<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="f715eb6e5d39ac340637af52966bcd6e"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="sledp3-kernel-7304"
    timestamp="1294838150"
    engine="1.0">
  <yum:name>sledp3-kernel</yum:name>
  <summary lang="en">Security update for the Linux kernel</summary>
  <description lang="en">
This kernel update for the SUSE Linux Enterprise 10 SP3 kernel fixes 
several security issues and bugs.

Following security issues were fixed:

    * 

      CVE-2010-4258: A local attacker could use a Oops (kernel crash)
      caused by other flaws to write a 0 byte to a attacker controlled
      address in the kernel. This could lead to privilege escalation
      together with other issues.

    * 

      CVE-2010-3699: The backend driver in Xen 3.x allows guest OS users to
      cause a denial of service via a kernel thread leak, which prevents
      the device and guest OS from being shut down or create a zombie
      domain, causes a hang in zenwatch, or prevents unspecified xm
      commands from working properly, related to (1) netback, (2) blkback,
      or (3) blktap.

    * 

      CVE-2010-3849: The econet_sendmsg function in net/econet/af_econet.c
      in the Linux kernel, when an econet address is configured, allowed
      local users to cause a denial of service (NULL pointer dereference
      and OOPS) via a sendmsg call that specifies a NULL value for the
      remote address field.

    * 

      CVE-2010-3848: Stack-based buffer overflow in the econet_sendmsg
      function in net/econet/af_econet.c in the Linux kernel when an econet
      address is configured, allowed local users to gain privileges by
      providing a large number of iovec structures.

    * 

      CVE-2010-3850: The ec_dev_ioctl function in net/econet/af_econet.c in
      the Linux kernel did not require the CAP_NET_ADMIN capability, which
      allowed local users to bypass intended access restrictions and
      configure econet addresses via an SIOCSIFADDR ioctl call.

    * 

      CVE-2010-4160: A overflow in sendto() and recvfrom() routines was
      fixed that could be used by local attackers to potentially crash the
      kernel using some socket families like L2TP.

</description>
  <yum:version ver="7304" rel="0"/>
  <rpm:requires>
    <rpm:entry kind="atom" name="kernel-default" epoch="0" ver="2.6.16.60" rel="0.76.8" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-smp" epoch="0" ver="2.6.16.60" rel="0.76.8" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-source" epoch="0" ver="2.6.16.60" rel="0.76.8" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-syms" epoch="0" ver="2.6.16.60" rel="0.76.8" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-xen" epoch="0" ver="2.6.16.60" rel="0.76.8" flags="EQ"/>
  </rpm:requires>
  <reboot-needed/>
  <category>security</category>
    <license-to-confirm>
This update can be used to install a new kernel.
 
If you decide to use the kernel update, we recommend that you reboot
your system upon completion of the YaST Online Update, as additional
kernel modules may be needed which can only be loaded after the system
is rebooted.

If you are in the course of performing a new installation, the installer
will reboot the machine after installing the patch. If you do not want 
to reboot, deselect this patch.
    </license-to-confirm>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-default</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.76.8"/>
      <checksum type="sha" pkgid="YES">13afdd4f934ce723ec260a88feabda76e9723976</checksum>
      <time file="1294838482" build="1294838150"/>
      <size package="19081218" installed="61601838" archive="58446384"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-default-2.6.16.60-0.76.8.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-default" epoch="0" ver="2.6.16.60" rel="0.76.8" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-default"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-smp</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.76.8"/>
      <checksum type="sha" pkgid="YES">4789d0480d6bba14e89a25676147698617146a5a</checksum>
      <time file="1294837079" build="1294836914"/>
      <size package="19518818" installed="87443063" archive="84297208"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-smp-2.6.16.60-0.76.8.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-smp" epoch="0" ver="2.6.16.60" rel="0.76.8" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-smp"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-source</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.76.8"/>
      <checksum type="sha" pkgid="YES">0fbd2241c41bba081b6e5d2fb291661af2a87afc</checksum>
      <time file="1294835437" build="1294835275"/>
      <size package="49201736" installed="248534953" archive="252481352"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-source-2.6.16.60-0.76.8.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-source" epoch="0" ver="2.6.16.60" rel="0.76.8" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-source"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-syms</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.76.8"/>
      <checksum type="sha" pkgid="YES">b5bcc33efb61b153fae13c30f132c9c7fb175a1d</checksum>
      <time file="1294838734" build="1294838731"/>
      <size package="1956112" installed="1978320" archive="1981236"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-syms-2.6.16.60-0.76.8.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-syms" epoch="0" ver="2.6.16.60" rel="0.76.8" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-syms"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-xen</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.76.8"/>
      <checksum type="sha" pkgid="YES">563ccf668ff308b285473ada4948a6ce4ba88bf1</checksum>
      <time file="1294837220" build="1294837047"/>
      <size package="19405129" installed="69224252" archive="66058064"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-xen-2.6.16.60-0.76.8.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-xen" epoch="0" ver="2.6.16.60" rel="0.76.8" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-xen"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
  </atoms>
</patch>
