<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="7ab8659e9762f6aa1d31509f781cf439"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="sdkp3-kernel-6778"
    timestamp="1263556835"
    engine="1.0">
  <yum:name>sdkp3-kernel</yum:name>
  <summary lang="en">Security update for the debug kernel</summary>
  <summary lang="de">Security update for the debug kernel</summary>
  <description lang="en">
This update fixes various bugs and some security issues in the SUSE Linux
Enterprise 10 SP 3 kernel.



Following security issues were fixed:



 CVE-2009-4536: drivers/net/e1000/e1000_main.c in the e1000 driver in the
Linux kernel handles Ethernet frames that exceed the MTU by processing
certain trailing payload data as if it were a complete frame, which
allows remote attackers to bypass packet filters via a large packet with
a crafted payload.

 CVE-2009-4538: drivers/net/e1000e/netdev.c in the e1000e driver in the
Linux kernel does not properly check the size of an Ethernet frame that
exceeds the MTU, which allows remote attackers to have an unspecified
impact via crafted packets.

 CVE-2010-0007: Missing CAP_NET_ADMIN checks in the ebtables netfilter
code might have allowed local attackers to modify bridge firewall
settings.


</description>
  <description lang="de">This update fixes various bugs and some security issues in
the SUSE Linux Enterprise 10 SP 3 kernel.

Following security issues were fixed: CVE-2009-4536:
drivers/net/e1000/e1000_main.c in the e1000 driver in the
Linux kernel handles Ethernet frames that exceed the MTU by
processing certain trailing payload data as if it were a
complete frame, which allows remote attackers to bypass
packet filters via a large packet with a crafted payload.

CVE-2009-4538: drivers/net/e1000e/netdev.c in the e1000e
driver in the Linux kernel does not properly check the size
of an Ethernet frame that exceeds the MTU, which allows
remote attackers to have an unspecified impact via crafted
packets.

CVE-2010-0007: Missing CAP_NET_ADMIN checks in the ebtables
netfilter code might have allowed local attackers to modify
bridge firewall settings.
</description>
  <yum:version ver="6778" rel="0"/>
  <rpm:requires>
    <rpm:entry kind="atom" name="kernel-debug" epoch="0" ver="2.6.16.60" rel="0.59.1" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-kdump" epoch="0" ver="2.6.16.60" rel="0.59.1" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-xen" epoch="0" ver="2.6.16.60" rel="0.59.1" flags="EQ"/>
  </rpm:requires>
  <reboot-needed/>
  <category>security</category>
    <license-to-confirm>
This update can be used to install a new kernel.
 
If you decide to use the kernel update, we recommend that you reboot
your system upon completion of the YaST Online Update, as additional
kernel modules may be needed which can only be loaded after the system
is rebooted.

If you are in the course of performing a new installation, the installer
will reboot the machine after installing the patch. If you do not want 
to reboot, deselect this patch.
    </license-to-confirm>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-debug</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.59.1"/>
      <checksum type="sha" pkgid="YES">4ef640db0e525e64bb60d1fa84e466c375c0f8d7</checksum>
      <time file="1263557136" build="1263556835"/>
      <size package="20274284" installed="89643253" archive="86493208"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-debug-2.6.16.60-0.59.1.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-debug" epoch="0" ver="2.6.16.60" rel="0.59.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-debug"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-kdump</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.59.1"/>
      <checksum type="sha" pkgid="YES">cb85d5ff4fd2aa625e533dbc9eeab20f2060820e</checksum>
      <time file="1263556681" build="1263556460"/>
      <size package="17564253" installed="64686462" archive="61535920"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-kdump-2.6.16.60-0.59.1.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-kdump" epoch="0" ver="2.6.16.60" rel="0.59.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-kdump"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-xen</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.59.1"/>
      <checksum type="sha" pkgid="YES">c2870d8816810e5d249aeae973be259c54af3a27</checksum>
      <time file="1263556627" build="1263556413"/>
      <size package="19330211" installed="69167630" archive="66001444"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-xen-2.6.16.60-0.59.1.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-xen" epoch="0" ver="2.6.16.60" rel="0.59.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-xen"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
  </atoms>
</patch>
