kernel: security and bugfix update

The Linux kernel was updated to fix various bugs and security issues:

CVE-2013-0871: Race condition in the ptrace functionality in the Linux
kernel allowed local users to gain privileges via a PTRACE_SETREGS ptrace
system call in a crafted application, as demonstrated by ptrace_death.

CVE-2013-0160: Avoid a side channel attack on /dev/ptmx (keyboard input
timing).

CVE-2012-5374: Fixed a local denial of service in the BTRFS hashing code.

CVE-2013-0309: arch/x86/include/asm/pgtable.h in the Linux kernel, when
transparent huge pages are used, does not properly support PROT_NONE
memory regions, which allows local users to cause a denial of service
(system crash) via a crafted application.

CVE-2013-0268: The msr_open function in arch/x86/kernel/msr.c in the Linux
kernel allowed local users to bypass intended capability restrictions
by executing a crafted application as root, as demonstrated by msr32.c.

CVE-2012-0957: The override_release function in kernel/sys.c in the
Linux kernel allowed local users to obtain sensitive information from
kernel stack memory via a uname system call in conjunction with a
UNAME26 personality.

CVE-2013-0216: The Xen netback functionality in the Linux kernel allowed
guest OS users to cause a denial of service (loop) by triggering ring
pointer corruption.

CVE-2013-0231: The pciback_enable_msi function in the PCI backend driver
(drivers/xen/pciback/conf_space_capability_msi.c) in Xen for the Linux
kernel allowed guest OS users with PCI device access to cause a denial
of service via a large number of kernel log messages. NOTE: some of
these details are obtained from third party information.

CVE-2012-4530: The load_script function in fs/binfmt_script.c in the
Linux kernel did not properly handle recursion, which allowed local
users to obtain sensitive information from kernel stack memory via a
crafted application.

CVE-2012-4508: Race condition in fs/ext4/extents.c in the Linux kernel
allowed local users to obtain sensitive information from a deleted file
by reading an extent that was not properly marked as uninitialized.

CVE-2012-3412: The sfc (aka Solarflare Solarstorm) driver in the Linux
kernel allowed remote attackers to cause a denial of service (DMA
descriptor consumption and network-controller outage) via crafted TCP
packets that trigger a small MSS value.

CVE-2012-2745: The copy_creds function in kernel/cred.c in the Linux
kernel provided an invalid replacement session keyring to a child process,
which allowed local users to cause a denial of service (panic) via a
crafted application that uses the fork system call.

CVE-2012-3375: The epoll_ctl system call in fs/eventpoll.c in the Linux
kernel did not properly handle ELOOP errors in EPOLL_CTL_ADD operations,
which allowed local users to cause a denial of service (file-descriptor
consumption and system crash) via a crafted application that attempts
to create a circular epoll dependency.

CVE-2012-3400: Heap-based buffer overflow in the udf_load_logicalvol
function in fs/udf/super.c in the Linux kernel allowed remote attackers
to cause a denial of service (system crash) or possibly have unspecified
other impact via a crafted UDF filesystem.

Fixed bugs
bnc#714906
bnx2x fails in kdump environment
bnc#720226
Possible source for Touchpad failures - please check it out
bnc#733148
wlan non-functional. Kernel-firmware not installed with openSUSE-12.1-DVD-i586.iso
bnc#755546
SBT740:Juno-IOC-L:cougarfsp:cougarp01:EEH recovery failed on Rains-LP (be2net/Emulex)
bnc#762693
deadlock in reiserfs code
bnc#765524
Bug in the new package of xf86-input-synaptics
bnc#768506
Region to disable clickpad is unfunctional (regression)
bnc#769784
VUL-1: kernel: udf filesystem logical volume descriptor overflows
bnc#769896
VUL-0: kernel: crash in epoll()
bnc#770695
VUL-1: kernel: CVE-2012-2745: local denial of service (crash) in keymanagement
bnc#773406
Wrong vfree() in bootsplash.c
bnc#773831
miscompilation increases CPU load and backup time by factor 10 when latencytop is enabled
bnc#774285
reiserfs: deadlocks when using journaled quotas
bnc#774523
VUL-1: kernel: sfc: threats for DOS attacks in linux ethernet( sfc) driver
bnc#774859
net/core/dev.c disables scatter/gather
bnc#776144
TCP delayed ACK causes massive NFS performance breakdown with NetApp filer
bnc#778630
nbd: some I/O requests never completed or freed
bnc#779432
kernel panic when mounting btrfs filesystem in free-space-cache.c
bnc#781134
prepare memory cgroup controller for full hierarchy mode
bnc#783515
VUL-1: CVE-2012-0957: kernel: UNAME26 personality leaks kernel memory
bnc#784192
VUL-1: CVE-2012-4508: kernel: Information leak for ext4 due to race condition AIO/DIO vs fallocate (ext4 fs stale bug)
bnc#786013
VUL-1: CVE-2012-4530: kernel: stack disclosure in binfmt_script load_script()
bnc#787168
VLANS using IGB-Driver are broken
bnc#792500
L3-Question: "Switching to clocksource hyperv_clocksource" - SLES 11 SP2 DomU hangs on boot on top of Citrix 6.0.2 version
bnc#793671
memcg charge failure might leak out leading to a global OOM
bnc#797175
VUL-1: kernel: /dev/ptmx timing attacks
bnc#799209
Newer Emulex be2net drivers need upstream bridge patch
bnc#800280
VUL-0: XSA-39: CVE-2013-0216 CVE-2013-0217: xen: netback DoS via malicious guest ring
bnc#801178
VUL-0: Xen: XSA-43: CVE-2013-0231: Linux pciback DoS via not rate limited log messages
bnc#801782
[HP BCS SLES11 ]: Stack overflow in __reserve_region_with_split
bnc#802153
quota: quota_v2 not autoloaded when QFMT_VFS_V1 used
bnc#802642
VUL-1: CVE-2013-0268: kernel: code exec via /dev/cpu/*/msr
bnc#804154
VUL-0: CVE-2013-0871: kernel: stack corruption via PTRACE_SETREGS (potential code execution)
bnc#804652
VUL-1: CVE-2013-0309: kernel: mm: thp: pmd_present and PROT_NONE local DoS
bnc#804738
VUL-1: CVE-2012-5374: kernel: btrfs: denial of service via CRC32C computational overflowing
Selected Binaries
openSUSE Build Service is sponsored by