<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="8c1215bc2f7e5cfe622c100c40347cc2"!-->
<update status="stable" from="maint-coord@suse.de" type="security" version="3680">
  <id>dbg111-exim</id>
  <title>exim security update</title>
  <release>openSUSE 11.1 DEBUGINFO</release>
  <issued date="1292025638"/>
  <references>
    <reference href="https://bugzilla.novell.com/show_bug.cgi?id=658731" id="658731" title="bug number 658731" type="bugzilla"/>
    <reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4344" id="CVE-2010-4344" title="CVE-2010-4344" type="cve"/>
    <reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4345" id="CVE-2010-4345" title="CVE-2010-4345" type="cve"/>
  </references>
  <description>remote attackers could trick exim into running arbitrary
code (CVE-2010-4344). A privilege escalation flaw allowed
attackers to gain root access (CVE-2010-4345).
</description>
  <pkglist>
    <collection>
        <package name="exim-debuginfo" arch="i586" version="4.69" release="70.15.1">
          <filename>exim-debuginfo-4.69-70.15.1.i586.rpm</filename>
        </package>
        <package name="exim-debuginfo" arch="ppc" version="4.69" release="70.15.1">
          <filename>exim-debuginfo-4.69-70.15.1.ppc.rpm</filename>
        </package>
        <package name="exim-debuginfo" arch="x86_64" version="4.69" release="70.15.1">
          <filename>exim-debuginfo-4.69-70.15.1.x86_64.rpm</filename>
        </package>
        <package name="exim-debugsource" arch="i586" version="4.69" release="70.15.1">
          <filename>exim-debugsource-4.69-70.15.1.i586.rpm</filename>
        </package>
        <package name="exim-debugsource" arch="ppc" version="4.69" release="70.15.1">
          <filename>exim-debugsource-4.69-70.15.1.ppc.rpm</filename>
        </package>
        <package name="exim-debugsource" arch="x86_64" version="4.69" release="70.15.1">
          <filename>exim-debugsource-4.69-70.15.1.x86_64.rpm</filename>
        </package>
    </collection>
  </pkglist>
</update>
