Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
openSUSE:Maintenance:2529
patchinfo
_patchinfo
Overview
Details
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo
<patchinfo incident="2529"> <issue id="804950" tracker="bnc">cifs share not working correctly after update</issue> <issue id="840656" tracker="bnc">btrfs kernel BUG at fs/btrfs/extent-tree.c:6621!</issue> <issue id="805226" tracker="bnc">VUL-1: CVE-2013-0343: kernel: Linux kernel handling of IPv6 temporary addresses</issue> <issue id="840226" tracker="bnc">VUL-1 CVE-2013-4345: kernel: ansi_cprng.c error in random number generation</issue> <issue id="838024" tracker="bnc">NFS mount show id 4294967294 for some users.</issue> <issue id="854722" tracker="bnc">VUL-0: kernel: net: memory leak in recvmsg handler msg_name & msg_namelen logic</issue> <issue id="852559" tracker="bnc">VUL-1: CVE-2013-6378: kernel: libertas: Marvell 8xxx Libertas WLAN driver support vulnerable to denial of service</issue> <issue id="852558" tracker="bnc">VUL-1: CVE-2013-6383: kernel: Adaptec RAID controller driver could allow bypass operation restrictions</issue> <issue id="853051" tracker="bnc">VUL-1: CVE-2013-6367: kernel: kvm: division by zero in apic_get_tmcct()</issue> <issue id="853050" tracker="bnc">VUL-1: CVE-2013-4587: kernel: kvm: rtc_status.dest_map out-of-bounds access</issue> <issue id="853053" tracker="bnc">VUL-1: CVE-2013-6376: kernel: kvm: BUG_ON() in apic_cluster_id()</issue> <issue id="853052" tracker="bnc">VUL-1: CVE-2013-6368: kernel: kvm: cross page vapic_addr access</issue> <issue id="825006" tracker="bnc">VUL-1: CVE-2013-2146: kernel: perf/x86: offcore_rsp valid mask for SNB/IVB</issue> <issue id="808358" tracker="bnc">VUL-1: kernel: CVE-2013-1792 Linux kernel: KEYS: race with concurrent install_user_keyrings()</issue> <issue id="849034" tracker="bnc">VUL-1: CVE-2013-4515: kernel: staging/bcm: kernel memory disclosure via uninitialized structure members</issue> <issue id="854173" tracker="bnc">VUL-1: CVE-2013-6431: kernel: net: fib: fib6_add: potential NULL pointer dereference</issue> <issue id="854634" tracker="bnc">VUL-1: CVE-2013-7027: kernel: wireless: radiotap: fix parsing buffer overrun</issue> <issue id="848079" tracker="bnc">VUL-1: CVE-2013-4348: kernel: endless loop in skb_flow_dissect</issue> <issue id="831836" tracker="bnc">unable to override DSDT</issue> <issue id="849362" tracker="bnc">VUL-1: CVE-2013-2930: kernel: perf/ftrace local user crash</issue> <issue id="811746" tracker="bnc">nfs-kernel bug on 12.3 on X86_64</issue> <issue id="852373" tracker="bnc">VUL-1: CVE-2013-6380: kernel: aacraid: aacraid: invalid pointer dereference</issue> <issue id="844513" tracker="bnc">Broken MSI and MSI-X interrupt remapping on Intel 55XX chipsets</issue> <issue id="849023" tracker="bnc">VUL-1: CVE-2013-4513: kernel: staging/ozwpan: buffer overflow in write syscall</issue> <issue id="860993" tracker="bnc">VUL-0: EMBARGOED: CVE-2014-0038: kernel: 3.4+: arbitrary write with CONFIG_X86_X32</issue> <issue id="849021" tracker="bnc">VUL-0: CVE-2013-4511: kernel: mapping of physical memory to user space without proper size check</issue> <issue id="848255" tracker="bnc">usb device freezes usb host?!?</issue> <issue id="849029" tracker="bnc">VUL-1: CVE-2013-4514: kernel: staging/wlags49_h2: buffer overflow when setting station name</issue> <issue id="CVE-2013-1792" tracker="cve" /> <issue id="CVE-2013-4587" tracker="cve" /> <issue id="CVE-2013-6367" tracker="cve" /> <issue id="CVE-2013-6376" tracker="cve" /> <issue id="CVE-2014-0038" tracker="cve" /> <issue id="CVE-2013-6368" tracker="cve" /> <issue id="CVE-2013-4514" tracker="cve" /> <issue id="CVE-2013-6380" tracker="cve" /> <issue id="CVE-2013-7027" tracker="cve" /> <issue id="CVE-2013-4348" tracker="cve" /> <issue id="CVE-2013-4513" tracker="cve" /> <issue id="CVE-2013-4511" tracker="cve" /> <issue id="CVE-2013-4515" tracker="cve" /> <issue id="CVE-2013-6378" tracker="cve" /> <issue id="CVE-2013-0343" tracker="cve" /> <issue id="CVE-2013-6431" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>msmeissn</packager> <description> The Linux kernel was updated to fix various bugs and security issues: - mm/page-writeback.c: do not count anon pages as dirtyable memory (reclaim stalls). - mm/page-writeback.c: fix dirty_balance_reserve subtraction from dirtyable memory (reclaim stalls). - compat_sys_recvmmsg X32 fix (bnc#860993 CVE-2014-0038). - hwmon: (coretemp) Fix truncated name of alarm attributes - net: fib: fib6_add: fix potential NULL pointer dereference (bnc#854173 CVE-2013-6431). - keys: fix race with concurrent install_user_keyrings() (bnc#808358)(CVE-2013-1792). - KVM: x86: Convert vapic synchronization to _cached functions (CVE-2013-6368) (bnc#853052 CVE-2013-6368). - wireless: radiotap: fix parsing buffer overrun (bnc#854634 CVE-2013-7027). - KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376) (bnc#853053 CVE-2013-6376). - KVM: x86: Fix potential divide by 0 in lapic (CVE-2013-6367) (bnc#853051 CVE-2013-6367). - KVM: Improve create VCPU parameter (CVE-2013-4587) (bnc#853050 CVE-2013-4587). - staging: ozwpan: prevent overflow in oz_cdev_write() (bnc#849023 CVE-2013-4513). - perf/x86: Fix offcore_rsp valid mask for SNB/IVB (bnc#825006). - perf/x86: Add Intel IvyBridge event scheduling constraints (bnc#825006). - libertas: potential oops in debugfs (bnc#852559 CVE-2013-6378). - aacraid: prevent invalid pointer dereference (bnc#852373 CVE-2013-6380). - staging: wlags49_h2: buffer overflow setting station name (bnc#849029 CVE-2013-4514). - net: flow_dissector: fail on evil iph->ihl (bnc#848079 CVE-2013-4348). - Staging: bcm: info leak in ioctl (bnc#849034 CVE-2013-4515). - Refresh patches.fixes/net-rework-recvmsg-handler-msg_name-and-msg_namelen-logic.patch. - ipv6: remove max_addresses check from ipv6_create_tempaddr (bnc#805226, CVE-2013-0343). - net: rework recvmsg handler msg_name and msg_namelen logic (bnc#854722). - crypto: ansi_cprng - Fix off by one error in non-block size request (bnc#840226). - x6: Fix reserve_initrd so that acpi_initrd_override is reached (bnc#831836). - Refresh other Xen patches. - aacraid: missing capable() check in compat ioctl (bnc#852558). - patches.fixes/gpio-ich-fix-ichx_gpio_check_available-return.patch: Update upstream reference - perf/ftrace: Fix paranoid level for enabling function tracer (bnc#849362). - xhci: fix null pointer dereference on ring_doorbell_for_active_rings (bnc#848255). - xhci: Fix oops happening after address device timeout (bnc#848255). - xhci: Ensure a command structure points to the correct trb on the command ring (bnc#848255). - patches.arch/iommu-vt-d-remove-stack-trace-from-broken-irq-remapping-warning.patch: Update upstream reference. - Allow NFSv4 username mapping to work properly (bnc#838024). - Refresh btrfs attribute publishing patchset to match openSUSE-13.1 No user-visible changes, but uses kobj_sysfs_ops and better kobject lifetime management. - Fix a few incorrectly checked [io_]remap_pfn_range() calls (bnc#849021, CVE-2013-4511). - drm/radeon: don't set hpd, afmt interrupts when interrupts are disabled. - patches.fixes/cifs-fill-TRANS2_QUERY_FILE_INFO-ByteCount-fields.patch: Fix TRANS2_QUERY_FILE_INFO ByteCount fields (bnc#804950). - iommu: Remove stack trace from broken irq remapping warning (bnc#844513). - Disable patches related to bnc#840656 patches.suse/btrfs-cleanup-don-t-check-the-same-thing-twice patches.suse/btrfs-0220-fix-for-patch-cleanup-don-t-check-the-same-thi.patch - btrfs: use feature attribute names to print better error messages. - btrfs: add ability to change features via sysfs. - btrfs: add publishing of unknown features in sysfs. - btrfs: publish per-super features to sysfs. - btrfs: add per-super attributes to sysfs. - btrfs: export supported featured to sysfs. - kobject: introduce kobj_completion. - btrfs: add ioctls to query/change feature bits online. - btrfs: use btrfs_commit_transaction when setting fslabel. - x86/iommu/vt-d: Expand interrupt remapping quirk to cover x58 chipset (bnc#844513). - NFSv4: Fix issues in nfs4_discover_server_trunking (bnc#811746). - iommu/vt-d: add quirk for broken interrupt remapping on 55XX chipsets (bnc#844513). </description> <summary>kernel: security and bugfix update</summary> <reboot_needed/> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor