<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="1f9272102cdb11fea73949ffdb5ba881"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="sledp2-kernel-6113"
    timestamp="1237900681"
    engine="1.0">
  <yum:name>sledp2-kernel</yum:name>
  <summary lang="en">Security update for Linux kernel</summary>
  <summary lang="de">Security update for Linux kernel</summary>
  <description lang="en">This Linux kernel update for SUSE Linux Enterprise 10
Service Pack 2 fixes various bugs and several security
issues.

Following security issues were fixed: CVE-2009-0675: The
skfp_ioctl function in drivers/net/skfp/skfddi.c in the
Linux kernel permits SKFP_CLR_STATS requests only when the
CAP_NET_ADMIN capability is absent, instead of when this
capability is present, which allows local users to reset
the driver statistics, related to an &quot;inverted logic&quot; issue.

CVE-2009-0676: The sock_getsockopt function in
net/core/sock.c in the Linux kernel does not initialize a
certain structure member, which allows local users to
obtain potentially sensitive information from kernel memory
via an SO_BSDCOMPAT getsockopt request.

CVE-2009-0028: The clone system call in the Linux kernel
allows local users to send arbitrary signals to a parent
process from an unprivileged child process by launching an
additional child process with the CLONE_PARENT flag, and
then letting this new process exit.

CVE-2008-1294: The Linux kernel does not check when a user
attempts to set RLIMIT_CPU to 0 until after the change is
made, which allows local users to bypass intended resource
limits.

CVE-2009-0065: Buffer overflow in net/sctp/sm_statefuns.c
in the Stream Control Transmission Protocol (sctp)
implementation in the Linux kernel allows remote attackers
to have an unknown impact via an FWD-TSN (aka FORWARD-TSN)
chunk with a large stream ID.

CVE-2009-1046: The console selection feature in the Linux
kernel when the UTF-8 console is used, allows physically
proximate attackers to cause a denial of service (memory
corruption) by selecting a small number of 3-byte UTF-8
characters, which triggers an an off-by-two memory error.
It is is not clear if this can be exploited at all.

Also a huge number of regular bugs were fixed, please see
the RPM changelog for full details.
</description>
  <description lang="de">This Linux kernel update for SUSE Linux Enterprise 10
Service Pack 2 fixes various bugs and several security
issues.

Following security issues were fixed: CVE-2009-0675: The
skfp_ioctl function in drivers/net/skfp/skfddi.c in the
Linux kernel permits SKFP_CLR_STATS requests only when the
CAP_NET_ADMIN capability is absent, instead of when this
capability is present, which allows local users to reset
the driver statistics, related to an &quot;inverted logic&quot; issue.

CVE-2009-0676: The sock_getsockopt function in
net/core/sock.c in the Linux kernel does not initialize a
certain structure member, which allows local users to
obtain potentially sensitive information from kernel memory
via an SO_BSDCOMPAT getsockopt request.

CVE-2009-0028: The clone system call in the Linux kernel
allows local users to send arbitrary signals to a parent
process from an unprivileged child process by launching an
additional child process with the CLONE_PARENT flag, and
then letting this new process exit.

CVE-2008-1294: The Linux kernel does not check when a user
attempts to set RLIMIT_CPU to 0 until after the change is
made, which allows local users to bypass intended resource
limits.

CVE-2009-0065: Buffer overflow in net/sctp/sm_statefuns.c
in the Stream Control Transmission Protocol (sctp)
implementation in the Linux kernel allows remote attackers
to have an unknown impact via an FWD-TSN (aka FORWARD-TSN)
chunk with a large stream ID.

CVE-2009-1046: The console selection feature in the Linux
kernel when the UTF-8 console is used, allows physically
proximate attackers to cause a denial of service (memory
corruption) by selecting a small number of 3-byte UTF-8
characters, which triggers an an off-by-two memory error.
It is is not clear if this can be exploited at all.

Also a huge number of regular bugs were fixed, please see
the RPM changelog for full details.
</description>
  <yum:version ver="6113" rel="0"/>
  <rpm:requires>
    <rpm:entry kind="atom" name="kernel-default" epoch="0" ver="2.6.16.60" rel="0.37_f594963d" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-smp" epoch="0" ver="2.6.16.60" rel="0.37_f594963d" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-source" epoch="0" ver="2.6.16.60" rel="0.37_f594963d" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-syms" epoch="0" ver="2.6.16.60" rel="0.37_f594963d" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-xen" epoch="0" ver="2.6.16.60" rel="0.37_f594963d" flags="EQ"/>
  </rpm:requires>
  <reboot-needed/>
  <category>security</category>
    <license-to-confirm>
This update can be used to install a new kernel.
 
If you decide to use the kernel update, we recommend that you reboot
your system upon completion of the YaST Online Update, as additional
kernel modules may be needed which can only be loaded after the system
is rebooted.

If you are in the course of performing a new installation, the installer
will reboot the machine after installing the patch. If you do not want 
to reboot, deselect this patch.
    </license-to-confirm>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-default</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.37_f594963d"/>
      <checksum type="sha" pkgid="YES">a815a71cbfeba70e8336ab55877c5c2eebf997be</checksum>
      <time file="1237905978" build="1237900681"/>
      <size package="17910557" installed="58636949" archive="55486436"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-default-2.6.16.60-0.42.5.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-default" epoch="0" ver="2.6.16.60" rel="0.37_f594963d" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-default"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-smp</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.37_f594963d"/>
      <checksum type="sha" pkgid="YES">6907f91337653721d18f6d671876eff7b2e50faa</checksum>
      <time file="1237906104" build="1237900888"/>
      <size package="18322439" installed="84216950" archive="81076256"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-smp-2.6.16.60-0.42.5.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-smp" epoch="0" ver="2.6.16.60" rel="0.37_f594963d" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-smp"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-source</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.37_f594963d"/>
      <checksum type="sha" pkgid="YES">22cadc912d6f6b1989aabb045390f5af215194b5</checksum>
      <time file="1237906203" build="1237898801"/>
      <size package="47419032" installed="238927746" archive="242923720"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-source-2.6.16.60-0.42.5.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-source" epoch="0" ver="2.6.16.60" rel="0.37_f594963d" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-source"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-syms</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.37_f594963d"/>
      <checksum type="sha" pkgid="YES">3dfa24f172d8e53f6e4852d545d9616c3365c058</checksum>
      <time file="1237906239" build="1237901756"/>
      <size package="1875544" installed="2014611" archive="2017636"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-syms-2.6.16.60-0.42.5.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-syms" epoch="0" ver="2.6.16.60" rel="0.37_f594963d" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-syms"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-xen</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.37_f594963d"/>
      <checksum type="sha" pkgid="YES">6a39d42aac55110c40a73d975566b6b68f1164ef</checksum>
      <time file="1237905942" build="1237900112"/>
      <size package="18204908" installed="66009581" archive="62848756"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-xen-2.6.16.60-0.42.5.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-xen" epoch="0" ver="2.6.16.60" rel="0.37_f594963d" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-xen"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
  </atoms>
</patch>
