<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="05c9e69e5b94350af3cb539a3667ee82"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="fetchmail-2602"
    timestamp="1170808775"
    engine="1.0">
  <yum:name>fetchmail</yum:name>
  <summary lang="en">fetchmail: Securityupdate to fix potential man in the middle and denial service attacks.</summary>
  <summary lang="de">fetchmail: Sicherheitsupdate zum Beheben von MitM und Denial Service Angriffen.</summary>
  <description lang="en">Three security issues have been fixed in fetchmail:

CVE-2005-4348: fetchmail when configured for multidrop
mode, allows remote attackers to cause a denial of service
(application crash) by sending messages without headers
from upstream mail servers.

CVE-2006-5867: fetchmail did not properly enforce TLS and
may transmit cleartext passwords over unsecured links if
certain circumstances occur, which allows remote attackers
to obtain sensitive information via man-in-the-middle
(MITM) attacks.

CVE-2006-5974: fetchmail when refusing a message delivered
via the mda option, allowed remote attackers to cause a
denial of service (crash) via unknown vectors that trigger
a NULL pointer dereference when calling the ferror or
fflush functions.
</description>
  <description lang="de">Drei Sicherheitsprobleme wurden in fetchmail behoben:

CVE-2005-4348: fetchmail in Multidrop Modus erlaubt
entfernten Angreifern, einen Absturz durch Nachrichten ohne
Header von Upstream Mailservern zu verursachen.

CVE-2006-5867: fetchmail erzwang nicht immer TLS und konnte
deshalb Klartextpassworte über unsichere Links unter
gewissen Umständen übertragen, was in der Mitte sitzenden
Angreifern ermöglicht, geheime Daten mitzulesen.

CVE-2006-5974: fetchmail erlaubte beim Ablehnen von
Nachrichten bei der &quot;mda&quot; Option  entfernten Angreifern
einen Absturz auszulösen, durch NULL Pointer Zugriffe bei
den ferror() oder fflush() Funktionen.
</description>
  <yum:version ver="2602" rel="0"/>
  <rpm:requires>
    <rpm:entry kind="atom" name="fetchmail" epoch="0" ver="6.3.2" rel="15.8" flags="EQ"/>
  </rpm:requires>
  <category>security</category>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>fetchmail</name>
      <arch>i586</arch>
      <version epoch="0" ver="6.3.2" rel="15.8"/>
      <checksum type="sha" pkgid="YES">66e10ac193040d486afcac862dc229c2cb6e77ff</checksum>
      <time file="1171462956" build="1170808775"/>
      <size package="725005" installed="1971878" archive="1983928"/>
      <location href="rpm/i586/fetchmail-6.3.2-15.8.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="fetchmail" epoch="0" ver="6.3.2" rel="15.8" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="fetchmail"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <patchrpm>
          <location href="rpm/i586/fetchmail-6.3.2-15.8.i586.patch.rpm"/>
          <checksum type="sha">12644ac819059e4a0fa5728c2e40f09d72af2d42</checksum>
          <time file="1171463417" build="1170808775"/>
          <size package="139551" archive="246312"/>
          <base-version epoch="0" ver="6.3.2" rel="15"/>
        </patchrpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>fetchmail</name>
      <arch>ppc</arch>
      <version epoch="0" ver="6.3.2" rel="15.8"/>
      <checksum type="sha" pkgid="YES">1f6412756df17b2112b987bb35525344f2b9cc06</checksum>
      <time file="1171462878" build="1170808944"/>
      <size package="742293" installed="1995414" archive="2007464"/>
      <location href="rpm/ppc/fetchmail-6.3.2-15.8.ppc.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="fetchmail" epoch="0" ver="6.3.2" rel="15.8" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="fetchmail"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <patchrpm>
          <location href="rpm/ppc/fetchmail-6.3.2-15.8.ppc.patch.rpm"/>
          <checksum type="sha">97db342de329332f513d6b1ad7b569b1fa331517</checksum>
          <time file="1171463426" build="1170808944"/>
          <size package="151209" archive="269848"/>
          <base-version epoch="0" ver="6.3.2" rel="15"/>
        </patchrpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>fetchmail</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="6.3.2" rel="15.8"/>
      <checksum type="sha" pkgid="YES">0bcc746e329a8f8674f0acd7a4835b02d4297d07</checksum>
      <time file="1171462863" build="1170808684"/>
      <size package="740706" installed="1985006" archive="1997056"/>
      <location href="rpm/x86_64/fetchmail-6.3.2-15.8.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="fetchmail" epoch="0" ver="6.3.2" rel="15.8" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="fetchmail"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <patchrpm>
          <location href="rpm/x86_64/fetchmail-6.3.2-15.8.x86_64.patch.rpm"/>
          <checksum type="sha">08501e3b4765857edaf9ec5384ef1c8ae6797fc0</checksum>
          <time file="1171463430" build="1170808684"/>
          <size package="152998" archive="259440"/>
          <base-version epoch="0" ver="6.3.2" rel="15"/>
        </patchrpm>
      </pkgfiles>
    </package>
  </atoms>
</patch>
