<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="54032eb4df3ad36ed54d5c9772c9b3a5"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="sdkp1-java-1_4_2-ibm-5182"
    timestamp="1208278255"
    engine="1.0">
  <yum:name>sdkp1-java-1_4_2-ibm</yum:name>
  <summary lang="en">Security update for IBM Java 1.4.2</summary>
  <summary lang="de">Security update for IBM Java 1.4.2</summary>
  <description lang="en">IBM Java 1.4.2 was updated to SR10 to fix various security
issues:

- CVE-2008-1196: A buffer overflow vulnerability in Java
  Web Start may allow an untrusted Java Web Start
  application that is downloaded from a website to elevate
  its privileges. For example, an untrusted Java Web Start
  application may grant itself permissions to read and
  write local files or execute local applications that are
  accessible to the user running the untrusted application.

- CVE-2008-1195: A vulnerability in the Java Runtime
  Environment may allow JavaScript(TM) code that is
  downloaded by a browser to make connections to network
  services on the system that the browser runs on, through
  Java APIs, This may allow files (that are accessible
  through these network services) or vulnerabilities (that
  exist on these network services) which are not otherwise
  normally accessible to be accessed or exploited.

- CVE-2008-1192: A vulnerability in the Java Plug-in may an
  untrusted applet to bypass same origin policy and
  leverage this flaw to execute local applications that are
  accessible to the user running the untrusted applet.

- CVE-2008-1190: A vulnerability in Java Web Start may
  allow an untrusted Java Web Start application to elevate
  its privileges. For example, an application may grant
  itself permissions to read and write local files or
  execute local applications that are accessible to the
  user running the untrusted application.

- CVE-2008-1189: A buffer overflow vulnerability in the
  Java Runtime Environment may allow an untrusted applet or
  application to elevate its privileges. For example, an
  applet may grant itself permissions to read and write
  local files or execute local applications that are
  accessible to the user running the untrusted applet.

- CVE-2008-1187: A vulnerability in the Java Runtime
  Environment with parsing XML data may allow an untrusted
  applet or application to elevate its privileges. For
  example, an applet may read certain URL resources (such
  as some files and web pages).

- CVE-2007-5232: A vulnerability in the Java Runtime
  Environment (JRE) with applet caching may allow an
  untrusted applet that is downloaded from a malicious
  website to make network connections to network services
  on machines other than the one that the applet was
  downloaded from. This may allow network resources (such
  as web pages) and vulnerabilities (that exist on these
  network services) which are not otherwise normally
  accessible to be accessed or exploited.

- CVE-2007-5274: A vulnerability in the Java Runtime
  Environment (JRE) may allow malicious Javascript code
  that is downloaded by a browser from a malicious website
  to make network connections, through Java APIs, to
  network services on machines other than the one that the
  Javascript code was downloaded from. This may allow
  network resources (such as web pages) and vulnerabilities
  (that exist on these network services) which are not
  otherwise normally accessible to be accessed or exploited.

- CVE-2007-5273: A second vulnerability in the JRE may
  allow an untrusted applet that is downloaded from a
  malicious website through a web proxy to make network
  connections to network services on machines other than
  the one that the applet was downloaded from. This may
  allow network resources (such as web pages) and
  vulnerabilities (that exist on these network services)
  which are not otherwise normally accessible to be
  accessed or exploited.

- CVE-2007-5236: An untrusted Java Web Start application
  may write arbitrary files with the privileges of the user
  running the application.      

- CVE-2007-5238: Three separate vulnerabilities may allow
  an untrusted Java Web Start application to determine the
  location of the Java Web Start cache.         

- CVE-2007-5239: An untrusted Java Web Start application or
  Java applet may move or copy arbitrary files by
  requesting the user of the application or applet to drag
  and drop a file from the Java Web Start application or
  Java applet window.  

- CVE-2007-5240: An untrusted applet may display an
  over-sized window so that the applet warning banner is
  not visible to the user running the untrusted
  applet.         

- CVE-2007-4381: A vulnerability in the font parsing code
  in the Java Runtime Environment may allow an untrusted
  applet to elevate its privileges. For example, an applet
  may grant itself permissions to read and write local
  files or execute local applications that are accessible
  to the user running the untrusted applet.      

- CVE-2007-3698: The Java Secure Socket Extension (JSSE)
  that is included in various releases of the Java Runtime
  Environment does not correctly process SSL/TLS handshake
  requests. This vulnerability may be exploited to create a
  Denial of Service (DoS) condition to the system as a
  whole on a server that listens for SSL/TLS connections
  using JSSE for SSL/TLS support.
</description>
  <description lang="de">IBM Java 1.4.2 was updated to SR10 to fix various security
issues:

- CVE-2008-1196: A buffer overflow vulnerability in Java
  Web Start may allow an untrusted Java Web Start
  application that is downloaded from a website to elevate
  its privileges. For example, an untrusted Java Web Start
  application may grant itself permissions to read and
  write local files or execute local applications that are
  accessible to the user running the untrusted application.

- CVE-2008-1195: A vulnerability in the Java Runtime
  Environment may allow JavaScript(TM) code that is
  downloaded by a browser to make connections to network
  services on the system that the browser runs on, through
  Java APIs, This may allow files (that are accessible
  through these network services) or vulnerabilities (that
  exist on these network services) which are not otherwise
  normally accessible to be accessed or exploited.

- CVE-2008-1192: A vulnerability in the Java Plug-in may an
  untrusted applet to bypass same origin policy and
  leverage this flaw to execute local applications that are
  accessible to the user running the untrusted applet.

- CVE-2008-1190: A vulnerability in Java Web Start may
  allow an untrusted Java Web Start application to elevate
  its privileges. For example, an application may grant
  itself permissions to read and write local files or
  execute local applications that are accessible to the
  user running the untrusted application.

- CVE-2008-1189: A buffer overflow vulnerability in the
  Java Runtime Environment may allow an untrusted applet or
  application to elevate its privileges. For example, an
  applet may grant itself permissions to read and write
  local files or execute local applications that are
  accessible to the user running the untrusted applet.

- CVE-2008-1187: A vulnerability in the Java Runtime
  Environment with parsing XML data may allow an untrusted
  applet or application to elevate its privileges. For
  example, an applet may read certain URL resources (such
  as some files and web pages).

- CVE-2007-5232: A vulnerability in the Java Runtime
  Environment (JRE) with applet caching may allow an
  untrusted applet that is downloaded from a malicious
  website to make network connections to network services
  on machines other than the one that the applet was
  downloaded from. This may allow network resources (such
  as web pages) and vulnerabilities (that exist on these
  network services) which are not otherwise normally
  accessible to be accessed or exploited.

- CVE-2007-5274: A vulnerability in the Java Runtime
  Environment (JRE) may allow malicious Javascript code
  that is downloaded by a browser from a malicious website
  to make network connections, through Java APIs, to
  network services on machines other than the one that the
  Javascript code was downloaded from. This may allow
  network resources (such as web pages) and vulnerabilities
  (that exist on these network services) which are not
  otherwise normally accessible to be accessed or exploited.

- CVE-2007-5273: A second vulnerability in the JRE may
  allow an untrusted applet that is downloaded from a
  malicious website through a web proxy to make network
  connections to network services on machines other than
  the one that the applet was downloaded from. This may
  allow network resources (such as web pages) and
  vulnerabilities (that exist on these network services)
  which are not otherwise normally accessible to be
  accessed or exploited.

- CVE-2007-5236: An untrusted Java Web Start application
  may write arbitrary files with the privileges of the user
  running the application.      

- CVE-2007-5238: Three separate vulnerabilities may allow
  an untrusted Java Web Start application to determine the
  location of the Java Web Start cache.         

- CVE-2007-5239: An untrusted Java Web Start application or
  Java applet may move or copy arbitrary files by
  requesting the user of the application or applet to drag
  and drop a file from the Java Web Start application or
  Java applet window.  

- CVE-2007-5240: An untrusted applet may display an
  over-sized window so that the applet warning banner is
  not visible to the user running the untrusted
  applet.         

- CVE-2007-4381: A vulnerability in the font parsing code
  in the Java Runtime Environment may allow an untrusted
  applet to elevate its privileges. For example, an applet
  may grant itself permissions to read and write local
  files or execute local applications that are accessible
  to the user running the untrusted applet.      

- CVE-2007-3698: The Java Secure Socket Extension (JSSE)
  that is included in various releases of the Java Runtime
  Environment does not correctly process SSL/TLS handshake
  requests. This vulnerability may be exploited to create a
  Denial of Service (DoS) condition to the system as a
  whole on a server that listens for SSL/TLS connections
  using JSSE for SSL/TLS support.
</description>
  <yum:version ver="5182" rel="0"/>
  <rpm:requires>
    <rpm:entry kind="atom" name="java-1_4_2-ibm" epoch="0" ver="1.4.2_sr10" rel="0.2" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_4_2-ibm-devel" epoch="0" ver="1.4.2_sr10" rel="0.2" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_4_2-ibm-jdbc" epoch="0" ver="1.4.2_sr10" rel="0.2" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_4_2-ibm-plugin" epoch="0" ver="1.4.2_sr10" rel="0.2" flags="EQ"/>
  </rpm:requires>
  <category>security</category>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_4_2-ibm</name>
      <arch>i586</arch>
      <version epoch="0" ver="1.4.2_sr10" rel="0.2"/>
      <checksum type="sha" pkgid="YES">b917e6359b051b0f47be3d2ca5c42346d6532131</checksum>
      <time file="1208300467" build="1208278255"/>
      <size package="40662545" installed="58843269" archive="57408492"/>
      <location xml:base="media://#1" href="suse/i586/java-1_4_2-ibm-1.4.2_sr10-0.2.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_4_2-ibm" epoch="0" ver="1.4.2_sr10" rel="0.2" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_4_2-ibm"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_4_2-ibm-devel</name>
      <arch>i586</arch>
      <version epoch="0" ver="1.4.2_sr10" rel="0.2"/>
      <checksum type="sha" pkgid="YES">3d14075e10b2e36eb9703cf7cd13e240a2c4421a</checksum>
      <time file="1208300467" build="1208278255"/>
      <size package="2955308" installed="4087299" archive="4097476"/>
      <location xml:base="media://#1" href="suse/i586/java-1_4_2-ibm-devel-1.4.2_sr10-0.2.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_4_2-ibm-devel" epoch="0" ver="1.4.2_sr10" rel="0.2" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_4_2-ibm-devel"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_4_2-ibm-jdbc</name>
      <arch>i586</arch>
      <version epoch="0" ver="1.4.2_sr10" rel="0.2"/>
      <checksum type="sha" pkgid="YES">8f7d058aef9b962a477698541ebba9b559ffe90a</checksum>
      <time file="1208300467" build="1208278255"/>
      <size package="27850" installed="60218" archive="60520"/>
      <location xml:base="media://#1" href="suse/i586/java-1_4_2-ibm-jdbc-1.4.2_sr10-0.2.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_4_2-ibm-jdbc" epoch="0" ver="1.4.2_sr10" rel="0.2" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_4_2-ibm-jdbc"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_4_2-ibm-plugin</name>
      <arch>i586</arch>
      <version epoch="0" ver="1.4.2_sr10" rel="0.2"/>
      <checksum type="sha" pkgid="YES">28eacf6730dabf400c2a4fb2e0cdcfca0253116e</checksum>
      <time file="1208300467" build="1208278255"/>
      <size package="1489381" installed="2277996" archive="2279736"/>
      <location xml:base="media://#1" href="suse/i586/java-1_4_2-ibm-plugin-1.4.2_sr10-0.2.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_4_2-ibm-plugin" epoch="0" ver="1.4.2_sr10" rel="0.2" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_4_2-ibm-plugin"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
  </atoms>
</patch>
