<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="6b2d209e0f58a6056558133b78463be9"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="sledp1-openssh-4580"
    timestamp="1192665056"
    engine="1.0">
  <yum:name>sledp1-openssh</yum:name>
  <summary lang="en">Security update for OpenSSH</summary>
  <summary lang="de">Security update for OpenSSH</summary>
  <description lang="en">This update fixes a bug in ssh's cookie handling code. It
does not properly handle the situation when an untrusted
cookie cannot be created and uses a trusted X11 cookie
instead. This allows attackers to violate the intended
policy and gain privileges by causing an X client to be
treated as trusted. (CVE-2007-4752) Additionally this
update fixes a bug introduced with the last security update
for openssh. When the SSH daemon wrote to stderr (for
instance, to warn about the presence of a deprecated option
like PAMAuthenticationViaKbdInt in its configuration file),
SIGALRM was blocked for SSH sessions. This resulted in
problems with processes which rely on SIGALRM, such as
ntpdate.
</description>
  <description lang="de">This update fixes a bug in ssh's cookie handling code. It
does not properly handle the situation when an untrusted
cookie cannot be created and uses a trusted X11 cookie
instead. This allows attackers to violate the intended
policy and gain privileges by causing an X client to be
treated as trusted. (CVE-2007-4752) Additionally this
update fixes a bug introduced with the last security update
for openssh. When the SSH daemon wrote to stderr (for
instance, to warn about the presence of a deprecated option
like PAMAuthenticationViaKbdInt in its configuration file),
SIGALRM was blocked for SSH sessions. This resulted in
problems with processes which rely on SIGALRM, such as
ntpdate.
</description>
  <yum:version ver="4580" rel="0"/>
  <rpm:requires>
    <rpm:entry kind="atom" name="openssh" epoch="0" ver="4.2p1" rel="18.30" flags="EQ"/>
    <rpm:entry kind="atom" name="openssh-askpass" epoch="0" ver="4.2p1" rel="18.30" flags="EQ"/>
  </rpm:requires>
  <category>security</category>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>openssh</name>
      <arch>i586</arch>
      <version epoch="0" ver="4.2p1" rel="18.30"/>
      <checksum type="sha" pkgid="YES">eaf8b0fedfd4d56c5739407d6d69cfed0afa4803</checksum>
      <time file="1193150761" build="1192665056"/>
      <size package="677976" installed="1951265" archive="1958860"/>
      <location xml:base="media://#1" href="suse/i586/openssh-4.2p1-18.36.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="openssh" epoch="0" ver="4.2p1" rel="18.30" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="openssh"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>openssh-askpass</name>
      <arch>i586</arch>
      <version epoch="0" ver="4.2p1" rel="18.30"/>
      <checksum type="sha" pkgid="YES">9e690d673f077de9f518b4c3b84eb2d0fa9a14dd</checksum>
      <time file="1193150761" build="1192665056"/>
      <size package="41317" installed="35965" archive="36856"/>
      <location xml:base="media://#1" href="suse/i586/openssh-askpass-4.2p1-18.36.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="openssh-askpass" epoch="0" ver="4.2p1" rel="18.30" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="openssh-askpass"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
  </atoms>
</patch>
