File _patchinfo of Package patchinfo.1641

<patchinfo incident="1641">
  <packager>jeff_mahoney</packager>
  <issue tracker="bnc" id="808829">VUL-1: CVE-2013-0913: kernel: drm/i915 integer overflow</issue>
  <issue tracker="bnc" id="805633">VUL-0: CVE-2013-1763: kernel: local privilege escalation via sock_diag netlink socket</issue>
  <issue tracker="bnc" id="806138">VUL-1: CVE-2013-1767: kernel: tmpfs: use-after-free with mempolicy</issue>
  <issue tracker="bnc" id="806976">VUL-1:  CVE-2013-1774: kernel: usb: io_ti: NULL pointer dereference</issue>
  <issue tracker="bnc" id="802153">quota: quota_v2 not autoloaded when QFMT_VFS_V1 used</issue>
  <issue tracker="bnc" id="809330">OpenSUSE 12.3 telnet server: corrupt text on telnet client</issue>
  <issue tracker="bnc" id="809748">loopdev: deadlock between open and ioctl(LOOP_SET_CAPACITY)</issue>
  <issue tracker="bnc" id="792500">L3-Question: "Switching to clocksource hyperv_clocksource" - SLES 11 SP2 DomU hangs on boot on top of Citrix 6.0.2 version</issue>
  <issue tracker="bnc" id="813963">bootsplash broken on 3.0.67+</issue>
  <issue tracker="bnc" id="809155">VUL-1: CVE-2013-1848: kernel: format string exploit in ext3 super</issue>
  <issue tracker="bnc" id="806980">VUL-0: kvm:CVE-2013-1796, CVE-2013-1797,CVE-2013-1798: multiple buffer overflows</issue>
  <issue tracker="cve" id="CVE-2013-1763"></issue>
  <issue tracker="cve" id="CVE-2013-1767"></issue>
  <issue tracker="cve" id="CVE-2013-0913"></issue>
  <issue tracker="cve" id="CVE-2013-1796"></issue>
  <issue tracker="cve" id="CVE-2013-1797"></issue>
  <issue tracker="cve" id="CVE-2013-1774"></issue>
  <issue tracker="cve" id="CVE-2013-1848"></issue>
  <issue tracker="cve" id="CVE-2013-1798"></issue>
  <category>security</category>
  <rating>moderate</rating>
  <summary>kernel: Security and Bugfix update for 3.4.42</summary>
  <description>
Linux kernel was updated to kernel 3.4.42 fixing various bugs and security issues.

- Refresh patches.suse/SUSE-bootsplash.
  Fix bootsplash breakage due to stable fix (bnc#813963)

- Linux 3.4.39.
- kABI: protect struct tracer.

- Linux 3.4.38 (bnc#808829,CVE-2013-0913).
- patches.kabi/kabi-protect-struct-sk_buff.patch: kABI: protect struct sk_buff.
- patches.kabi/kabi-ipv4-remove-inclusion.patch: kABI: ipv4, remove inclusion.

- USB: io_ti: Fix NULL dereference in chase_port() (bnc#806976,
  CVE-2013-1774).

- Linux 3.4.37 (bnc#809155 bnc#809330 bnc#809748 CVE-2013-1848).
- Linux 3.4.36.

- KVM: Convert MSR_KVM_SYSTEM_TIME to use gfn_to_hva_cache_init
  (bnc#806980 CVE-2013-1797).
- KVM: Fix bounds checking in ioapic indirect register read
  (bnc#806980 CVE-2013-1798).
- KVM: Fix for buffer overflow in handling of MSR_KVM_SYSTEM_TIME
  (bnc#806980 CVE-2013-1796).
- kabi/severities: Allow kvm abi changes - kvm modules are self consistent

- loopdev: fix a deadlock (bnc#809748).
- block: use i_size_write() in bd_set_size() (bnc#809748).

- drm/i915: bounds check execbuffer relocation count
  (bnc#808829,CVE-2013-0913).

- TTY: do not reset master's packet mode (bnc#809330).

- Update patches.fixes/ext3-Fix-format-string-issues.patch
  (bnc#809155 CVE-2013-1848).

- ext3: Fix format string issues (bnc#809155).

- Linux 3.4.35 (bnc#802153).

- Linux 3.4.34 (CVE-2013-1763 CVE-2013-1767 bnc#792500 bnc#806138
  bnc#805633).

- tmpfs: fix use-after-free of mempolicy object (bnc#806138,
  CVE-2013-1767).
</description>
  <reboot_needed/>
</patchinfo>
openSUSE Build Service is sponsored by