commit patchinfo.2805 for openSUSE:12.3:Update
Hello community,
here is the log from the commit of package patchinfo.2805 for openSUSE:12.3:Update checked in at 2014-05-19 11:28:15
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:12.3:Update/patchinfo.2805 (Old)
and /work/SRC/openSUSE:12.3:Update/.patchinfo.2805.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "patchinfo.2805"
Changes:
--------
New Changes file:
NO CHANGES FILE!!!
New:
----
_patchinfo
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ _patchinfo ++++++
<patchinfo>
<issue id="869414" tracker="bnc">Fix Oops in cirrus, mgag200 and ast KMS drivers</issue>
<issue id="875798" tracker="bnc">VUL-0: CVE-2014-1737, CVE-2014-1738: kernel: floppy: ignore kernel-only members in FDRAWCMD ioctl input</issue>
<issue id="858869" tracker="bnc">VUL-0: CVE-2014-1444: Kernel: farsync: information leak in ioctl</issue>
<issue id="852652" tracker="bnc">Xen DomU, upgraded from Opensuse 12.3 -> 13.1, takes ~ 3mins to boot, up from ~ 20 secs in 12.3</issue>
<issue id="875690" tracker="bnc">VUL-0: CVE-2014-0196: kernel: memory corruption via a race in pty write handling</issue>
<issue id="851426" tracker="bnc">VUL-1: CVE-2013-4579: kernel: ath9k_htc ath9k_htc improperly updates MAC address</issue>
<issue id="837111" tracker="bnc">VUL-1: CVE-2013-4254: kernel: arm: linux-kernel priviledge escalation on ARM/perf</issue>
<issue id="869898" tracker="bnc">panic in fib6_age</issue>
<issue id="864025" tracker="bnc">VUL-0: CVE-2014-0069: kernel: cifs: memory corruption resulting in local DoS</issue>
<issue id="871252" tracker="bnc">L3: forked pty with lots of throughput crashes the kernel</issue>
<issue id="863335" tracker="bnc">VUL-0: CVE-2014-1874: kernel: SELinux: local denial-of-service</issue>
<issue id="858638" tracker="bnc">VUL-0: CVE-2014-1438: kernel: missing CPU-state sanitation during task-switch causes DOS / privilege escalation</issue>
<issue id="858233" tracker="bnc">Patch openSUSE-2013-1034 breaks xfs_growfs</issue>
<issue id="862145" tracker="bnc">kernel bug at dcache.c (cifs bug)</issue>
<issue id="833968" tracker="bnc">VUL-0: kernel: quick blind TCP connection spoofing with SYN Cookies</issue>
<issue id="858872" tracker="bnc">VUL-0: CVE-2014-1446: Kernel: hamradio/yam: information leak in ioctl</issue>
<issue id="811746" tracker="bnc">nfs-kernel bug on 12.3 on X86_64</issue>
<issue id="858870" tracker="bnc">VUL-0: CVE-2014-1445: Kernel: wanxl: information leak in ioctl</issue>
<issue id="860835" tracker="bnc">VUL-0: CVE-2014-1690: kernel: netfilter: nf_nat: leakage of uninitialized buffer in IRC NAT helper</issue>
<issue id="873717" tracker="bnc">nf_conntrack_sip: doesn't track SIP connections initiated from ports != 5060</issue>
<issue id="733022" tracker="bnc">xen guest - login takes very long</issue>
<issue id="852967" tracker="bnc">VUL-1: CVE-2013-6885: kernel-source: AMD CPU erratum may cause core hang</issue>
<issue id="871325" tracker="bnc">twofish crypto algorithm support missing</issue>
<issue id="866102" tracker="bnc">VUL-0: CVE-2014-0101: kernel: net: sctp: fix sctp_sf_do_5_1D_ce to verify if peer is AUTH capable</issue>
<issue id="868653" tracker="bnc">VUL-0: CVE-2014-2523: kernel: remote issue in nf_conntrack_proto_dccp.c</issue>
<issue id="871148" tracker="bnc">VUL-1: CVE-2014-2672: kernel: compat-wireless: ath9k: potential crash problem</issue>
<issue id="CVE-2013-4579" tracker="cve" />
<issue id="CVE-2014-0101" tracker="cve" />
<issue id="CVE-2014-2523" tracker="cve" />
<issue id="CVE-2014-2672" tracker="cve" />
<issue id="CVE-2014-1737" tracker="cve" />
<issue id="CVE-2014-1446" tracker="cve" />
<issue id="CVE-2014-1738" tracker="cve" />
<issue id="CVE-2013-6885" tracker="cve" />
<issue id="CVE-2014-0196" tracker="cve" />
<issue id="CVE-2014-1445" tracker="cve" />
<issue id="CVE-2014-0691" tracker="cve" />
<issue id="CVE-2013-4254" tracker="cve" />
<issue id="CVE-2014-1690" tracker="cve" />
<issue id="CVE-2014-1874" tracker="cve" />
<issue id="CVE-2014-1438" tracker="cve" />
<issue id="CVE-2014-1444" tracker="cve" />
<category>security</category>
<rating>important</rating>
<packager>jeff_mahoney</packager>
<description>
The Linux Kernel was updated to fix various security issues and bugs.
Main security issues fixed:
A security issue in the tty layer that was fixed that could be used
by local attackers for code execution (CVE-2014-0196).
Two security issues in the floppy driver were fixed that could be
used by local attackers on machines with the floppy to crash the kernel
or potentially execute code in the kernel (CVE-2014-1737 CVE-2014-1738).
Other security issues and bugs that were fixed:
- netfilter: nf_nat: fix access to uninitialized buffer in IRC NAT helper
(bnc#860835 CVE-2014-1690).
- net: sctp: fix sctp_sf_do_5_1D_ce to verify if we/peer is AUTH
(bnc#866102, CVE-2014-0101).
- n_tty: Fix a n_tty_write crash and code execution when echoing in raw
mode (bnc#871252 bnc#875690 CVE-2014-0196).
- netfilter: nf_ct_sip: support Cisco 7941/7945 IP phones (bnc#873717).
- Update config files: re-enable twofish crypto support
Software twofish crypto support was disabled in several architectures
since openSUSE 10.3. For i386 and x86_64 it was on purpose, because
hardware-accelerated alternatives exist. However for all other
architectures it was by accident.
Re-enable software twofish crypto support in arm, ia64 and ppc
configuration files, to guarantee that at least one implementation is
always available (bnc#871325).
- Update config files: disable CONFIG_TOUCHSCREEN_W90X900
The w90p910_ts driver only makes sense on the W90x900 architecture,
which we do not support.
- ath9k: protect tid->sched check (bnc#871148,CVE-2014-2672).
- Fix dst_neigh_lookup/dst_neigh_lookup_skb return value handling
bug (bnc#869898).
- SELinux: Fix kernel BUG on empty security contexts
(bnc#863335,CVE-2014-1874).
- hamradio/yam: fix info leak in ioctl (bnc#858872, CVE-2014-1446).
- wanxl: fix info leak in ioctl (bnc#858870, CVE-2014-1445).
- farsync: fix info leak in ioctl (bnc#858869, CVE-2014-1444).
- ARM: 7809/1: perf: fix event validation for software group
leaders (CVE-2013-4254, bnc#837111).
- netfilter: nf_conntrack_dccp: fix skb_header_pointer API usages
(bnc#868653, CVE-2014-2523).
- ath9k_htc: properly set MAC address and BSSID mask
(bnc#851426, CVE-2013-4579).
- drm/ttm: don't oops if no invalidate_caches() (bnc#869414).
- Apply missing patches.fixes/drm-nouveau-hwmon-rename-fan0-to-fan1.patch
- xfs: growfs: use uncached buffers for new headers (bnc#858233).
- xfs: use btree block initialisation functions in growfs
(bnc#858233).
- Revert "Delete patches.fixes/xfs-fix-xfs_buf_find-oops-on-blocks-beyond-the-filesystem-end." (bnc#858233)
Put back again the patch
patches.fixes/xfs-fix-xfs_buf_find-oops-on-blocks-beyond-the-filesystem-end back
as there is a better fix than reverting the affecting patch.
- Delete patches.fixes/xfs-fix-xfs_buf_find-oops-on-blocks-beyond-the-filesystem-end.
It turned out that this patch causes regressions (bnc#858233)
The upstream 3.7.x also reverted it in the end (commit c3793e0d94af2).
- tcp: syncookies: reduce cookie lifetime to 128 seconds
(bnc#833968).
- tcp: syncookies: reduce mss table to four values (bnc#833968).
- x86, cpu, amd: Add workaround for family 16h, erratum 793
(bnc#852967 CVE-2013-6885).
- cifs: ensure that uncached writes handle unmapped areas
correctly (bnc#864025 CVE-2014-0691).
- x86, fpu, amd: Clear exceptions in AMD FXSAVE workaround (bnc#858638 CVE-2014-1438).
- xencons: generalize use of add_preferred_console() (bnc#733022,
bnc#852652).
- balloon: don't crash in HVM-with-PoD guests.
- hwmon: (coretemp) Fix truncated name of alarm attributes.
- NFS: Avoid PUTROOTFH when managing leases (bnc#811746).
- cifs: delay super block destruction until all cifsFileInfo
objects are gone (bnc#862145).
</description>
participants (1)
-
root@hilbert.suse.de