<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="05c9e69e5b94350af3cb539a3667ee82"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="fetchmail-2602"
    timestamp="1170936650"
    engine="1.0">
  <yum:name>fetchmail</yum:name>
  <summary lang="en">fetchmail: Securityupdate to fix potential man in the middle and denial service attacks.</summary>
  <summary lang="de">fetchmail: Sicherheitsupdate zum Beheben von MitM und Denial Service Angriffen.</summary>
  <description lang="en">Three security issues have been fixed in fetchmail:

CVE-2005-4348: fetchmail when configured for multidrop
mode, allows remote attackers to cause a denial of service
(application crash) by sending messages without headers
from upstream mail servers.

CVE-2006-5867: fetchmail did not properly enforce TLS and
may transmit cleartext passwords over unsecured links if
certain circumstances occur, which allows remote attackers
to obtain sensitive information via man-in-the-middle
(MITM) attacks.

CVE-2006-5974: fetchmail when refusing a message delivered
via the mda option, allowed remote attackers to cause a
denial of service (crash) via unknown vectors that trigger
a NULL pointer dereference when calling the ferror or
fflush functions.
</description>
  <description lang="de">Drei Sicherheitsprobleme wurden in fetchmail behoben:

CVE-2005-4348: fetchmail in Multidrop Modus erlaubt
entfernten Angreifern, einen Absturz durch Nachrichten ohne
Header von Upstream Mailservern zu verursachen.

CVE-2006-5867: fetchmail erzwang nicht immer TLS und konnte
deshalb Klartextpassworte über unsichere Links unter
gewissen Umständen übertragen, was in der Mitte sitzenden
Angreifern ermöglicht, geheime Daten mitzulesen.

CVE-2006-5974: fetchmail erlaubte beim Ablehnen von
Nachrichten bei der &quot;mda&quot; Option  entfernten Angreifern
einen Absturz auszulösen, durch NULL Pointer Zugriffe bei
den ferror() oder fflush() Funktionen.
</description>
  <yum:version ver="2602" rel="0"/>
  <rpm:requires>
    <rpm:entry kind="atom" name="fetchmail" epoch="0" ver="6.3.5" rel="23.2" flags="EQ"/>
  </rpm:requires>
  <category>security</category>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>fetchmail</name>
      <arch>i586</arch>
      <version epoch="0" ver="6.3.5" rel="23.2"/>
      <checksum type="sha" pkgid="YES">b04e6b3c715a5e35952d77228accc0d21d5ac949</checksum>
      <time file="1171462820" build="1170936650"/>
      <size package="756152" installed="2085221" archive="2097576"/>
      <location href="rpm/i586/fetchmail-6.3.5-23.2.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="fetchmail" epoch="0" ver="6.3.5" rel="23.2" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="fetchmail"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <patchrpm>
          <location href="rpm/i586/fetchmail-6.3.5-23.2.i586.patch.rpm"/>
          <checksum type="sha">f91b41be37a6500f9665d4a3243ade7c17a5c538</checksum>
          <time file="1171463434" build="1170936650"/>
          <size package="143096" archive="254584"/>
          <base-version epoch="0" ver="6.3.5" rel="13"/>
        </patchrpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>fetchmail</name>
      <arch>ppc</arch>
      <version epoch="0" ver="6.3.5" rel="23.2"/>
      <checksum type="sha" pkgid="YES">fbedbd2afda15b6933e633a7ac5b3ba0741ac00c</checksum>
      <time file="1171462992" build="1170938844"/>
      <size package="771760" installed="2109853" archive="2122208"/>
      <location href="rpm/ppc/fetchmail-6.3.5-23.2.ppc.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="fetchmail" epoch="0" ver="6.3.5" rel="23.2" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="fetchmail"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <patchrpm>
          <location href="rpm/ppc/fetchmail-6.3.5-23.2.ppc.patch.rpm"/>
          <checksum type="sha">370f91c9ee5d3de2097aa06609e0784541cd3ad4</checksum>
          <time file="1171463440" build="1170938844"/>
          <size package="155130" archive="279216"/>
          <base-version epoch="0" ver="6.3.5" rel="13"/>
        </patchrpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>fetchmail</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="6.3.5" rel="23.2"/>
      <checksum type="sha" pkgid="YES">3d014f952334e88dd0fe1a536e1f098b7d25d127</checksum>
      <time file="1171462790" build="1170937311"/>
      <size package="772765" installed="2099241" archive="2111596"/>
      <location href="rpm/x86_64/fetchmail-6.3.5-23.2.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="fetchmail" epoch="0" ver="6.3.5" rel="23.2" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="fetchmail"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <patchrpm>
          <location href="rpm/x86_64/fetchmail-6.3.5-23.2.x86_64.patch.rpm"/>
          <checksum type="sha">0451c71d3f1b58ccbc62d2a8178624ad880eca37</checksum>
          <time file="1171463443" build="1170937311"/>
          <size package="158075" archive="268604"/>
          <base-version epoch="0" ver="6.3.5" rel="13"/>
        </patchrpm>
      </pkgfiles>
    </package>
  </atoms>
</patch>
