<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="51097d5d388421c6b5752d422c0c672a"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="sledp2-kernel-5667"
    timestamp="1223463298"
    engine="1.0">
  <yum:name>sledp2-kernel</yum:name>
  <summary lang="en">Security update for Linux kernel</summary>
  <summary lang="de">Security update for Linux kernel</summary>
  <description lang="en">This kernel update for SUSE Linux Enterprise 10 Service
Pack 2 fixes various bugs and some security problems:

CVE-2008-4210: When creating a file, open()/creat() allowed
the setgid bit to be set via the mode argument even when,
due to the bsdgroups mount option or the file being created
in a setgid directory, the new file's group is one which
the user is not a member of.  The local attacker could then
use ftruncate() and memory-mapped I/O to turn the new file
into an arbitrary binary and thus gain the privileges of
this group, since these operations do not clear the setgid
bit.&quot;

CVE-2008-3528: The ext[234] filesystem code fails to
properly handle corrupted data structures. With a mounted
filesystem image or partition that have corrupted
dir-&gt;i_size and dir-&gt;i_blocks, a user performing either a
read or write operation on the mounted image or partition
can lead to a possible denial of service by spamming the
logfile.

CVE-2008-1514: The S/390 ptrace code allowed local users to
cause a denial of service (kernel panic) via the
user-area-padding test from the ptrace testsuite in 31-bit
mode, which triggers an invalid dereference.

CVE-2007-6716: fs/direct-io.c in the dio subsystem in the
Linux kernel did not properly zero out the dio struct,
which allows local users to cause a denial of service
(OOPS), as demonstrated by a certain fio test.

CVE-2008-3525: Added missing capability checks in
sbni_ioctl().


Also OCFS2 was updated to version v1.4.1-1.

The full amount of changes can be reviewed in the RPM
changelog.
</description>
  <description lang="de">This kernel update for SUSE Linux Enterprise 10 Service
Pack 2 fixes various bugs and some security problems:

CVE-2008-4210: When creating a file, open()/creat() allowed
the setgid bit to be set via the mode argument even when,
due to the bsdgroups mount option or the file being created
in a setgid directory, the new file's group is one which
the user is not a member of.  The local attacker could then
use ftruncate() and memory-mapped I/O to turn the new file
into an arbitrary binary and thus gain the privileges of
this group, since these operations do not clear the setgid
bit.&quot;

CVE-2008-3528: The ext[234] filesystem code fails to
properly handle corrupted data structures. With a mounted
filesystem image or partition that have corrupted
dir-&gt;i_size and dir-&gt;i_blocks, a user performing either a
read or write operation on the mounted image or partition
can lead to a possible denial of service by spamming the
logfile.

CVE-2008-1514: The S/390 ptrace code allowed local users to
cause a denial of service (kernel panic) via the
user-area-padding test from the ptrace testsuite in 31-bit
mode, which triggers an invalid dereference.

CVE-2007-6716: fs/direct-io.c in the dio subsystem in the
Linux kernel did not properly zero out the dio struct,
which allows local users to cause a denial of service
(OOPS), as demonstrated by a certain fio test.

CVE-2008-3525: Added missing capability checks in
sbni_ioctl().


Also OCFS2 was updated to version v1.4.1-1.

The full amount of changes can be reviewed in the RPM
changelog.
</description>
  <yum:version ver="5667" rel="0"/>
  <rpm:requires>
    <rpm:entry kind="atom" name="kernel-default" epoch="0" ver="2.6.16.60" rel="0.31" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-smp" epoch="0" ver="2.6.16.60" rel="0.31" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-source" epoch="0" ver="2.6.16.60" rel="0.31" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-syms" epoch="0" ver="2.6.16.60" rel="0.31" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-xen" epoch="0" ver="2.6.16.60" rel="0.31" flags="EQ"/>
  </rpm:requires>
  <reboot-needed/>
  <category>security</category>
    <license-to-confirm>
This update can be used to install a new kernel.
 
If you decide to use the kernel update, we recommend that you reboot
your system upon completion of the YaST Online Update, as additional
kernel modules may be needed which can only be loaded after the system
is rebooted.

If you are in the course of performing a new installation, the installer
will reboot the machine after installing the patch. If you do not want 
to reboot, deselect this patch.
    </license-to-confirm>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-default</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.31"/>
      <checksum type="sha" pkgid="YES">8f168f87cba3b0c982f88ed6519c0039b1fc08b2</checksum>
      <time file="1223480603" build="1223463298"/>
      <size package="17845995" installed="58570441" archive="55443496"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-default-2.6.16.60-0.42.5.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-default" epoch="0" ver="2.6.16.60" rel="0.31" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-default"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-smp</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.31"/>
      <checksum type="sha" pkgid="YES">3b255435a2c094a3d1dafd15b71b1f910aa5fcb5</checksum>
      <time file="1223480633" build="1223464259"/>
      <size package="18244030" installed="84146915" archive="81029484"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-smp-2.6.16.60-0.42.5.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-smp" epoch="0" ver="2.6.16.60" rel="0.31" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-smp"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-source</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.31"/>
      <checksum type="sha" pkgid="YES">d886e2bf32f7d91cb934d985b8efea8a736d50b8</checksum>
      <time file="1223480588" build="1223459945"/>
      <size package="47230032" installed="238798100" archive="242594980"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-source-2.6.16.60-0.42.5.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-source" epoch="0" ver="2.6.16.60" rel="0.31" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-source"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-syms</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.31"/>
      <checksum type="sha" pkgid="YES">eccd6b7a604bd28c911c4b516759d2603ca1bbce</checksum>
      <time file="1223480666" build="1223465044"/>
      <size package="1818121" installed="1988671" archive="1991544"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-syms-2.6.16.60-0.42.5.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-syms" epoch="0" ver="2.6.16.60" rel="0.31" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-syms"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-xen</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.31"/>
      <checksum type="sha" pkgid="YES">3d2922f86bed6d0ac421d49093e5de130edef60e</checksum>
      <time file="1223480590" build="1223463083"/>
      <size package="18152740" installed="65945200" archive="62807552"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-xen-2.6.16.60-0.42.5.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-xen" epoch="0" ver="2.6.16.60" rel="0.31" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-xen"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
  </atoms>
</patch>
