Verfasst: 23.02.2013, 22:04
Linux kernel updat to 3.4.28
Diese Aktualisierung wird für eine Behebung eines mit dem Paket verbundenen Sicherheitsrisikos benötigt.
The Linux kernel was updated to 3.4.28 fixing various bugs
and security issues.
Following bugs were fixed:
- sysctl: Fixed vm.dirty_ratio sysctl name for desktop flavors
- bridge: Pull ip header into skb->data before looking into ip header (bnc#799209).
- x86: Hyper-V: register clocksource only if its advertised (bnc#792500).
- patches.fixes/thp-memcg-split-hugepage-for-memcg-oom-on-cow.patch:
thp, memcg: split hugepage for memcg oom on cow (bnc#793671).
- x86-64: fix hypercall page unwind info.
- frontends: handle backend CLOSED without CLOSING.
- xenbus: fix overflow check in xenbus_dev_write().
- x86: don't corrupt %eip when returning from a signal handler.
- Update Xen patches to 3.4.19.
- rpm/kernel-binary.spec.in: Do not remove fillup from the buildsystem (bnc#781327)
- rpm/config.sh: Set ARM project for IBS
- Refresh patches.xen/xen-x86-EFI (fix build after update to 3.4.17).
- ARM: Update config files: omap2plus: Set omapdrm as =y to allow for console=tty
- rpm/config.sh: Add openSUSE:12.2:ARM:Update OBS project
- ARM: Update config files: Disable HVC_DCC, refresh config files
- fix mmc on vexpress (kernel-default on armv7hl) for 3.4.
- rpm/kernel-binary.spec.in: Require coreutils in kernel-*-devel(bnc#783615)
- ARM: Update config files: Fix default config
- ARM: Update config files: Fix default config to work with vexpress
- Btrfs: fix enospc problems when deleting a subvol
- btrfs: enospc debugging messages
- ALSA: hda - Fix silent headphone output from Toshiba P200 (bnc#569991).
- ALSA: hda - Add inv-dmic model to possible Realtek codecs (bnc#569991).
- ALSA: hda - Add inverted mic quirks for Asus U41SV, Acer 1810TZ and AOD260 (bnc#569991).
- ALSA: hda - Add the inverted digital mic workaround to Realtek codecs (bnc#569991).
- rpm/kernel-binary.spec.in: Use a macro instead of /etc/IGNORE-KABI-BADNESS
- rpm/kernel-binary.spec.in: Also check for /etc/IGNORE-KABI-BADNESS file
This allows to control the kabi checker from outside of the package.
- memcg: oom: fix totalpages calculation for swappiness==0 (bnc#783965).
- ext4: completed_io locking cleanup.
- ext4: endless truncate due to nonlocked dio readers.
- ext4: ext4_inode_info diet.
- ext4: fix ext4_flush_completed_IO wait semantics.
- ext4: fix ext_remove_space for punch_hole case.
- ext4: fix unwritten counter leakage.
- ext4: give i_aiodio_unwritten a more appropriate name.
- ext4: punch_hole should wait for DIO writers.
- ext4: race-condition protection for
- ext4_convert_unwritten_extents_endio.
- ext4: serialize dio nonlocked reads with defrag workers.
- ext4: serialize fallocate with ext4_convert_unwritten_extents.
- ext4: serialize unlocked dio reads with truncate.
- x86/kbuild: archscripts depends on scripts_basic.
- kbuild: Fix gcc -x syntax (bnc#773831).
- Disable hyper-v patch to avoid kABI changes:
Drivers: hv: Explicitly size elements of protocol structures
- Hyper-V KVP IP injection (fate#31441)
- drivers: net: Remove casts to same type.
- drivers: hv: remove IRQF_SAMPLE_RANDOM which is now a no-op.
- hyperv: Move wait completion msg code into rndis_filter_halt_device().
- hyperv: Add comments for the extended buffer after RNDIS message.
- Drivers: hv: Cleanup the guest ID computation.
- Drivers: hv: vmbus: Use the standard format string to format GUIDs.
- Drivers: hv: Add KVP definitions for IP address injection.
- Drivers: hv: kvp: Cleanup error handling in KVP.
- Drivers: hv: Explicitly size elements of protocol structures.
- Drivers: hv: kvp: Support the new IP injection messages.
- Tools: hv: Prepare to expand kvp_get_ip_address() functionality.
- Tools: hv: Further refactor kvp_get_ip_address().
- Tools: hv: Gather address family information.
- Tools: hv: Gather subnet information.
- Tools: hv: Represent the ipv6 mask using CIDR notation.
- Tools: hv: Gather ipv[4,6] gateway information.
- hv: fail the probing immediately when we are not in hyperv platform.
- hv: vmbus_drv: detect hyperv through x86_hyper.
- Tools: hv: Get rid of some unused variables.
- Tools: hv: Correctly type string variables.
- Tools: hv: Add an example script to retrieve DNS entries.
- Tools: hv: Gather DNS information.
- Drivers: hv: kvp: Copy the address family information.
- Tools: hv: Add an example script to retrieve dhcp state.
- Tools: hv: Gather DHCP information.
- Tools: hv: Add an example script to configure an interface.
- Tools: hv: Implement the KVP verb - KVP_OP_SET_IP_INFO.
- Tools: hv: Rename the function kvp_get_ip_address().
- Tools: hv: Implement the KVP verb - KVP_OP_GET_IP_INFO.
- tools/hv: Fix file handle leak.
- tools/hv: Fix exit() error code.
- tools/hv: Check for read/write errors.
- tools/hv: Parse /etc/os-release.
- hyperv: Fix the max_xfer_size in RNDIS initialization.
- hyperv: Fix the missing return value in rndis_filter_set_packet_filter().
- hyperv: Fix page buffer handling in rndis_filter_send_request().
- hyperv: Remove extra allocated space for recv_pkt_list elements.
- hyperv: Report actual status in receive completion packet.
- hyperv: Add buffer for extended info after the RNDIS response message.
- rpm/kernel-binary.spec.in: enable Conflicts for apparmor, udev and lvm2 also for vanilla kernel
- rpm/kernel-binary.spec.in: add Conflicht: hyper-v to make sure the daemon is in sync with the kernel (bnc#770763 , fate#314441)
Weitere Informationen zu den Fehlerbereinigungen dieser Aktualisierung sind auf diesen Webseiten verfügbar:
• https://bugzilla.novell.com/show_bug.cgi?id=569991
• https://bugzilla.novell.com/show_bug.cgi?id=770763
• https://bugzilla.novell.com/show_bug.cgi?id=771392
• https://bugzilla.novell.com/show_bug.cgi?id=773831
• https://bugzilla.novell.com/show_bug.cgi?id=774859
• https://bugzilla.novell.com/show_bug.cgi?id=776925
• https://bugzilla.novell.com/show_bug.cgi?id=778630
• https://bugzilla.novell.com/show_bug.cgi?id=780624
• https://bugzilla.novell.com/show_bug.cgi?id=781327
• https://bugzilla.novell.com/show_bug.cgi?id=783615
• https://bugzilla.novell.com/show_bug.cgi?id=783965
• https://bugzilla.novell.com/show_bug.cgi?id=784192
• https://bugzilla.novell.com/show_bug.cgi?id=792500
• https://bugzilla.novell.com/show_bug.cgi?id=793671
• https://bugzilla.novell.com/show_bug.cgi?id=799209
Weitere Informationen zu dieser Sicherheitsaktualisierung sind auf diesen Webseiten verfügbar:
• http://cve.mitre.org/cgi-bin/cvename.cg ... -2012-3520
Veraltete Pakete:
/• kernel-desktop - 3.4.6-2.10.1
/• kernel-desktop - 3.4.11-2.16.1
/• kernel-desktop - 3.4.6-2.10.1
/• kernel-desktop - 3.4.11-2.16.1
/• kernel-desktop - 3.4.11-2.16.1
Diese Aktualisierung wird für eine Behebung eines mit dem Paket verbundenen Sicherheitsrisikos benötigt.
The Linux kernel was updated to 3.4.28 fixing various bugs
and security issues.
Following bugs were fixed:
- sysctl: Fixed vm.dirty_ratio sysctl name for desktop flavors
- bridge: Pull ip header into skb->data before looking into ip header (bnc#799209).
- x86: Hyper-V: register clocksource only if its advertised (bnc#792500).
- patches.fixes/thp-memcg-split-hugepage-for-memcg-oom-on-cow.patch:
thp, memcg: split hugepage for memcg oom on cow (bnc#793671).
- x86-64: fix hypercall page unwind info.
- frontends: handle backend CLOSED without CLOSING.
- xenbus: fix overflow check in xenbus_dev_write().
- x86: don't corrupt %eip when returning from a signal handler.
- Update Xen patches to 3.4.19.
- rpm/kernel-binary.spec.in: Do not remove fillup from the buildsystem (bnc#781327)
- rpm/config.sh: Set ARM project for IBS
- Refresh patches.xen/xen-x86-EFI (fix build after update to 3.4.17).
- ARM: Update config files: omap2plus: Set omapdrm as =y to allow for console=tty
- rpm/config.sh: Add openSUSE:12.2:ARM:Update OBS project
- ARM: Update config files: Disable HVC_DCC, refresh config files
- fix mmc on vexpress (kernel-default on armv7hl) for 3.4.
- rpm/kernel-binary.spec.in: Require coreutils in kernel-*-devel(bnc#783615)
- ARM: Update config files: Fix default config
- ARM: Update config files: Fix default config to work with vexpress
- Btrfs: fix enospc problems when deleting a subvol
- btrfs: enospc debugging messages
- ALSA: hda - Fix silent headphone output from Toshiba P200 (bnc#569991).
- ALSA: hda - Add inv-dmic model to possible Realtek codecs (bnc#569991).
- ALSA: hda - Add inverted mic quirks for Asus U41SV, Acer 1810TZ and AOD260 (bnc#569991).
- ALSA: hda - Add the inverted digital mic workaround to Realtek codecs (bnc#569991).
- rpm/kernel-binary.spec.in: Use a macro instead of /etc/IGNORE-KABI-BADNESS
- rpm/kernel-binary.spec.in: Also check for /etc/IGNORE-KABI-BADNESS file
This allows to control the kabi checker from outside of the package.
- memcg: oom: fix totalpages calculation for swappiness==0 (bnc#783965).
- ext4: completed_io locking cleanup.
- ext4: endless truncate due to nonlocked dio readers.
- ext4: ext4_inode_info diet.
- ext4: fix ext4_flush_completed_IO wait semantics.
- ext4: fix ext_remove_space for punch_hole case.
- ext4: fix unwritten counter leakage.
- ext4: give i_aiodio_unwritten a more appropriate name.
- ext4: punch_hole should wait for DIO writers.
- ext4: race-condition protection for
- ext4_convert_unwritten_extents_endio.
- ext4: serialize dio nonlocked reads with defrag workers.
- ext4: serialize fallocate with ext4_convert_unwritten_extents.
- ext4: serialize unlocked dio reads with truncate.
- x86/kbuild: archscripts depends on scripts_basic.
- kbuild: Fix gcc -x syntax (bnc#773831).
- Disable hyper-v patch to avoid kABI changes:
Drivers: hv: Explicitly size elements of protocol structures
- Hyper-V KVP IP injection (fate#31441)
- drivers: net: Remove casts to same type.
- drivers: hv: remove IRQF_SAMPLE_RANDOM which is now a no-op.
- hyperv: Move wait completion msg code into rndis_filter_halt_device().
- hyperv: Add comments for the extended buffer after RNDIS message.
- Drivers: hv: Cleanup the guest ID computation.
- Drivers: hv: vmbus: Use the standard format string to format GUIDs.
- Drivers: hv: Add KVP definitions for IP address injection.
- Drivers: hv: kvp: Cleanup error handling in KVP.
- Drivers: hv: Explicitly size elements of protocol structures.
- Drivers: hv: kvp: Support the new IP injection messages.
- Tools: hv: Prepare to expand kvp_get_ip_address() functionality.
- Tools: hv: Further refactor kvp_get_ip_address().
- Tools: hv: Gather address family information.
- Tools: hv: Gather subnet information.
- Tools: hv: Represent the ipv6 mask using CIDR notation.
- Tools: hv: Gather ipv[4,6] gateway information.
- hv: fail the probing immediately when we are not in hyperv platform.
- hv: vmbus_drv: detect hyperv through x86_hyper.
- Tools: hv: Get rid of some unused variables.
- Tools: hv: Correctly type string variables.
- Tools: hv: Add an example script to retrieve DNS entries.
- Tools: hv: Gather DNS information.
- Drivers: hv: kvp: Copy the address family information.
- Tools: hv: Add an example script to retrieve dhcp state.
- Tools: hv: Gather DHCP information.
- Tools: hv: Add an example script to configure an interface.
- Tools: hv: Implement the KVP verb - KVP_OP_SET_IP_INFO.
- Tools: hv: Rename the function kvp_get_ip_address().
- Tools: hv: Implement the KVP verb - KVP_OP_GET_IP_INFO.
- tools/hv: Fix file handle leak.
- tools/hv: Fix exit() error code.
- tools/hv: Check for read/write errors.
- tools/hv: Parse /etc/os-release.
- hyperv: Fix the max_xfer_size in RNDIS initialization.
- hyperv: Fix the missing return value in rndis_filter_set_packet_filter().
- hyperv: Fix page buffer handling in rndis_filter_send_request().
- hyperv: Remove extra allocated space for recv_pkt_list elements.
- hyperv: Report actual status in receive completion packet.
- hyperv: Add buffer for extended info after the RNDIS response message.
- rpm/kernel-binary.spec.in: enable Conflicts for apparmor, udev and lvm2 also for vanilla kernel
- rpm/kernel-binary.spec.in: add Conflicht: hyper-v to make sure the daemon is in sync with the kernel (bnc#770763 , fate#314441)
Weitere Informationen zu den Fehlerbereinigungen dieser Aktualisierung sind auf diesen Webseiten verfügbar:
• https://bugzilla.novell.com/show_bug.cgi?id=569991
• https://bugzilla.novell.com/show_bug.cgi?id=770763
• https://bugzilla.novell.com/show_bug.cgi?id=771392
• https://bugzilla.novell.com/show_bug.cgi?id=773831
• https://bugzilla.novell.com/show_bug.cgi?id=774859
• https://bugzilla.novell.com/show_bug.cgi?id=776925
• https://bugzilla.novell.com/show_bug.cgi?id=778630
• https://bugzilla.novell.com/show_bug.cgi?id=780624
• https://bugzilla.novell.com/show_bug.cgi?id=781327
• https://bugzilla.novell.com/show_bug.cgi?id=783615
• https://bugzilla.novell.com/show_bug.cgi?id=783965
• https://bugzilla.novell.com/show_bug.cgi?id=784192
• https://bugzilla.novell.com/show_bug.cgi?id=792500
• https://bugzilla.novell.com/show_bug.cgi?id=793671
• https://bugzilla.novell.com/show_bug.cgi?id=799209
Weitere Informationen zu dieser Sicherheitsaktualisierung sind auf diesen Webseiten verfügbar:
• http://cve.mitre.org/cgi-bin/cvename.cg ... -2012-3520
Veraltete Pakete:
/• kernel-desktop - 3.4.6-2.10.1
/• kernel-desktop - 3.4.11-2.16.1
/• kernel-desktop - 3.4.6-2.10.1
/• kernel-desktop - 3.4.11-2.16.1
/• kernel-desktop - 3.4.11-2.16.1