<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="674eb707cae3a31be66788e116641a9a"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="sledp3-kernel-7261"
    timestamp="1291163369"
    engine="1.0">
  <yum:name>sledp3-kernel</yum:name>
  <summary lang="en">Security update for the Linux kernel</summary>
  <description lang="en">
This kernel update for the SUSE Linux Enterprise 10 SP3 kernel fixes 
several security issues and bugs.

Following security issues were fixed:

    * 

      CVE-2010-3442: Multiple integer overflows in the snd_ctl_new function
      in sound/core/control.c in the Linux kernel before
      2.6.36-rc5-next-20100929 allow local users to cause a denial of
      service (heap memory corruption) or possibly have unspecified other
      impact via a crafted (1) SNDRV_CTL_IOCTL_ELEM_ADD or (2)
      SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl call.

    * 

      CVE-2010-3437: Integer signedness error in the
      pkt_find_dev_from_minor function in drivers/block/pktcdvd.c in the
      Linux kernel before 2.6.36-rc6 allows local users to obtain sensitive
      information from kernel memory or cause a denial of service (invalid
      pointer dereference and system crash) via a crafted index value in a
      PKT_CTRL_CMD_STATUS ioctl call.

    * 

      CVE-2010-4078: Uninitialized stack memory disclosure in the
      FBIOGET_VBLANK ioctl in the sis and ivtv drivers could leak kernel
      memory to userspace.

    * 

      CVE-2010-4080 / CVE-2010-4081: Uninitialized stack memory disclosure
      in the rme9652 ALSA driver could leak kernel memory to userspace.

    * 

      CVE-2010-4073 / CVE-2010-4072 / CVE-2010-4083: Uninitialized stack
      memory disclosure in the SystemV IPC handling functions could leak
      kernel memory to userspace.

    * 

      CVE-2010-3067: Integer overflow in the do_io_submit function in
      fs/aio.c in the Linux kernel allowed local users to cause a denial of
      service or possibly have unspecified other impact via crafted use of
      the io_submit system call.

    * 

      CVE-2010-3310: Multiple integer signedness errors in
      net/rose/af_rose.c in the Linux kernel allowed local users to cause a
      denial of service (heap memory corruption) or possibly have
      unspecified other impact via a rose_getname function call, related to
      the rose_bind and rose_connect functions.

    * 

      CVE-2010-2226: The xfs_swapext function in fs/xfs/xfs_dfrag.c in the
      Linux kernel did not properly check the file descriptors passed to
      the SWAPEXT ioctl, which allowed local users to leverage write access
      and obtain read access by swapping one file into another file.

    * 

      CVE-2010-2946: fs/jfs/xattr.c in the Linux kernel did not properly
      handle a certain legacy format for storage of extended attributes,
      which might have allowed local users by bypass intended xattr
      namespace restrictions via an &quot;os2.&quot; substring at the beginning of a
      name.

    * 

      CVE-2010-2942: The actions implementation in the network queueing
      functionality in the Linux kernel did not properly initialize certain
      structure members when performing dump operations, which allowed
      local users to obtain potentially sensitive information from kernel
      memory via vectors related to (1) the tcf_gact_dump function in
      net/sched/act_gact.c, (2) the tcf_mirred_dump function in
      net/sched/act_mirred.c, (3) the tcf_nat_dump function in
      net/sched/act_nat.c, (4) the tcf_simp_dump function in
      net/sched/act_simple.c, and (5) the tcf_skbedit_dump function in
      net/sched/act_skbedit.c.

    * 

      CVE-2010-2248: fs/cifs/cifssmb.c in the CIFS implementation in the
      Linux kernel allowed remote attackers to cause a denial of service
      (panic) via an SMB response packet with an invalid CountHigh value,
      as demonstrated by a response from an OS/2 server, related to the
      CIFSSMBWrite and CIFSSMBWrite2 functions.

    * 

      CVE-2010-4157: A 32bit vs 64bit integer mismatch in gdth_ioctl_alloc
      could lead to memory corruption in the GDTH driver.

    * 

      CVE-2010-4164: A remote (or local) attacker communicating over X.25
      could cause a kernel panic by attempting to negotiate malformed
      facilities.

    * 

      CVE-2010-3086: A missing lock prefix in the x86 futex code could be
      used by local attackers to cause a denial of service.

    * 

      CVE-2010-4158: A memory information leak in berkely packet filter
      rules allowed local attackers to read uninitialized memory of the
      kernel stack.

    * 

      CVE-2010-4162: A local denial of service in the blockdevice layer was
      fixed.

</description>
  <yum:version ver="7261" rel="0"/>
  <rpm:requires>
    <rpm:entry kind="atom" name="kernel-default" epoch="0" ver="2.6.16.60" rel="0.74.7" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-smp" epoch="0" ver="2.6.16.60" rel="0.74.7" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-source" epoch="0" ver="2.6.16.60" rel="0.74.7" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-syms" epoch="0" ver="2.6.16.60" rel="0.74.7" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-xen" epoch="0" ver="2.6.16.60" rel="0.74.7" flags="EQ"/>
  </rpm:requires>
  <reboot-needed/>
  <category>security</category>
    <license-to-confirm>
This update can be used to install a new kernel.
 
If you decide to use the kernel update, we recommend that you reboot
your system upon completion of the YaST Online Update, as additional
kernel modules may be needed which can only be loaded after the system
is rebooted.

If you are in the course of performing a new installation, the installer
will reboot the machine after installing the patch. If you do not want 
to reboot, deselect this patch.
    </license-to-confirm>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-default</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.74.7"/>
      <checksum type="sha" pkgid="YES">d04395c4879b56db784f219a497f5ffcb6f49307</checksum>
      <time file="1291163628" build="1291163369"/>
      <size package="19080039" installed="61596725" archive="58441268"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-default-2.6.16.60-0.74.7.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-default" epoch="0" ver="2.6.16.60" rel="0.74.7" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-default"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-smp</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.74.7"/>
      <checksum type="sha" pkgid="YES">bff1581bca61a94cd6f4cd74d49fb0ab01b5389e</checksum>
      <time file="1291163278" build="1291163082"/>
      <size package="19517836" installed="87440109" archive="84294252"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-smp-2.6.16.60-0.74.7.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-smp" epoch="0" ver="2.6.16.60" rel="0.74.7" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-smp"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-source</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.74.7"/>
      <checksum type="sha" pkgid="YES">0c410040e622a6eb5aad9807a0f304b3f809ff4d</checksum>
      <time file="1291161428" build="1291161172"/>
      <size package="49196296" installed="248528592" archive="252474992"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-source-2.6.16.60-0.74.7.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-source" epoch="0" ver="2.6.16.60" rel="0.74.7" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-source"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-syms</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.74.7"/>
      <checksum type="sha" pkgid="YES">173517e47712a4c8790f4b8b25493aec5bc43897</checksum>
      <time file="1291168303" build="1291168297"/>
      <size package="1952810" installed="1979804" archive="1982720"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-syms-2.6.16.60-0.74.7.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-syms" epoch="0" ver="2.6.16.60" rel="0.74.7" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-syms"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-xen</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.74.7"/>
      <checksum type="sha" pkgid="YES">ba1965cf54901d3899aab9340bc38da6e86780a1</checksum>
      <time file="1291163783" build="1291163541"/>
      <size package="19394481" installed="69218322" archive="66052132"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-xen-2.6.16.60-0.74.7.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-xen" epoch="0" ver="2.6.16.60" rel="0.74.7" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-xen"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
  </atoms>
</patch>
