<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="645fcdee38c73a84cfb50dd9a46f5704"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="compat-openssl097g-2163"
    timestamp="1160757422"
    engine="1.0">
  <yum:name>compat-openssl097g</yum:name>
  <summary lang="en">Security update for compat-openssl097g</summary>
  <summary lang="de">Security update for compat-openssl097g</summary>
  <description lang="en">A buffer overflow condition within the
SSL_get_shared_ciphers() function and a DoS condition known
as &quot;parasitic public keys&quot; have been fixed. The later
problem allowed attackers to trick the OpenSSL engine to
spend an extraordinary amount of time to process public
keys. The following CAN numbers have been assigned:
CVE-2006-2937, CVE-2006-2940, CVE-2006-3738, CVE-2006-4339
and CVE-2006-4343.
</description>
  <description lang="de">A buffer overflow condition within the
SSL_get_shared_ciphers() function and a DoS condition known
as &quot;parasitic public keys&quot; have been fixed. The later
problem allowed attackers to trick the OpenSSL engine to
spend an extraordinary amount of time to process public
keys. The following CAN numbers have been assigned:
CVE-2006-2937, CVE-2006-2940, CVE-2006-3738, CVE-2006-4339
and CVE-2006-4343.
</description>
  <yum:version ver="2163" rel="0"/>
  <rpm:requires>
    <rpm:entry kind="atom" name="compat-openssl097g" epoch="0" ver="0.9.7g" rel="13.5" flags="EQ"/>
  </rpm:requires>
  <category>security</category>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>compat-openssl097g</name>
      <arch>i586</arch>
      <version epoch="0" ver="0.9.7g" rel="13.5"/>
      <checksum type="sha" pkgid="YES">d2fcbd0f9d214fa8f7d2076e09439138c065d309</checksum>
      <time file="1160992722" build="1160757422"/>
      <size package="644293" installed="1621565" archive="1624304"/>
      <location xml:base="media://#1" href="suse/i586/compat-openssl097g-0.9.7g-13.5.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="compat-openssl097g" epoch="0" ver="0.9.7g" rel="13.5" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="compat-openssl097g"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
  </atoms>
</patch>
