<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="ddf0cfe0200a78301be8b1d7b78fb645"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="sdkp3-kernel-6641"
    timestamp="1257297667"
    engine="1.0">
  <yum:name>sdkp3-kernel</yum:name>
  <summary lang="en">Security update for Linux kernel</summary>
  <summary lang="de">Security update for Linux kernel</summary>
  <description lang="en">This update fixes various bugs and some security issues in
the SUSE Linux Enterprise 10 SP 3 kernel.

Following security issues were fixed: CVE-2009-3238: The
get_random_int function in drivers/char/random.c in the
Linux kernel produces insufficiently random numbers, which
allows attackers to predict the return value, and possibly
defeat protection mechanisms based on randomization, via
vectors that leverage the functions tendency to return the
same value over and over again for long stretches of time.

CVE-2009-1192: The (1) agp_generic_alloc_page and (2)
agp_generic_alloc_pages functions in
drivers/char/agp/generic.c in the agp subsystem in the
Linux kernel do not zero out pages that may later be
available to a user-space process, which allows local users
to obtain sensitive information by reading these pages.

CVE-2009-2909: Unsigned check in the ax25 socket handler
could allow local attackers to potentially crash the kernel
or even execute code.
</description>
  <description lang="de">This update fixes various bugs and some security issues in
the SUSE Linux Enterprise 10 SP 3 kernel.

Following security issues were fixed: CVE-2009-3238: The
get_random_int function in drivers/char/random.c in the
Linux kernel produces insufficiently random numbers, which
allows attackers to predict the return value, and possibly
defeat protection mechanisms based on randomization, via
vectors that leverage the functions tendency to return the
same value over and over again for long stretches of time.

CVE-2009-1192: The (1) agp_generic_alloc_page and (2)
agp_generic_alloc_pages functions in
drivers/char/agp/generic.c in the agp subsystem in the
Linux kernel do not zero out pages that may later be
available to a user-space process, which allows local users
to obtain sensitive information by reading these pages.

CVE-2009-2909: Unsigned check in the ax25 socket handler
could allow local attackers to potentially crash the kernel
or even execute code.
</description>
  <yum:version ver="6641" rel="0"/>
  <rpm:requires>
    <rpm:entry kind="atom" name="kernel-debug" epoch="0" ver="2.6.16.60" rel="0.57.1" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-kdump" epoch="0" ver="2.6.16.60" rel="0.57.1" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-xen" epoch="0" ver="2.6.16.60" rel="0.57.1" flags="EQ"/>
  </rpm:requires>
  <reboot-needed/>
  <category>security</category>
    <license-to-confirm>
This update can be used to install a new kernel.
 
If you decide to use the kernel update, we recommend that you reboot
your system upon completion of the YaST Online Update, as additional
kernel modules may be needed which can only be loaded after the system
is rebooted.

If you are in the course of performing a new installation, the installer
will reboot the machine after installing the patch. If you do not want 
to reboot, deselect this patch.
    </license-to-confirm>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-debug</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.57.1"/>
      <checksum type="sha" pkgid="YES">3507e2dc2580743efee87da3b49ca430a371d874</checksum>
      <time file="1257297859" build="1257297667"/>
      <size package="20261522" installed="89637416" archive="86487184"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-debug-2.6.16.60-0.57.1.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-debug" epoch="0" ver="2.6.16.60" rel="0.57.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-debug"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-kdump</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.57.1"/>
      <checksum type="sha" pkgid="YES">bf6c6d2c575d6f962ce6750cbadd1891dc5ee7dd</checksum>
      <time file="1257299194" build="1257298799"/>
      <size package="17549055" installed="64679988" archive="61529256"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-kdump-2.6.16.60-0.57.1.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-kdump" epoch="0" ver="2.6.16.60" rel="0.57.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-kdump"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-xen</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.57.1"/>
      <checksum type="sha" pkgid="YES">0b6be93daa891c28438b794b13310239ede43afd</checksum>
      <time file="1257300248" build="1257299766"/>
      <size package="19303184" installed="69150786" archive="65984568"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-xen-2.6.16.60-0.57.1.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-xen" epoch="0" ver="2.6.16.60" rel="0.57.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-xen"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
  </atoms>
</patch>
