<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="87fa06ce6c77615d48e5d5ced99a033e"!-->
<update status="stable" from="maint-coord@suse.de" type="security" version="480">
  <id>dbg111-compat-openssl097g</id>
  <title>OpenSSL incorrect checks for malformed signatures</title>
  <release>openSUSE 11.1</release>
  <issued date="1233777324"/>
  <references>
    <reference href="https://bugzilla.novell.com/show_bug.cgi?id=459468" id="459468" title="bug number 459468" type="bugzilla"/>
  </references>
  <description>This update improves the verification of return values.
Prior to this udpate it was possible to bypass the
certification chain checks of openssl. (CVE-2008-5077)
</description>
  <pkglist>
    <collection>
        <package name="compat-openssl097g-debuginfo" arch="i586" version="0.9.7g" release="146.9.1">
          <filename>compat-openssl097g-debuginfo-0.9.7g-146.9.1.i586.rpm</filename>
        </package>
        <package name="compat-openssl097g-debuginfo" arch="ppc" version="0.9.7g" release="146.9.1">
          <filename>compat-openssl097g-debuginfo-0.9.7g-146.9.1.ppc.rpm</filename>
        </package>
        <package name="compat-openssl097g-debuginfo" arch="x86_64" version="0.9.7g" release="146.9.1">
          <filename>compat-openssl097g-debuginfo-0.9.7g-146.9.1.x86_64.rpm</filename>
        </package>
        <package name="compat-openssl097g-debugsource" arch="i586" version="0.9.7g" release="146.9.1">
          <filename>compat-openssl097g-debugsource-0.9.7g-146.9.1.i586.rpm</filename>
        </package>
        <package name="compat-openssl097g-debugsource" arch="ppc" version="0.9.7g" release="146.9.1">
          <filename>compat-openssl097g-debugsource-0.9.7g-146.9.1.ppc.rpm</filename>
        </package>
        <package name="compat-openssl097g-debugsource" arch="x86_64" version="0.9.7g" release="146.9.1">
          <filename>compat-openssl097g-debugsource-0.9.7g-146.9.1.x86_64.rpm</filename>
        </package>
    </collection>
  </pkglist>
</update>
