<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="30110847005ad3a7ea7c5d1efd067ce1"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="sledp3-kernel-6929"
    timestamp="1268755413"
    engine="1.0">
  <yum:name>sledp3-kernel</yum:name>
  <summary lang="en">Security update for Linux kernel (x86_64)</summary>
  <summary lang="de">Security update for Linux kernel (x86_64)</summary>
  <description lang="en">This update fixes lots of bugs and some security issues in the SUSE Linux Enterprise 10 SP 3 kernel.

CVE-2009-4020: A stack-based buffer overflow in the HFS subsystem of the Linux kernel allows remote attackers to have an unspecified impact via a crafted Hierarchical File System (HFS) filesystem, related to the hfs_readdir() function in fs/hfs/dir.c.
CVE-2010-0410: The connector netlink driver (drivers/connector/connector.c) of the Linux kernel allows local users to cause a denial of service (memory consumption or system crash) by sending the kernel many NETLINK_CONNECTOR messages.
CVE-2009-3556: A configuration value in the qla2xxx driver of the Linux kernel when N_Port ID Virtualization (NPIV) hardware is used, sets world-writable permissions for the vport_create and vport_delete files under /sys/class/scsi_host/, which allows local users to make arbitrary changes to SCSI host attributes by modifying these files.

Installation notes

This update is provided as RPM packages that can easily be installed onto a running system by using this command:

rpm -Fvh kernel-debug.rpm kernel-debug-debuginfo.rpm kernel-default.rpm kernel-default-debuginfo.rpm kernel-kdump.rpm kernel-kdump-debuginfo.rpm kernel-smp.rpm kernel-smp-debuginfo.rpm kernel-source.rpm kernel-source-debuginfo.rpm kernel-syms.rpm kernel-xen.rpm kernel-xen-debuginfo.rpm</description>
  <description lang="de">This update fixes lots of bugs and some security issues in
the SUSE Linux Enterprise 10 SP 3 kernel.

CVE-2009-4020: Stack-based buffer overflow in the hfs
subsystem in the Linux kernel allows remote attackers to
have an unspecified impact via a crafted Hierarchical File
System (HFS) filesystem, related to the hfs_readdir
function in fs/hfs/dir.c.

CVE-2010-0410: drivers/connector/connector.c in the Linux
kernel allows local users to cause a denial of service
(memory consumption and system crash) by sending the kernel
many NETLINK_CONNECTOR messages.

CVE-2009-3556: A configuration value in the qla2xxx driver
in the Linux kernel when N_Port ID Virtualization (NPIV)
hardware is used, sets world-writable permissions for the
(1) vport_create and (2) vport_delete files under
/sys/class/scsi_host/, which allows local users to make
arbitrary changes to SCSI host attributes by modifying
these files.
</description>
  <yum:version ver="6929" rel="0"/>
  <rpm:requires>
    <rpm:entry kind="atom" name="kernel-default" epoch="0" ver="2.6.16.60" rel="0.60.1" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-smp" epoch="0" ver="2.6.16.60" rel="0.60.1" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-source" epoch="0" ver="2.6.16.60" rel="0.60.1" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-syms" epoch="0" ver="2.6.16.60" rel="0.60.1" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-xen" epoch="0" ver="2.6.16.60" rel="0.60.1" flags="EQ"/>
  </rpm:requires>
  <reboot-needed/>
  <category>security</category>
    <license-to-confirm>
This update can be used to install a new kernel.
 
If you decide to use the kernel update, we recommend that you reboot
your system upon completion of the YaST Online Update, as additional
kernel modules may be needed which can only be loaded after the system
is rebooted.

If you are in the course of performing a new installation, the installer
will reboot the machine after installing the patch. If you do not want 
to reboot, deselect this patch.
    </license-to-confirm>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-default</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.60.1"/>
      <checksum type="sha" pkgid="YES">919adb6f2419f19268bdfbdc154f3ee040b643cc</checksum>
      <time file="1268755617" build="1268755413"/>
      <size package="19024926" installed="61558849" archive="58403396"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-default-2.6.16.60-0.60.1.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-default" epoch="0" ver="2.6.16.60" rel="0.60.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-default"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-smp</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.60.1"/>
      <checksum type="sha" pkgid="YES">70c6e807d87153eaf8f1f3a32c74040c3afba380</checksum>
      <time file="1268754899" build="1268754597"/>
      <size package="19434319" installed="87396220" archive="84250368"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-smp-2.6.16.60-0.60.1.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-smp" epoch="0" ver="2.6.16.60" rel="0.60.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-smp"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-source</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.60.1"/>
      <checksum type="sha" pkgid="YES">a5264a2fc639733a2ee9cf12943ba7461070da5b</checksum>
      <time file="1268752802" build="1268752690"/>
      <size package="49117848" installed="248412710" archive="252355924"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-source-2.6.16.60-0.60.1.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-source" epoch="0" ver="2.6.16.60" rel="0.60.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-source"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-syms</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.60.1"/>
      <checksum type="sha" pkgid="YES">774aa402a789be3e84c8f086b3aeba43930391e0</checksum>
      <time file="1268755784" build="1268755773"/>
      <size package="1893606" installed="1951976" archive="1954888"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-syms-2.6.16.60-0.60.1.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-syms" epoch="0" ver="2.6.16.60" rel="0.60.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-syms"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-xen</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.60.1"/>
      <checksum type="sha" pkgid="YES">e58f5a73a8c8b785969c18d560180773d6c39aab</checksum>
      <time file="1268755044" build="1268754814"/>
      <size package="19337239" installed="69173975" archive="66007788"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-xen-2.6.16.60-0.60.1.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-xen" epoch="0" ver="2.6.16.60" rel="0.60.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-xen"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
  </atoms>
</patch>
