The touchpad was another matter. Like the Dell Inspiron Mini 10, Lenovo elected to integrate the buttons into the touchpad itself. While it's fairly large (2.6 x 1.4 inches) and smooth enough to speed across the desktop, it was also somewhat finicky. The cursor jumped around at times, especially when trying to select a block of text. Also, the buttons are somewhat stiff. The touchpad, which uses a Synaptics driver, is also capable of multitouch gestures such as pinch and zoom (these are turned off by default).
Recommendation: For most Windows users, we highly recommend using a driver update utility such as DriverDoc [Download DriverDoc - Product by Solvusoft] to help update Lenovo Laptop drivers. DriverDoc automatically downloads and updates your IdeaPad S10-3 driver, ensuring you are installing the correct version for your operating system.
IdeaPad S10-3 errors may be linked to system drivers that are corrupt or obsolete. Device drivers can fail without any apparent reason. The best part is that your Laptop drivers can always be modified to solve the laptop dilemma.
Finding the correct Laptop driver directly on the manufacturer's website for your hardware might seem futile. Despite having experience at locating, installing, and manually upgrading IdeaPad S10-3 drivers, the task will be time consuming and highly bothersome. This is problematic because installing the wrong or incompatible driver will potentially produce worse results.
To keep up with all of the essential new updates, we suggest going with a driver updater program. A driver update tool makes sure that the computer's operating system drivers are up to date and are correctly suited to the hardware in your system. With driver backup, you can rollback any driver's software to an earlier version if there is a malfunction.
1.Click on the Download link, to download the file.2.When the Download window opens, click Save the setup to disk and click OK. The Save In:window appears.3.From the Save In: field, click the down arrow then click toselect where you want to save and click Save. The Lenovo ideapad S10 audio Driver will download to your saved location.4.After the Download Complete , click Close. The Lenovo ideapad S10 Laptop Audio Drivericon appears on your desktop.
We were unable to find drivers for your product. Try manually selecting your operating system. If your operating system is not listed then HP may not provide driver support for your product with that operating system.
If you could not find the exact driver for your hardware device or you aren't sure which driver is right one, we have a program that will detect your hardware specifications and identify the correct driver for your needs. Please click here to download.
If the driver listed is not the right version or operating system, search our driver archive for the correct version. Enter Lenovo IdeaPad S10-3 into the search box above and then submit. In the results, choose the best match for your PC and operating system.
Once you have downloaded your new driver, you'll need to install it. In Windows, use a built-in utility called Device Manager, which allows you to see all of the devices recognized by your system, and the drivers associated with them.
The agp_generic_remove_memory function in drivers/char/agp/generic.c in the Linux kernel before 188.8.131.52 does not validate a certain start parameter, which allows local users to gain privileges or cause a denial of service (system crash) via a crafted AGPIOC_UNBIND agp_ioctl ioctl call, a different vulnerability than CVE-2011-1745.
* ALSA: sound/pci/rme9652: prevent reading uninitialized stack memory - LP: #712723,#712737 * can-bcm: fix minor heap overflow - LP: #710680 * drivers/video/via/ioctl.c: prevent reading uninitialized stack memory - LP: #712744 * gdth: integer overflow in ioctl - LP: #711797 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * net: fix rds_iovec page count overflow, CVE-2010-3865 - LP: #709153 - CVE-2010-3865 * net: packet: fix information leak to userland, CVE-2010-3876 - LP: #711045 - CVE-2010-3876 * net: tipc: fix information leak to userland, CVE-2010-3877 - LP: #711291 - CVE-2010-3877 * net: Truncate recvfrom and sendto length to INT_MAX. - LP: #708839 * posix-cpu-timers: workaround to suppress the problems with mt exec - LP: #712609 * sys_semctl: fix kernel stack leakage - LP: #712749 * x25: Patch to fix bug 15678 - x25 accesses fields beyond end of packet. - LP: #709372 * memory corruption in X.25 facilities parsing - LP: #709372 * net: ax25: fix information leak to userland, CVE-2010-3875 - LP: #710714 - CVE-2010-3875 * net: ax25: fix information leak to userland harder, CVE-2010-3875 - LP: #710714 - CVE-2010-3875 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * net: clear heap allocations for privileged ethtool actions - LP: #771445 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #772543 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #772543 * exec: make argv/envp memory visible to oom-killer - LP: #768408 * next_pidmap: fix overflow condition - LP: #784727 * proc: do proper range check on readdir offset - LP: #784727 * mpt2sas: prevent heap overflows and unchecked reads - LP: #787145 * agp: fix arbitrary kernel memory writes - LP: #788684 * can: add missing socket check in can/raw release - LP: #788694 * agp: fix OOM and buffer overflow - LP: #788700 * do_exit(): make sure that we run with get_fs() == USER_DS - CVE-2010-4258 - LP: #723945 - CVE-2010-4258 * x25: Prevent crashing when parsing bad X.25 facilities - CVE-2010-4164 - LP: #731199 - CVE-2010-4164 * install_special_mapping skips security_file_mmap check - CVE-2010-4346 - LP: #731971 - CVE-2010-4346 * econet: Fix crash in aun_incoming() - CVE-2010-4342 - LP: #736394 - CVE-2010-4342 * sound: Prevent buffer overflow in OSS load_mixer_volumes - CVE-2010-4527 - LP: #737073 - CVE-2010-4527 * irda: prevent integer underflow in IRLMP_ENUMDEVICES, CVE-2010-4529 - LP: #737823 - CVE-2010-4529 * CAN: Use inode instead of kernel address for /proc file - CVE-2010-4565 - LP: #765007...
* drm/radeon/kms: check AA resolve registers on r300, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * drm/radeon: fix regression with AA resolve checking, CVE-2011-1016 - LP: #745686 - CVE-2011-1016 * can-bcm: fix minor heap overflow - LP: #690730 * CAN: Use inode instead of kernel address for /proc file, CVE-2010-4565 - LP: #765007 - CVE-2010-4565 * av7110: check for negative array offset - LP: #747520 * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1, CVE-2011-0711 - LP: #767740 - CVE-2011-0711 * ALSA: caiaq - Fix possible string-buffer overflow - LP: #747520 * IB/cm: Bump reference count on cm_id before invoking callback, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * RDMA/cma: Fix crash in request handlers, CVE-2011-0695 - LP: #770369 - CVE-2011-0695 * Treat writes as new when holes span across page boundaries, CVE-2011-0463 - LP: #770483 - CVE-2011-0463 * net: clear heap allocations for privileged ethtool actions - LP: #686158 * usb: iowarrior: don't trust report_size for buffer size - LP: #747520 * fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017 - LP: #771382 - CVE-2011-1017 * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code - LP: #747520 * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo - LP: #747520 * exec: make argv/envp memory visible to oom-killer - LP: #690730 * next_pidmap: fix overflow condition - LP: #772560 * proc: do proper range check on readdir offset - LP: #772560 * ALSA: sound/pci/asihpi: check adapter index in hpi_ioctl, CVE-2011-1169 - LP: #785331 - CVE-2011-1169 * mpt2sas: prevent heap overflows and unchecked reads, CVE-2011-1494 - LP: #787145 - CVE-2011-1494 * agp: fix arbitrary kernel memory writes, CVE-1011-2022 - LP: #788684 - CVE-1011-2022 * can: add missing socket check in can/raw release, CVE-2011-1748 - LP: #788694 - CVE-2011-1748 * agp: fix OOM and buffer overflow - LP: #788700 * drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory - CVE-2010-3296 - CVE-2010-3296 * drivers/net/eql.c: prevent reading uninitialized stack memory - CVE-2010-3297 - CVE-2010-3297 * inet_diag: Make sure we actually run the same bytecode we audited, CVE-2010-3880 - LP: #711865 - CVE-2010-3880 * setup_arg_pages: diagnose excessive argume... 2b1af7f3a8