<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="e407d6748749e6e6024e5bb37c13be0e"!-->
<update status="stable" from="maint-coord@suse.de" type="security" version="3183">
  <id>dbg111-bzip2</id>
  <title>bzip2 security update</title>
  <release>openSUSE 11.1 DEBUGINFO</release>
  <issued date="1285112179"/>
  <references>
    <reference href="https://bugzilla.novell.com/show_bug.cgi?id=636978" id="636978" title="bug number 636978" type="bugzilla"/>
    <reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0405" id="CVE-2010-0405" title="CVE-2010-0405" type="cve"/>
  </references>
  <description>This update fixes an integer overflow in the BZ2_decompress
function of bzip2/libbz2. This can be exploited via a
crafted archive to cause a denial of service or even
execute arbitrary code. (CVE-2010-0405)
</description>
  <pkglist>
    <collection>
        <package name="bzip2-debuginfo" arch="i586" version="1.0.5" release="34.6.1">
          <filename>bzip2-debuginfo-1.0.5-34.6.1.i586.rpm</filename>
        </package>
        <package name="bzip2-debuginfo" arch="ppc" version="1.0.5" release="34.6.1">
          <filename>bzip2-debuginfo-1.0.5-34.6.1.ppc.rpm</filename>
        </package>
        <package name="bzip2-debuginfo" arch="x86_64" version="1.0.5" release="34.6.1">
          <filename>bzip2-debuginfo-1.0.5-34.6.1.x86_64.rpm</filename>
        </package>
        <package name="bzip2-debugsource" arch="i586" version="1.0.5" release="34.6.1">
          <filename>bzip2-debugsource-1.0.5-34.6.1.i586.rpm</filename>
        </package>
        <package name="bzip2-debugsource" arch="ppc" version="1.0.5" release="34.6.1">
          <filename>bzip2-debugsource-1.0.5-34.6.1.ppc.rpm</filename>
        </package>
        <package name="bzip2-debugsource" arch="x86_64" version="1.0.5" release="34.6.1">
          <filename>bzip2-debugsource-1.0.5-34.6.1.x86_64.rpm</filename>
        </package>
    </collection>
  </pkglist>
</update>
