espfix: Don't leak bits 31:16 of %esp returning to
16-bit stack (bsc#907818,CVE-2014-9090).
- x86, espfix: Make espfix64 a Kconfig option, fix UML
(bsc#907818,CVE-2014-9090).
- x86, espfix: Make it possible to disable 16-bit support
(bsc#907818,CVE-2014-9090).
- x86_64/entry/xen: Do not invoke espfix64 on Xen
(bsc#907818,CVE-2014-9090).
- x86_64, traps: Fix the espfix64 #DF fixup and rewrite it in C
(bsc#907818,CVE-2014-9090).
- x86_64, traps: Rework bad_iret (bsc#909077,CVE-2014-8133).
- x86_64, traps: Stop using IST for #SS (bsc#907818,
CVE-2014-9090, CVE-2014-9322).
- Update config files.
- Refresh
patches.arch/stack-unwind-cfi_ignore-takes-more-arguments.
- Refresh patches.arch/x86_64-unwind-annotations.
- Refresh patches.xen/xen3-patch-2.6.31.
- commit 23e4e06
If you are still experiencing the reported issue, please re-test with openSUSE
13.1, 13.2, or (ideally) openSUSE Factory. If the issue still exists
--
You are receiving this mail because:
You are on the CC list for the bug.