<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="14d206b16e1f6db4bc74003f9d937ed2"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="sdkp2-kernel-5924"
    timestamp="1232333616"
    engine="1.0">
  <yum:name>sdkp2-kernel</yum:name>
  <summary lang="en">Security update for Linux kernel</summary>
  <summary lang="de">Security update for Linux kernel</summary>
  <description lang="en">The SUSE Linux Enterprise 10 Service Pack 2 kernel was
updated to fix some security issues and various bugs.

The following security problems have been fixed:

CVE-2008-5079: net/atm/svc.c in the ATM subsystem allowed
local users to cause a denial of service (kernel infinite
loop) by making two calls to svc_listen for the same
socket, and then reading a /proc/net/atm/ *vc file, related
to corruption of the vcc table.

CVE-2008-5029: The __scm_destroy function in net/core/scm.c
makes indirect recursive calls to itself through calls to
the fput function, which allows local users to cause a
denial of service (panic) via vectors related to sending an
SCM_RIGHTS message through a UNIX domain socket and closing
file descriptors.

CVE-2008-4933: Buffer overflow in the hfsplus_find_cat
function in fs/hfsplus/catalog.c allowed attackers to cause
a denial of service (memory corruption or system crash) via
an hfsplus filesystem image with an invalid catalog
namelength field, related to the hfsplus_cat_build_key_uni
function.

CVE-2008-5025: Stack-based buffer overflow in the
hfs_cat_find_brec function in fs/hfs/catalog.c allowed
attackers to cause a denial of service (memory corruption
or system crash) via an hfs filesystem image with an
invalid catalog namelength field, a related issue to
CVE-2008-4933.

CVE-2008-5182: The inotify functionality might allow local
users to gain privileges via unknown vectors related to
race conditions in inotify watch removal and umount.


A lot of other bugs were fixed, a detailed list can be
found in the RPM changelog.
</description>
  <description lang="de">The SUSE Linux Enterprise 10 Service Pack 2 kernel was
updated to fix some security issues and various bugs.

The following security problems have been fixed:

CVE-2008-5079: net/atm/svc.c in the ATM subsystem allowed
local users to cause a denial of service (kernel infinite
loop) by making two calls to svc_listen for the same
socket, and then reading a /proc/net/atm/ *vc file, related
to corruption of the vcc table.

CVE-2008-5029: The __scm_destroy function in net/core/scm.c
makes indirect recursive calls to itself through calls to
the fput function, which allows local users to cause a
denial of service (panic) via vectors related to sending an
SCM_RIGHTS message through a UNIX domain socket and closing
file descriptors.

CVE-2008-4933: Buffer overflow in the hfsplus_find_cat
function in fs/hfsplus/catalog.c allowed attackers to cause
a denial of service (memory corruption or system crash) via
an hfsplus filesystem image with an invalid catalog
namelength field, related to the hfsplus_cat_build_key_uni
function.

CVE-2008-5025: Stack-based buffer overflow in the
hfs_cat_find_brec function in fs/hfs/catalog.c allowed
attackers to cause a denial of service (memory corruption
or system crash) via an hfs filesystem image with an
invalid catalog namelength field, a related issue to
CVE-2008-4933.

CVE-2008-5182: The inotify functionality might allow local
users to gain privileges via unknown vectors related to
race conditions in inotify watch removal and umount.


A lot of other bugs were fixed, a detailed list can be
found in the RPM changelog.
</description>
  <yum:version ver="5924" rel="0"/>
  <rpm:requires>
    <rpm:entry kind="atom" name="kernel-debug" epoch="0" ver="2.6.16.60" rel="0.34" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-kdump" epoch="0" ver="2.6.16.60" rel="0.34" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-xen" epoch="0" ver="2.6.16.60" rel="0.34" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-xenpae" epoch="0" ver="2.6.16.60" rel="0.34" flags="EQ"/>
  </rpm:requires>
  <reboot-needed/>
  <category>security</category>
    <license-to-confirm>
This update can be used to install a new kernel.
 
If you decide to use the kernel update, we recommend that you reboot
your system upon completion of the YaST Online Update, as additional
kernel modules may be needed which can only be loaded after the system
is rebooted.

If you are in the course of performing a new installation, the installer
will reboot the machine after installing the patch. If you do not want 
to reboot, deselect this patch.
    </license-to-confirm>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-debug</name>
      <arch>i586</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.34"/>
      <checksum type="sha" pkgid="YES">1942ae1a8b8447c28f52ca02c9a2262655392299</checksum>
      <time file="1232357802" build="1232333616"/>
      <size package="20714250" installed="82536820" archive="79324076"/>
      <location xml:base="media://#1" href="suse/i586/kernel-debug-2.6.16.60-0.42.5.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-debug" epoch="0" ver="2.6.16.60" rel="0.34" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-debug"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-kdump</name>
      <arch>i586</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.34"/>
      <checksum type="sha" pkgid="YES">821108ffe6a07a448f67cd8c2e365a1b9e1c3bb1</checksum>
      <time file="1232357824" build="1232332684"/>
      <size package="18090642" installed="51752705" archive="48544768"/>
      <location xml:base="media://#1" href="suse/i586/kernel-kdump-2.6.16.60-0.42.5.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-kdump" epoch="0" ver="2.6.16.60" rel="0.34" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-kdump"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-xen</name>
      <arch>i586</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.34"/>
      <checksum type="sha" pkgid="YES">70404abc47575bd465d22131ad7f36f6e05eab89</checksum>
      <time file="1232357853" build="1232335020"/>
      <size package="20329876" installed="59480126" archive="56294792"/>
      <location xml:base="media://#1" href="suse/i586/kernel-xen-2.6.16.60-0.42.5.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-xen" epoch="0" ver="2.6.16.60" rel="0.34" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-xen"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-xenpae</name>
      <arch>i586</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.34"/>
      <checksum type="sha" pkgid="YES">d03a5a0a966dd24b1a79d8e56eb84e919078515b</checksum>
      <time file="1232357744" build="1232333609"/>
      <size package="20350121" installed="59617774" archive="56424208"/>
      <location xml:base="media://#1" href="suse/i586/kernel-xenpae-2.6.16.60-0.42.5.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-xenpae" epoch="0" ver="2.6.16.60" rel="0.34" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-xenpae"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
  </atoms>
</patch>
