<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="7cc020b24990406f52b364aad965f3be"!-->
<update status="stable" from="maint-coord@suse.de" type="security" version="461">
  <id>dbg111-libopenssl-devel</id>
  <title>OpenSSL incorrect checks for malformed signatures</title>
  <release>openSUSE 11.1</release>
  <issued date="1232545342"/>
  <references>
    <reference href="https://bugzilla.novell.com/show_bug.cgi?id=459468" id="459468" title="bug number 459468" type="bugzilla"/>
  </references>
  <description>This update improves the verification of return values.
Prior to this udpate it was possible to bypass the
certification chain checks of openssl. (CVE-2008-5077)
</description>
  <pkglist>
    <collection>
        <package name="openssl-debuginfo" arch="i586" version="0.9.8h" release="28.7.1">
          <filename>openssl-debuginfo-0.9.8h-28.7.1.i586.rpm</filename>
        </package>
        <package name="openssl-debuginfo" arch="ppc" version="0.9.8h" release="28.7.1">
          <filename>openssl-debuginfo-0.9.8h-28.7.1.ppc.rpm</filename>
        </package>
        <package name="openssl-debuginfo" arch="x86_64" version="0.9.8h" release="28.7.1">
          <filename>openssl-debuginfo-0.9.8h-28.7.1.x86_64.rpm</filename>
        </package>
        <package name="openssl-debugsource" arch="i586" version="0.9.8h" release="28.7.1">
          <filename>openssl-debugsource-0.9.8h-28.7.1.i586.rpm</filename>
        </package>
        <package name="openssl-debugsource" arch="ppc" version="0.9.8h" release="28.7.1">
          <filename>openssl-debugsource-0.9.8h-28.7.1.ppc.rpm</filename>
        </package>
        <package name="openssl-debugsource" arch="x86_64" version="0.9.8h" release="28.7.1">
          <filename>openssl-debugsource-0.9.8h-28.7.1.x86_64.rpm</filename>
        </package>
    </collection>
  </pkglist>
</update>
