<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="4f850d1e2b871db609de64ec70f0089c"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="sdkp1-java-1_4_2-ibm-3851"
    timestamp="1183986818"
    engine="1.0">
  <yum:name>sdkp1-java-1_4_2-ibm</yum:name>
  <summary lang="en">Security update for IBM Java</summary>
  <summary lang="de">Security update for IBM Java</summary>
  <description lang="en">The IBM Java JRE/SDK has been brought to release 1.4.2 SR
containing several bugfixes, including following security
fixes:

CVE-2007-0243: A buffer overflow vulnerability in the
Java(TM) Runtime Environment may allow an untrusted applet
to elevate its privileges. For example, an applet may grant
itself permissions to read and write local files or execute
local applications that are accessible to the user running
the untrusted applet.

CVE-2006-6737/CVE-2006-6736: Two vulnerabilities in the
Java Runtime Environment may independently allow an
untrusted applet to access data in other applets.

CVE-2006-6745: Two vulnerabilities in the Java(TM) Runtime
Environment with serialization may independently allow an
untrusted applet or application to elevate its privileges.
</description>
  <description lang="de">The IBM Java JRE/SDK has been brought to release 1.4.2 SR
containing several bugfixes, including following security
fixes:

CVE-2007-0243: A buffer overflow vulnerability in the
Java(TM) Runtime Environment may allow an untrusted applet
to elevate its privileges. For example, an applet may grant
itself permissions to read and write local files or execute
local applications that are accessible to the user running
the untrusted applet.

CVE-2006-6737/CVE-2006-6736: Two vulnerabilities in the
Java Runtime Environment may independently allow an
untrusted applet to access data in other applets.

CVE-2006-6745: Two vulnerabilities in the Java(TM) Runtime
Environment with serialization may independently allow an
untrusted applet or application to elevate its privileges.
</description>
  <yum:version ver="3851" rel="0"/>
  <rpm:requires>
    <rpm:entry kind="atom" name="java-1_4_2-ibm" epoch="0" ver="1.4.2_sr8" rel="1.2" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_4_2-ibm-devel" epoch="0" ver="1.4.2_sr8" rel="1.2" flags="EQ"/>
  </rpm:requires>
  <category>security</category>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_4_2-ibm</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="1.4.2_sr8" rel="1.2"/>
      <checksum type="sha" pkgid="YES">a03826a21d50450c59a6dea48700c5d44e4b73e3</checksum>
      <time file="1184060294" build="1183986818"/>
      <size package="34569615" installed="50643832" archive="50465780"/>
      <location xml:base="media://#1" href="suse/x86_64/java-1_4_2-ibm-1.4.2_sr10-0.2.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_4_2-ibm" epoch="0" ver="1.4.2_sr8" rel="1.2" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_4_2-ibm"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_4_2-ibm-devel</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="1.4.2_sr8" rel="1.2"/>
      <checksum type="sha" pkgid="YES">f3d6144efb4ca053f263e57ee41c4b5943a6ffec</checksum>
      <time file="1184060294" build="1183986818"/>
      <size package="2413067" installed="3423507" archive="3432680"/>
      <location xml:base="media://#1" href="suse/x86_64/java-1_4_2-ibm-devel-1.4.2_sr10-0.2.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_4_2-ibm-devel" epoch="0" ver="1.4.2_sr8" rel="1.2" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_4_2-ibm-devel"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
  </atoms>
</patch>
