<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="51fd7d03020fe413e43cda8f60442612"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="sdkp1-java-1_4_2-ibm-4542"
    timestamp="1192110294"
    engine="1.0">
  <yum:name>sdkp1-java-1_4_2-ibm</yum:name>
  <summary lang="en">Security update for IBM Java 1.4.2</summary>
  <summary lang="de">Security update for IBM Java 1.4.2</summary>
  <description lang="en">The IBM Java JRE/SDK has been brought to release 1.4.2 SR9,
containing several bugfixes, including the following
security fixes:

- CVE-2007-2788,CVE-2007-2789,CVE-2007-3004,CVE-2007-3005:
  A buffer overflow vulnerability in the image parsing code
  in the Java(TM) Runtime Environment may allow an
  untrusted applet or application to elevate its
  privileges. For example, an applet may grant itself
  permissions to read and write local files or execute
  local applications that are accessible to the user
  running the untrusted applet.

  A second vulnerability may allow an untrusted applet or
application to cause the Java Virtual Machine to hang.

- CVE-2007-3655: A buffer overflow vulnerability in the
  Java Web Start URL parsing code may allow an untrusted
  application to elevate its privileges. For example, an
  application may grant itself permissions to read and
  write local files or execute local applications with the
  privileges of the user running the Java Web Start
  application.

- CVE-2007-3922: A security vulnerability in the Java
  Runtime Environment Applet Class Loader may allow an
  untrusted applet that is loaded from a remote system to
  circumvent network access restrictions and establish
  socket connections to certain services running on the
  local host, as if it were loaded from the system that the
  applet is running on. This may allow the untrusted remote
  applet the ability to exploit any security
  vulnerabilities existing in the services it has connected
  to.

For more information see:
http://www-128.ibm.com/developerworks/java/jdk/alerts/
</description>
  <description lang="de">The IBM Java JRE/SDK has been brought to release 1.4.2 SR9,
containing several bugfixes, including the following
security fixes:

- CVE-2007-2788,CVE-2007-2789,CVE-2007-3004,CVE-2007-3005:
  A buffer overflow vulnerability in the image parsing code
  in the Java(TM) Runtime Environment may allow an
  untrusted applet or application to elevate its
  privileges. For example, an applet may grant itself
  permissions to read and write local files or execute
  local applications that are accessible to the user
  running the untrusted applet.

  A second vulnerability may allow an untrusted applet or
application to cause the Java Virtual Machine to hang.

- CVE-2007-3655: A buffer overflow vulnerability in the
  Java Web Start URL parsing code may allow an untrusted
  application to elevate its privileges. For example, an
  application may grant itself permissions to read and
  write local files or execute local applications with the
  privileges of the user running the Java Web Start
  application.

- CVE-2007-3922: A security vulnerability in the Java
  Runtime Environment Applet Class Loader may allow an
  untrusted applet that is loaded from a remote system to
  circumvent network access restrictions and establish
  socket connections to certain services running on the
  local host, as if it were loaded from the system that the
  applet is running on. This may allow the untrusted remote
  applet the ability to exploit any security
  vulnerabilities existing in the services it has connected
  to.

For more information see:
http://www-128.ibm.com/developerworks/java/jdk/alerts/
</description>
  <yum:version ver="4542" rel="0"/>
  <rpm:requires>
    <rpm:entry kind="atom" name="java-1_4_2-ibm" epoch="0" ver="1.4.2_sr9" rel="0.2" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_4_2-ibm-devel" epoch="0" ver="1.4.2_sr9" rel="0.2" flags="EQ"/>
  </rpm:requires>
  <category>security</category>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_4_2-ibm</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="1.4.2_sr9" rel="0.2"/>
      <checksum type="sha" pkgid="YES">4069b6ff730b3a5f6dee6b3884fd44bffa038bea</checksum>
      <time file="1192214490" build="1192110294"/>
      <size package="34642121" installed="50753364" archive="50575316"/>
      <location xml:base="media://#1" href="suse/x86_64/java-1_4_2-ibm-1.4.2_sr10-0.2.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_4_2-ibm" epoch="0" ver="1.4.2_sr9" rel="0.2" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_4_2-ibm"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_4_2-ibm-devel</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="1.4.2_sr9" rel="0.2"/>
      <checksum type="sha" pkgid="YES">999d910ebe52d087da66b2d2084300179f017ff4</checksum>
      <time file="1192214490" build="1192110294"/>
      <size package="2412498" installed="3423506" archive="3432680"/>
      <location xml:base="media://#1" href="suse/x86_64/java-1_4_2-ibm-devel-1.4.2_sr10-0.2.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_4_2-ibm-devel" epoch="0" ver="1.4.2_sr9" rel="0.2" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_4_2-ibm-devel"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
  </atoms>
</patch>
