This kernel update for openSUSE 10.3 fixes some bugs and several security problems including a buffer overflow in the Stream Control Transmission Protocol (sctp) implementation allows remote attackers to remotely execute code. A buffer overflow in CIFS allows remote attackers to cause a denial of service (crash) or potential code execution. The exit_notify function did not restrict exit signals when the CAP_KILL capability is held, which allows local users to send an arbitrary signal to a process. The shm subsystem misinterprets the data type of an inode, which allows local users to cause a denial of service (system hang). An integer overflow in rose_sendmsg might allow attackers to obtain sensitive information. The clone system call kernel allows local users to send arbitrary signals to a parent process from an unprivileged child process. Updated packages are available from download.opensuse.org.