<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="182cb577da1e92564cd020859d8e8f5d"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="sdkp2-opensc-5910"
    timestamp="1221003352"
    engine="1.0">
  <yum:name>sdkp2-opensc</yum:name>
  <summary lang="en">Security update for opensc</summary>
  <summary lang="de">Security update for opensc</summary>
  <description lang="en">This update fixes a security issues with opensc that
occured when initializing blank smart cards with Siemens
CardOS M4. After the initialization anyone could set the
PIN of the smart card without authorization (CVE-2008-2235).

NOTE: Already initialized cards are still vulnerable after
this update. Please use the command-line tool pkcs15-tool
with option
--test-update and --update when necessary.

Don't forget to reinitialize your smart cards if you are
using cards  with Siemens CardOS M4 operating system that
were initialized using opensc!

Please find more information at
http://www.opensc-project.org/security.html

This is the second attempt to fix this problem. The
previous update was unforunately incomplete.
</description>
  <description lang="de">This update fixes a security issues with opensc that
occured when initializing blank smart cards with Siemens
CardOS M4. After the initialization anyone could set the
PIN of the smart card without authorization (CVE-2008-2235).

NOTE: Already initialized cards are still vulnerable after
this update. Please use the command-line tool pkcs15-tool
with option
--test-update and --update when necessary.

Don't forget to reinitialize your smart cards if you are
using cards  with Siemens CardOS M4 operating system that
were initialized using opensc!

Please find more information at
http://www.opensc-project.org/security.html

This is the second attempt to fix this problem. The
previous update was unforunately incomplete.
</description>
  <yum:version ver="5910" rel="0"/>
  <rpm:requires>
    <rpm:entry kind="atom" name="opensc-32bit" epoch="0" ver="0.9.6" rel="17.9" flags="EQ"/>
    <rpm:entry kind="atom" name="opensc-devel" epoch="0" ver="0.9.6" rel="17.9" flags="EQ"/>
  </rpm:requires>
  <category>security</category>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>opensc-32bit</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="0.9.6" rel="17.9"/>
      <checksum type="sha" pkgid="YES">bcc499b76dc7cfb1ab697139ada1b3016f7fd95c</checksum>
      <time file="1221038387" build="1221003352"/>
      <size package="271203" installed="709791" archive="713672"/>
      <location xml:base="media://#1" href="suse/x86_64/opensc-32bit-0.9.6-17.12.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="opensc-32bit" epoch="0" ver="0.9.6" rel="17.9" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="opensc-32bit"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>opensc-devel</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="0.9.6" rel="17.9"/>
      <checksum type="sha" pkgid="YES">b39dd78c634a56c3795a62d2246657ff6acaf193</checksum>
      <time file="1221038499" build="1221003224"/>
      <size package="332217" installed="1431619" archive="1438376"/>
      <location xml:base="media://#1" href="suse/x86_64/opensc-devel-0.9.6-17.12.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="opensc-devel" epoch="0" ver="0.9.6" rel="17.9" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="opensc-devel"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
  </atoms>
</patch>
