<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="85730a084b9f1c261a7f6b4f2ad9d421"!-->
<update status="stable" from="maint-coord@suse.de" type="security" version="676">
  <id>dbg111-strongswan</id>
  <title>strongswan security update</title>
  <release>openSUSE 11.1</release>
  <issued date="1237910294"/>
  <references>
    <reference href="https://bugzilla.novell.com/show_bug.cgi?id=487762" id="487762" title="bug number 487762" type="bugzilla"/>
  </references>
  <description>By sending a specially crafted Dead Peer Detection (DPD)
packet remote attackers could crash the pluto IKE daemon
(CVE-2009-0790).
</description>
  <pkglist>
    <collection>
        <package name="strongswan-debuginfo" arch="i586" version="4.2.8" release="1.24.1">
          <filename>strongswan-debuginfo-4.2.8-1.24.1.i586.rpm</filename>
        </package>
        <package name="strongswan-debuginfo" arch="ppc" version="4.2.8" release="1.24.1">
          <filename>strongswan-debuginfo-4.2.8-1.24.1.ppc.rpm</filename>
        </package>
        <package name="strongswan-debuginfo" arch="x86_64" version="4.2.8" release="1.24.1">
          <filename>strongswan-debuginfo-4.2.8-1.24.1.x86_64.rpm</filename>
        </package>
        <package name="strongswan-debugsource" arch="i586" version="4.2.8" release="1.24.1">
          <filename>strongswan-debugsource-4.2.8-1.24.1.i586.rpm</filename>
        </package>
        <package name="strongswan-debugsource" arch="ppc" version="4.2.8" release="1.24.1">
          <filename>strongswan-debugsource-4.2.8-1.24.1.ppc.rpm</filename>
        </package>
        <package name="strongswan-debugsource" arch="x86_64" version="4.2.8" release="1.24.1">
          <filename>strongswan-debugsource-4.2.8-1.24.1.x86_64.rpm</filename>
        </package>
    </collection>
  </pkglist>
</update>
