<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="0c36b6416afc3868b8b1b9012955e323"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="sledp1-java-1_5_0-ibm-4687"
    timestamp="1195045240"
    engine="1.0">
  <yum:name>sledp1-java-1_5_0-ibm</yum:name>
  <summary lang="en">Security update for java-1_5_0-ibm</summary>
  <summary lang="de">Security update for java-1_5_0-ibm</summary>
  <description lang="en">The IBM Java JRE/SDK has been brought to release 1.5.0 SR6,
containing several bugfixes, including the following
security fixes:

CVE-2007-5232: A vulnerability in the Java Runtime
Environment (JRE) with applet caching may allow an
untrusted applet that is downloaded from a malicious
website to make network connections to network services on
machines other than the one that the applet was downloaded
from. This may allow network resources (such as web pages)
and vulnerabilities (that exist on these network services)
which are not otherwise normally accessible to be accessed
or exploited.


CVE-2007-5274: A vulnerability in the Java Runtime
Environment (JRE) may allow malicious Javascript code that
is downloaded by a browser from a malicious website to make
network connections, through Java APIs, to network services
on machines other than the one that the Javascript code was
downloaded from. This may allow network resources (such as
web pages) and vulnerabilities (that exist on these network
services) which are not otherwise normally accessible to be
accessed or exploited.

CVE-2007-5273: A second vulnerability in the JRE may allow
an untrusted applet that is downloaded from a malicious
website through a web proxy to make network connections to
network services on machines other than the one that the
applet was downloaded from. This may allow network
resources (such as web pages) and vulnerabilities (that
exist on these network services) which are not otherwise
normally accessible to be accessed or exploited.

CVE-2007-5236: An untrusted Java Web Start application may
write arbitrary files with the privileges of the user
running the application.

CVE-2007-5238: Three separate vulnerabilities may allow an
untrusted Java Web Start application to determine the
location of the Java Web Start cache.

CVE-2007-5239: An untrusted Java Web Start application or
Java applet may move or copy arbitrary files by requesting
the user of the application or applet to drag and drop a
file from the Java Web Start application or Java applet
window.

CVE-2007-5240: An untrusted applet may display an
over-sized window so that the applet warning banner is not
visible to the user running the untrusted applet.
CVE-2007-4381: A vulnerability in the font parsing code in
the Java Runtime Environment may allow an untrusted applet
to elevate its privileges. For example, an applet may grant
itself permissions to read and write local files or execute
local applications that are accessible to the user running
the untrusted applet.

CVE-2007-3698: The Java Secure Socket Extension (JSSE) that
is included in various releases of the Java Runtime
Environment does not correctly process SSL/TLS handshake
requests. This vulnerability may be exploited to create a
Denial of Service (DoS) condition to the system as a whole
on a server that listens for SSL/TLS connections using JSSE
for SSL/TLS support.

For more information see:
http://www-128.ibm.com/developerworks/java/jdk/alerts/

Additionally a concurrency bug has been fixed (Novell Bug
330713).
</description>
  <description lang="de">The IBM Java JRE/SDK has been brought to release 1.5.0 SR6,
containing several bugfixes, including the following
security fixes:

CVE-2007-5232: A vulnerability in the Java Runtime
Environment (JRE) with applet caching may allow an
untrusted applet that is downloaded from a malicious
website to make network connections to network services on
machines other than the one that the applet was downloaded
from. This may allow network resources (such as web pages)
and vulnerabilities (that exist on these network services)
which are not otherwise normally accessible to be accessed
or exploited.


CVE-2007-5274: A vulnerability in the Java Runtime
Environment (JRE) may allow malicious Javascript code that
is downloaded by a browser from a malicious website to make
network connections, through Java APIs, to network services
on machines other than the one that the Javascript code was
downloaded from. This may allow network resources (such as
web pages) and vulnerabilities (that exist on these network
services) which are not otherwise normally accessible to be
accessed or exploited.

CVE-2007-5273: A second vulnerability in the JRE may allow
an untrusted applet that is downloaded from a malicious
website through a web proxy to make network connections to
network services on machines other than the one that the
applet was downloaded from. This may allow network
resources (such as web pages) and vulnerabilities (that
exist on these network services) which are not otherwise
normally accessible to be accessed or exploited.

CVE-2007-5236: An untrusted Java Web Start application may
write arbitrary files with the privileges of the user
running the application.

CVE-2007-5238: Three separate vulnerabilities may allow an
untrusted Java Web Start application to determine the
location of the Java Web Start cache.

CVE-2007-5239: An untrusted Java Web Start application or
Java applet may move or copy arbitrary files by requesting
the user of the application or applet to drag and drop a
file from the Java Web Start application or Java applet
window.

CVE-2007-5240: An untrusted applet may display an
over-sized window so that the applet warning banner is not
visible to the user running the untrusted applet.
CVE-2007-4381: A vulnerability in the font parsing code in
the Java Runtime Environment may allow an untrusted applet
to elevate its privileges. For example, an applet may grant
itself permissions to read and write local files or execute
local applications that are accessible to the user running
the untrusted applet.

CVE-2007-3698: The Java Secure Socket Extension (JSSE) that
is included in various releases of the Java Runtime
Environment does not correctly process SSL/TLS handshake
requests. This vulnerability may be exploited to create a
Denial of Service (DoS) condition to the system as a whole
on a server that listens for SSL/TLS connections using JSSE
for SSL/TLS support.

For more information see:
http://www-128.ibm.com/developerworks/java/jdk/alerts/

Additionally a concurrency bug has been fixed (Novell Bug
330713).
</description>
  <yum:version ver="4687" rel="0"/>
  <rpm:requires>
    <rpm:entry kind="atom" name="java-1_5_0-ibm" epoch="0" ver="1.5.0_sr6" rel="0.4" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_5_0-ibm-alsa" epoch="0" ver="1.5.0_sr6" rel="0.4" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_5_0-ibm-demo" epoch="0" ver="1.5.0_sr6" rel="0.4" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_5_0-ibm-devel" epoch="0" ver="1.5.0_sr6" rel="0.4" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_5_0-ibm-jdbc" epoch="0" ver="1.5.0_sr6" rel="0.4" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_5_0-ibm-plugin" epoch="0" ver="1.5.0_sr6" rel="0.4" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_5_0-ibm-src" epoch="0" ver="1.5.0_sr6" rel="0.4" flags="EQ"/>
  </rpm:requires>
  <category>security</category>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_5_0-ibm</name>
      <arch>i586</arch>
      <version epoch="0" ver="1.5.0_sr6" rel="0.4"/>
      <checksum type="sha" pkgid="YES">ba78599fad61af319dd241d22ebe894fb1b2d3c6</checksum>
      <time file="1195119415" build="1195045240"/>
      <size package="39062609" installed="57985452" archive="58039284"/>
      <location xml:base="media://#1" href="suse/i586/java-1_5_0-ibm-1.5.0_sr7-0.2.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_5_0-ibm" epoch="0" ver="1.5.0_sr6" rel="0.4" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_5_0-ibm"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_5_0-ibm-alsa</name>
      <arch>i586</arch>
      <version epoch="0" ver="1.5.0_sr6" rel="0.4"/>
      <checksum type="sha" pkgid="YES">eb0cce425e531933e8c837cc0d29554845e89e79</checksum>
      <time file="1195119418" build="1195045240"/>
      <size package="34491" installed="75179" archive="75480"/>
      <location xml:base="media://#1" href="suse/i586/java-1_5_0-ibm-alsa-1.5.0_sr7-0.2.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_5_0-ibm-alsa" epoch="0" ver="1.5.0_sr6" rel="0.4" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_5_0-ibm-alsa"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_5_0-ibm-demo</name>
      <arch>i586</arch>
      <version epoch="0" ver="1.5.0_sr6" rel="0.4"/>
      <checksum type="sha" pkgid="YES">24b8ec86d6b79d0d90141cb9bf722cda889865fc</checksum>
      <time file="1195119418" build="1195045240"/>
      <size package="3441766" installed="6498269" archive="6613324"/>
      <location xml:base="media://#1" href="suse/i586/java-1_5_0-ibm-demo-1.5.0_sr7-0.2.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_5_0-ibm-demo" epoch="0" ver="1.5.0_sr6" rel="0.4" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_5_0-ibm-demo"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_5_0-ibm-devel</name>
      <arch>i586</arch>
      <version epoch="0" ver="1.5.0_sr6" rel="0.4"/>
      <checksum type="sha" pkgid="YES">d2796f86397d9c3d89e50668905b2568c6ad5e86</checksum>
      <time file="1195119419" build="1195045240"/>
      <size package="8486739" installed="12802047" archive="12828160"/>
      <location xml:base="media://#1" href="suse/i586/java-1_5_0-ibm-devel-1.5.0_sr7-0.2.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_5_0-ibm-devel" epoch="0" ver="1.5.0_sr6" rel="0.4" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_5_0-ibm-devel"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_5_0-ibm-jdbc</name>
      <arch>i586</arch>
      <version epoch="0" ver="1.5.0_sr6" rel="0.4"/>
      <checksum type="sha" pkgid="YES">c067cee1ac5c29918bb2291442ee00056879e9d8</checksum>
      <time file="1195119420" build="1195045240"/>
      <size package="24015" installed="58910" archive="59208"/>
      <location xml:base="media://#1" href="suse/i586/java-1_5_0-ibm-jdbc-1.5.0_sr7-0.2.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_5_0-ibm-jdbc" epoch="0" ver="1.5.0_sr6" rel="0.4" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_5_0-ibm-jdbc"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_5_0-ibm-plugin</name>
      <arch>i586</arch>
      <version epoch="0" ver="1.5.0_sr6" rel="0.4"/>
      <checksum type="sha" pkgid="YES">7cb0e12ede569d1dc76efb3b0630e4971dbe4691</checksum>
      <time file="1195119420" build="1195045240"/>
      <size package="840551" installed="2410607" archive="1859048"/>
      <location xml:base="media://#1" href="suse/i586/java-1_5_0-ibm-plugin-1.5.0_sr7-0.2.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_5_0-ibm-plugin" epoch="0" ver="1.5.0_sr6" rel="0.4" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_5_0-ibm-plugin"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_5_0-ibm-src</name>
      <arch>i586</arch>
      <version epoch="0" ver="1.5.0_sr6" rel="0.4"/>
      <checksum type="sha" pkgid="YES">2187497a29b4e79c0cab89e53555de8a741e69f0</checksum>
      <time file="1195119421" build="1195045240"/>
      <size package="8133441" installed="8423087" archive="8423540"/>
      <location xml:base="media://#1" href="suse/i586/java-1_5_0-ibm-src-1.5.0_sr7-0.2.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_5_0-ibm-src" epoch="0" ver="1.5.0_sr6" rel="0.4" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_5_0-ibm-src"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
  </atoms>
</patch>
