<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="7a7a8f331b9706799e3c3bce839e8aa0"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="slesp2-kernel-6437"
    timestamp="1250331387"
    engine="1.0">
  <yum:name>slesp2-kernel</yum:name>
  <summary lang="en">Security update for Linux kernel</summary>
  <summary lang="de">Security update for Linux kernel</summary>
  <description lang="en">This patch updates the SUSE Linux Enterprise 10 SP2 kernel
to fix various bugs and some security issues.

Following security issues were fixed: CVE-2009-2692: A
missing NULL pointer check in the socket sendpage function
can be used by local attackers to gain root privileges.

(No cve yet) A information leak from using sigaltstack was
fixed.

Enabled -fno-delete-null-pointer-checks to avoid optimizing
away NULL pointer checks and fixed Makefiles to make sure
-fwrapv is used everywhere.

CVE-2009-1758: The hypervisor_callback function in Xen
allows guest user applications to cause a denial of service
(kernel oops) of the guest OS by triggering a segmentation
fault in &quot;certain address ranges.&quot;

CVE-2009-1389: A crash on r8169 network cards when
receiving large packets was fixed.

CVE-2009-1630: The nfs_permission function in fs/nfs/dir.c
in the NFS client implementation in the Linux kernel, when
atomic_open is available, does not check execute (aka EXEC
or MAY_EXEC) permission bits, which allows local users to
bypass permissions and execute files, as demonstrated by
files on an NFSv4 fileserver
</description>
  <description lang="de">This patch updates the SUSE Linux Enterprise 10 SP2 kernel
to fix various bugs and some security issues.

Following security issues were fixed: CVE-2009-2692: A
missing NULL pointer check in the socket sendpage function
can be used by local attackers to gain root privileges.

(No cve yet) A information leak from using sigaltstack was
fixed.

Enabled -fno-delete-null-pointer-checks to avoid optimizing
away NULL pointer checks and fixed Makefiles to make sure
-fwrapv is used everywhere.

CVE-2009-1758: The hypervisor_callback function in Xen
allows guest user applications to cause a denial of service
(kernel oops) of the guest OS by triggering a segmentation
fault in &quot;certain address ranges.&quot;

CVE-2009-1389: A crash on r8169 network cards when
receiving large packets was fixed.

CVE-2009-1630: The nfs_permission function in fs/nfs/dir.c
in the NFS client implementation in the Linux kernel, when
atomic_open is available, does not check execute (aka EXEC
or MAY_EXEC) permission bits, which allows local users to
bypass permissions and execute files, as demonstrated by
files on an NFSv4 fileserver
</description>
  <yum:version ver="6437" rel="0"/>
  <rpm:requires>
    <rpm:entry kind="atom" name="kernel-debug" epoch="0" ver="2.6.16.60" rel="0.42.4" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-default" epoch="0" ver="2.6.16.60" rel="0.42.4" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-kdump" epoch="0" ver="2.6.16.60" rel="0.42.4" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-smp" epoch="0" ver="2.6.16.60" rel="0.42.4" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-source" epoch="0" ver="2.6.16.60" rel="0.42.4" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-syms" epoch="0" ver="2.6.16.60" rel="0.42.4" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-xen" epoch="0" ver="2.6.16.60" rel="0.42.4" flags="EQ"/>
  </rpm:requires>
  <reboot-needed/>
  <category>security</category>
    <license-to-confirm>
This update can be used to install a new kernel.
 
If you decide to use the kernel update, we recommend that you reboot
your system upon completion of the YaST Online Update, as additional
kernel modules may be needed which can only be loaded after the system
is rebooted.

If you are in the course of performing a new installation, the installer
will reboot the machine after installing the patch. If you do not want 
to reboot, deselect this patch.
    </license-to-confirm>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-debug</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.42.4"/>
      <checksum type="sha" pkgid="YES">13199237bc7e97913c4eb038e58d6e0b74257baf</checksum>
      <time file="1250467372" build="1250331387"/>
      <size package="19115799" installed="85937742" archive="82810556"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-debug-2.6.16.60-0.42.5.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-debug" epoch="0" ver="2.6.16.60" rel="0.42.4" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-debug"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-default</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.42.4"/>
      <checksum type="sha" pkgid="YES">19e7d3797239529c9e02be0c98ee1f5685a9eecb</checksum>
      <time file="1250467287" build="1250331575"/>
      <size package="17949923" installed="58625565" archive="55492860"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-default-2.6.16.60-0.42.5.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-default" epoch="0" ver="2.6.16.60" rel="0.42.4" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-default"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-kdump</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.42.4"/>
      <checksum type="sha" pkgid="YES">4a8b3b2ce4a1a7309f2ba93c9e05a6d424e55418</checksum>
      <time file="1250467323" build="1250331030"/>
      <size package="16521230" installed="61740136" archive="58612320"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-kdump-2.6.16.60-0.42.5.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-kdump" epoch="0" ver="2.6.16.60" rel="0.42.4" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-kdump"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-smp</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.42.4"/>
      <checksum type="sha" pkgid="YES">dd4af877194b1ec95e2e82d90c381afe766465de</checksum>
      <time file="1250467344" build="1250330046"/>
      <size package="18356476" installed="84210379" archive="81087256"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-smp-2.6.16.60-0.42.5.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-smp" epoch="0" ver="2.6.16.60" rel="0.42.4" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-smp"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-source</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.42.4"/>
      <checksum type="sha" pkgid="YES">395bd41bb6c834cd2e9413dc511a64335a9474a2</checksum>
      <time file="1250467270" build="1250329419"/>
      <size package="47395201" installed="238960887" archive="242802508"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-source-2.6.16.60-0.42.5.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-source" epoch="0" ver="2.6.16.60" rel="0.42.4" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-source"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-syms</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.42.4"/>
      <checksum type="sha" pkgid="YES">141da3365a715cb70fab6faf3c81dd301eae4a5a</checksum>
      <time file="1250467383" build="1250332034"/>
      <size package="1975348" installed="2086746" archive="2089660"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-syms-2.6.16.60-0.42.5.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-syms" epoch="0" ver="2.6.16.60" rel="0.42.4" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-syms"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-xen</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.60" rel="0.42.4"/>
      <checksum type="sha" pkgid="YES">f23c6c99cf1df9f29358f490aae5e5cfb63eb0b2</checksum>
      <time file="1250467274" build="1250330895"/>
      <size package="18242840" installed="66003524" archive="62860212"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-xen-2.6.16.60-0.42.5.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-xen" epoch="0" ver="2.6.16.60" rel="0.42.4" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-xen"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
  </atoms>
</patch>
