<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="50538083731ac0d0f4674f55be4a9de9"!-->
<update status="stable" from="maint-coord@suse.de" type="security" version="3507">
  <id>dbg111-libopenssl-devel</id>
  <title>openssl security update</title>
  <release>openSUSE 11.1 DEBUGINFO</release>
  <issued date="1289497131"/>
  <references>
    <reference href="https://bugzilla.novell.com/show_bug.cgi?id=651003" id="651003" title="bug number 651003" type="bugzilla"/>
    <reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3864" id="CVE-2010-3864" title="CVE-2010-3864" type="cve"/>
  </references>
  <description>Multithreaded OpenSSL servers using the TLS server
extension are vulnerable to a buffer overrun attack.
CVE-2010-3864 has been assigned to this issue.
</description>
  <pkglist>
    <collection>
        <package name="openssl-debuginfo" arch="i586" version="0.9.8h" release="28.18.1">
          <filename>openssl-debuginfo-0.9.8h-28.18.1.i586.rpm</filename>
        </package>
        <package name="openssl-debuginfo" arch="ppc" version="0.9.8h" release="28.18.1">
          <filename>openssl-debuginfo-0.9.8h-28.18.1.ppc.rpm</filename>
        </package>
        <package name="openssl-debuginfo" arch="x86_64" version="0.9.8h" release="28.18.1">
          <filename>openssl-debuginfo-0.9.8h-28.18.1.x86_64.rpm</filename>
        </package>
        <package name="openssl-debugsource" arch="i586" version="0.9.8h" release="28.18.1">
          <filename>openssl-debugsource-0.9.8h-28.18.1.i586.rpm</filename>
        </package>
        <package name="openssl-debugsource" arch="ppc" version="0.9.8h" release="28.18.1">
          <filename>openssl-debugsource-0.9.8h-28.18.1.ppc.rpm</filename>
        </package>
        <package name="openssl-debugsource" arch="x86_64" version="0.9.8h" release="28.18.1">
          <filename>openssl-debugsource-0.9.8h-28.18.1.x86_64.rpm</filename>
        </package>
    </collection>
  </pkglist>
</update>
