<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="9b665aac984a0b06dae395f7e6fc9e7e"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="sledp2-kernel-5477"
    timestamp="1217247955"
    engine="1.0">
  <yum:name>sledp2-kernel</yum:name>
  <summary lang="en">Security update for Linux kernel</summary>
  <summary lang="de">Security update for Linux kernel</summary>
  <description lang="en">This is a respin of the previous kernel update, which got
retracted due to an IDE-CDROM regression, where any IDE
CDROM access would hang or crash the system. Only this
problem was fixed additionally.

This kernel update fixes the following security problems:

CVE-2008-1615: On x86_64 a denial of service attack could
be used by local attackers to immediately panic / crash the
machine.

CVE-2008-1669: Fixed a SMP ordering problem in fcntl_setlk
could potentially allow local attackers to execute code by
timing file locking.

CVE-2008-2372: Fixed a resource starvation problem in the
handling of ZERO mmap pages.

CVE-2008-1673: The asn1 implementation in (a) the Linux
kernel, as used in the cifs and ip_nat_snmp_basic modules
does not properly validate length values during decoding of
ASN.1 BER data, which allows remote attackers to cause a
denial of service (crash) or execute arbitrary code via (1)
a length greater than the working buffer, which can lead to
an unspecified overflow; (2) an oid length of zero, which
can lead to an off-by-one error; or (3) an indefinite
length for a primitive encoding.

CVE-2008-2812: Various tty / serial devices did not check
functionpointers for NULL before calling them, leading to
potential crashes or code execution. The devices affected
are usually only accessible by the root user though.

CVE-2008-2931: A missing permission check in mount changing
was added which could have been used by local attackers to
change the mountdirectory.

Additionaly a very large number of bugs was fixed. Details
can be found in the RPM changelog of the included packages.

OCFS2 has been upgraded to the 1.4.1 release:
   - Endian fixes
   - Use slab caches for DLM objects
   - Export DLM state info to debugfs
   - Avoid ENOSPC in rare conditions when free inodes are
reserved by other nodes
   - Error handling fix in ocfs2_start_walk_page_trans()
   - Cleanup lockres printing
   - Allow merging of extents
   - Fix to allow changing permissions of symlinks
   - Merged local fixes upstream (no code change)
</description>
  <description lang="de">This is a respin of the previous kernel update, which got
retracted due to an IDE-CDROM regression, where any IDE
CDROM access would hang or crash the system. Only this
problem was fixed additionally.

This kernel update fixes the following security problems:

CVE-2008-1615: On x86_64 a denial of service attack could
be used by local attackers to immediately panic / crash the
machine.

CVE-2008-1669: Fixed a SMP ordering problem in fcntl_setlk
could potentially allow local attackers to execute code by
timing file locking.

CVE-2008-2372: Fixed a resource starvation problem in the
handling of ZERO mmap pages.

CVE-2008-1673: The asn1 implementation in (a) the Linux
kernel, as used in the cifs and ip_nat_snmp_basic modules
does not properly validate length values during decoding of
ASN.1 BER data, which allows remote attackers to cause a
denial of service (crash) or execute arbitrary code via (1)
a length greater than the working buffer, which can lead to
an unspecified overflow; (2) an oid length of zero, which
can lead to an off-by-one error; or (3) an indefinite
length for a primitive encoding.

CVE-2008-2812: Various tty / serial devices did not check
functionpointers for NULL before calling them, leading to
potential crashes or code execution. The devices affected
are usually only accessible by the root user though.

CVE-2008-2931: A missing permission check in mount changing
was added which could have been used by local attackers to
change the mountdirectory.

Additionaly a very large number of bugs was fixed. Details
can be found in the RPM changelog of the included packages.

OCFS2 has been upgraded to the 1.4.1 release:
   - Endian fixes
   - Use slab caches for DLM objects
   - Export DLM state info to debugfs
   - Avoid ENOSPC in rare conditions when free inodes are
reserved by other nodes
   - Error handling fix in ocfs2_start_walk_page_trans()
   - Cleanup lockres printing
   - Allow merging of extents
   - Fix to allow changing permissions of symlinks
   - Merged local fixes upstream (no code change)
</description>
  <yum:version ver="5477" rel="0"/>
  <rpm:requires>
    <rpm:entry kind="atom" name="kernel-default" epoch="0" ver="2.6.16.60" rel="0.27" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-smp" epoch="0" ver="2.6.16.60" rel="0.27" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-source" epoch="0" ver="2.6.16.60" rel="0.27" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-syms" epoch="0" ver="2.6.16.60" rel="0.27" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-xen" epoch="0" ver="2.6.16.60" rel="0.27" flags="EQ"/>
  </rpm:requires>
  <reboot-needed/>
  <category>security</category>
    <license-to-confirm>
This update can be used to install a new kernel.
 
If you decide to use the kernel update, we recommend that you reboot
your system upon completion of the YaST Online Update, as additional
kernel modules may be needed which can only be loaded after the system
is rebooted.

If you are in the course of performing a new installation, the installer
will reboot the machine after installing the patch. If you do not want 
to reboot, deselect this patch.
    </license-to-confirm>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-default</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.27"/>
      <checksum type="sha" pkgid="YES">4bb0dde029f4440c018dad90c5d08f54034baea5</checksum>
      <time file="1217257363" build="1217247955"/>
      <size package="17820315" installed="58529815" archive="55403880"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-default-2.6.16.60-0.42.5.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-default" epoch="0" ver="2.6.16.60" rel="0.27" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-default"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-smp</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.27"/>
      <checksum type="sha" pkgid="YES">8e15142ac33b189eba172e1c6724f70b3c237d9a</checksum>
      <time file="1217257375" build="1217250278"/>
      <size package="18219325" installed="84105748" archive="80989328"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-smp-2.6.16.60-0.42.5.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-smp" epoch="0" ver="2.6.16.60" rel="0.27" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-smp"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-source</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.27"/>
      <checksum type="sha" pkgid="YES">c0feea5a837e0e6d64a84487f5088f6f0441621c</checksum>
      <time file="1217257355" build="1217246953"/>
      <size package="47200929" installed="238731976" archive="242528852"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-source-2.6.16.60-0.42.5.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-source" epoch="0" ver="2.6.16.60" rel="0.27" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-source"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-syms</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.27"/>
      <checksum type="sha" pkgid="YES">4afb5cccd01b5a2f459ea38a60c1481537fcc7c1</checksum>
      <time file="1217257387" build="1217250852"/>
      <size package="1790563" installed="1973945" archive="1976820"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-syms-2.6.16.60-0.42.5.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-syms" epoch="0" ver="2.6.16.60" rel="0.27" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-syms"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-xen</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.27"/>
      <checksum type="sha" pkgid="YES">3302bc1c7ef4ddf7964fcab06d416e2b56ef7ded</checksum>
      <time file="1217257357" build="1217249007"/>
      <size package="18126578" installed="65911520" archive="62774884"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-xen-2.6.16.60-0.42.5.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-xen" epoch="0" ver="2.6.16.60" rel="0.27" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-xen"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
  </atoms>
</patch>
