<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="16e2a93b390a1ceb86b0945a88a4d415"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="openssl-2141"
    timestamp="1159313099"
    engine="1.0">
  <yum:name>openssl</yum:name>
  <summary lang="en">Security update for OpenSSL</summary>
  <summary lang="de">Security update for OpenSSL</summary>
  <description lang="en">A buffer overflow condition within the
SSL_get_shared_ciphers() function and a DoS condition known
as &quot;parasitic public keys&quot; have been fixed. The later
problem allowed attackers to trick the OpenSSL engine to
spend an extraordinary amount of time to process public
keys. The following CAN numbers have been assigned:
CVE-2006-2937, CVE-2006-2940, CVE-2006-3738 and
CVE-2006-4343.

</description>
  <description lang="de">A buffer overflow condition within the
SSL_get_shared_ciphers() function and a DoS condition known
as &quot;parasitic public keys&quot; have been fixed. The later
problem allowed attackers to trick the OpenSSL engine to
spend an extraordinary amount of time to process public
keys. The following CAN numbers have been assigned:
CVE-2006-2937, CVE-2006-2940, CVE-2006-3738 and
CVE-2006-4343.

</description>
  <yum:version ver="2141" rel="0"/>
  <rpm:requires>
    <rpm:entry kind="atom" name="openssl" epoch="0" ver="0.9.8a" rel="18.10" flags="EQ"/>
    <rpm:entry kind="atom" name="openssl-devel" epoch="0" ver="0.9.8a" rel="18.10" flags="EQ"/>
  </rpm:requires>
  <category>security</category>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>openssl</name>
      <arch>i586</arch>
      <version epoch="0" ver="0.9.8a" rel="18.10"/>
      <checksum type="sha" pkgid="YES">e86b8c77073e20d64cfbaadf30f1f51134a8145e</checksum>
      <time file="1159361174" build="1159313099"/>
      <size package="1163998" installed="2662096" archive="2681520"/>
      <location xml:base="media://#1" href="suse/i586/openssl-0.9.8a-18.13.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="openssl" epoch="0" ver="0.9.8a" rel="18.10" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="openssl"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>openssl-devel</name>
      <arch>i586</arch>
      <version epoch="0" ver="0.9.8a" rel="18.10"/>
      <checksum type="sha" pkgid="YES">aeb5db5129ffa991ada30f23621b29430ba7d01c</checksum>
      <time file="1159361175" build="1159313099"/>
      <size package="902286" installed="3848153" archive="3859280"/>
      <location xml:base="media://#1" href="suse/i586/openssl-devel-0.9.8a-18.13.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="openssl-devel" epoch="0" ver="0.9.8a" rel="18.10" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="openssl-devel"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
  </atoms>
</patch>
