<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="c061b25f20728b088a7357bd5622663c"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="slesp3-compat-openssl097g-6657"
    timestamp="1258105298"
    engine="1.0">
  <yum:name>slesp3-compat-openssl097g</yum:name>
  <summary lang="en">Security update for OpenSSL</summary>
  <summary lang="de">Security update for OpenSSL</summary>
  <description lang="en">The TLS/SSLv3 protocol as implemented in openssl prior to
this update was not able to associate data to a
renegotiated connection. This allowed man-in-the-middle
attackers to inject HTTP requests in a HTTPS session
without being noticed. For example Apache's mod_ssl was
vulnerable to this kind of attack because it uses openssl.
Please note that renegotiation will be disabled by this
update and may cause problems in some cases.
(CVE-2009-3555: CVSS v2 Base Score: 6.4)
</description>
  <description lang="de">The TLS/SSLv3 protocol as implemented in openssl prior to
this update was not able to associate data to a
renegotiated connection. This allowed man-in-the-middle
attackers to inject HTTP requests in a HTTPS session
without being noticed. For example Apache's mod_ssl was
vulnerable to this kind of attack because it uses openssl.
Please note that renegotiation will be disabled by this
update and may cause problems in some cases.
(CVE-2009-3555: CVSS v2 Base Score: 6.4)
</description>
  <yum:version ver="6657" rel="0"/>
  <rpm:requires>
    <rpm:entry kind="atom" name="compat-openssl097g" epoch="0" ver="0.9.7g" rel="13.19.1" flags="EQ"/>
    <rpm:entry kind="atom" name="compat-openssl097g-32bit" epoch="0" ver="0.9.7g" rel="13.19.1" flags="EQ"/>
  </rpm:requires>
  <category>security</category>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>compat-openssl097g</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="0.9.7g" rel="13.19.1"/>
      <checksum type="sha" pkgid="YES">21ecc33d27e4adc9322e4c9de7a1c91b3044b3f4</checksum>
      <time file="1258105303" build="1258105298"/>
      <size package="724201" installed="1902393" archive="1905140"/>
      <location xml:base="media://#1" href="suse/x86_64/compat-openssl097g-0.9.7g-13.19.1.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="compat-openssl097g" epoch="0" ver="0.9.7g" rel="13.19.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="compat-openssl097g"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>compat-openssl097g-32bit</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="0.9.7g" rel="13.19.1"/>
      <checksum type="sha" pkgid="YES">863a7d87c0c0c312bf0fa8ec7ff597fcf1a1bbaf</checksum>
      <time file="1258105387" build="1258105386"/>
      <size package="530589" installed="1220156" archive="1220556"/>
      <location xml:base="media://#1" href="suse/x86_64/compat-openssl097g-32bit-0.9.7g-13.19.1.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="compat-openssl097g-32bit" epoch="0" ver="0.9.7g" rel="13.19.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="compat-openssl097g-32bit"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
  </atoms>
</patch>
