<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="05412985c36daeff0c33b88942b68c2c"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="openssh-2184"
    timestamp="1161282727"
    engine="1.0">
  <yum:name>openssh</yum:name>
  <summary lang="en">Security update for OpenSSH</summary>
  <summary lang="de">Security update for OpenSSH</summary>
  <description lang="en">Several security problems were fixed in OpenSSH:

- CVE-2006-4924: A denial of service problem has been fixed
  in OpenSSH which could be used to cause lots of CPU
  consumption on a remote openssh server.
- CVE-2006-4925: If a remote attacker is able to inject
  network traffic this could be used to cause a client
  connection to close.
- CVE-2006-5051: Fixed an unsafe signal hander reported by
  Mark Dowd. The signal handler was vulnerable to a race
  condition that could be exploited to perform a
  pre-authentication denial of service. This vulnerability
  could theoretically lead to pre-authentication remote
  code execution if GSSAPI authentication is enabled, but
  the likelihood of successful exploitation appears remote.
- CVE-2006-5052: Fixed a GSSAPI authentication abort that
  could be used to determine the validity of usernames on
  some platforms.
</description>
  <description lang="de">Several security problems were fixed in OpenSSH:

- CVE-2006-4924: A denial of service problem has been fixed
  in OpenSSH which could be used to cause lots of CPU
  consumption on a remote openssh server.
- CVE-2006-4925: If a remote attacker is able to inject
  network traffic this could be used to cause a client
  connection to close.
- CVE-2006-5051: Fixed an unsafe signal hander reported by
  Mark Dowd. The signal handler was vulnerable to a race
  condition that could be exploited to perform a
  pre-authentication denial of service. This vulnerability
  could theoretically lead to pre-authentication remote
  code execution if GSSAPI authentication is enabled, but
  the likelihood of successful exploitation appears remote.
- CVE-2006-5052: Fixed a GSSAPI authentication abort that
  could be used to determine the validity of usernames on
  some platforms.
</description>
  <yum:version ver="2184" rel="0"/>
  <rpm:requires>
    <rpm:entry kind="atom" name="openssh" epoch="0" ver="4.2p1" rel="18.9" flags="EQ"/>
    <rpm:entry kind="atom" name="openssh-askpass" epoch="0" ver="4.2p1" rel="18.9" flags="EQ"/>
  </rpm:requires>
  <category>security</category>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>openssh</name>
      <arch>i586</arch>
      <version epoch="0" ver="4.2p1" rel="18.9"/>
      <checksum type="sha" pkgid="YES">b61c1d9c12e1fe46bd18584d4387f4e34c22d686</checksum>
      <time file="1161343116" build="1161282727"/>
      <size package="675723" installed="1935893" archive="1943076"/>
      <location xml:base="media://#1" href="suse/i586/openssh-4.2p1-18.12.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="openssh" epoch="0" ver="4.2p1" rel="18.9" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="openssh"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>openssh-askpass</name>
      <arch>i586</arch>
      <version epoch="0" ver="4.2p1" rel="18.9"/>
      <checksum type="sha" pkgid="YES">28000f336c876fe0dde8511e26daf4e1806417ec</checksum>
      <time file="1161343116" build="1161282727"/>
      <size package="40765" installed="35745" archive="36636"/>
      <location xml:base="media://#1" href="suse/i586/openssh-askpass-4.2p1-18.12.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="openssh-askpass" epoch="0" ver="4.2p1" rel="18.9" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="openssh-askpass"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
  </atoms>
</patch>
