<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="af469401da197afd4006ef4ae0c61aaa"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="sledp3-java-1_5_0-ibm-6741"
    timestamp="1260152437"
    engine="1.0">
  <yum:name>sledp3-java-1_5_0-ibm</yum:name>
  <summary lang="en">Security update for IBM Java 1.5.0</summary>
  <summary lang="de">Security update for IBM Java 1.5.0</summary>
  <description lang="en">IBM Java 5 was updated to Service Refresh 11. It fixes lots
of bugs and security issues.

The timezone update to 1.6.9s (with the latest Fiji change).

CVE-2009-3876 / CVE-2009-3877: A vulnerability in the Java
Runtime Environment with decoding DER encoded data might
allow a remote client to cause the JRE to crash, resulting
in a denial of service condition.

CVE-2009-3867: A buffer overflow vulnerability in the Java
Runtime Environment audio system might allow an untrusted
applet or Java Web Start application to escalate
privileges. For example, an untrusted applet might grant
itself permissions to read and write local files, or run
local applications that are accessible to the user running
the untrusted applet.

CVE-2009-3868: A buffer overflow vulnerability in the Java
Runtime Environment with parsing image files might allow an
untrusted applet or Java Web Start application to escalate
privileges. For example, an untrusted applet might grant
itself permissions to read and write local files, or run
local applications that are accessible to the user running
the untrusted applet.

CVE-2009-3872: An integer overflow vulnerability in the
Java Runtime Environment with reading JPEG files might
allow an untrusted applet or Java Web Start application to
escalate privileges. For example, an untrusted applet might
grant itself permissions to read and write local files, or
run local applications that are accessible to the user
running the untrusted applet.

CVE-2009-3873: A buffer overflow vulnerability in the Java
Runtime Environment with processing JPEG files might allow
an untrusted applet or Java Web Start application to
escalate privileges. For example, an untrusted applet might
grant itself permissions to read and write local files, or
run local applications that are accessible to the user
running the untrusted applet.

CVE-2009-3875: A security vulnerability in the Java Runtime
Environment with verifying HMAC digests might allow
authentication to be bypassed. This action can allow a user
to forge a digital signature that would be accepted as
valid. Applications that validate HMAC-based digital
signatures might be vulnerable to this type of attack.

CVE-2009-3869: A buffer overflow vulnerability in the Java
Runtime Environment with processing image files might allow
an untrusted applet or Java Web Start application to
escalate privileges. For example, an untrusted applet might
grant itself permissions to read and write local files or
run local applications that are accessible to the user
running the untrusted applet.

CVE-2009-3871: A buffer overflow vulnerability in the Java
Runtime Environment with processing image files might allow
an untrusted applet or Java Web Start application to
escalate privileges. For example, an untrusted applet might
grant itself permissions to read and write local files or
run local applications that are accessible to the user
running the untrusted applet.

CVE-2009-3874: An integer overflow vulnerability in the
Java Runtime Environment with processing JPEG images might
allow an untrusted applet or Java Web Start application to
escalate privileges. For example, an untrusted applet might
grant itself permissions to read and write local files or
run local applications that are accessible to the user
running the untrusted applet.

CVE-2009-2493: The Java Runtime Environment includes the
Java Web Start technology that uses the Java Web Start
ActiveX control to launch Java Web Start in Internet
Explorer. A security vulnerability in the Active Template
Library (ATL) in various releases of Microsoft Visual
Studio, which is used by the Java Web Start ActiveX
control, might allow the Java Web Start ActiveX control to
be leveraged to run arbitrary code. This might occur as the
result of a user of the Java Runtime Environment viewing a
specially crafted web page that exploits this vulnerability.

Please also see
http://www.ibm.com/developerworks/java/jdk/alerts/
</description>
  <description lang="de">IBM Java 5 was updated to Service Refresh 11. It fixes lots
of bugs and security issues.

The timezone update to 1.6.9s (with the latest Fiji change).

CVE-2009-3876 / CVE-2009-3877: A vulnerability in the Java
Runtime Environment with decoding DER encoded data might
allow a remote client to cause the JRE to crash, resulting
in a denial of service condition.

CVE-2009-3867: A buffer overflow vulnerability in the Java
Runtime Environment audio system might allow an untrusted
applet or Java Web Start application to escalate
privileges. For example, an untrusted applet might grant
itself permissions to read and write local files, or run
local applications that are accessible to the user running
the untrusted applet.

CVE-2009-3868: A buffer overflow vulnerability in the Java
Runtime Environment with parsing image files might allow an
untrusted applet or Java Web Start application to escalate
privileges. For example, an untrusted applet might grant
itself permissions to read and write local files, or run
local applications that are accessible to the user running
the untrusted applet.

CVE-2009-3872: An integer overflow vulnerability in the
Java Runtime Environment with reading JPEG files might
allow an untrusted applet or Java Web Start application to
escalate privileges. For example, an untrusted applet might
grant itself permissions to read and write local files, or
run local applications that are accessible to the user
running the untrusted applet.

CVE-2009-3873: A buffer overflow vulnerability in the Java
Runtime Environment with processing JPEG files might allow
an untrusted applet or Java Web Start application to
escalate privileges. For example, an untrusted applet might
grant itself permissions to read and write local files, or
run local applications that are accessible to the user
running the untrusted applet.

CVE-2009-3875: A security vulnerability in the Java Runtime
Environment with verifying HMAC digests might allow
authentication to be bypassed. This action can allow a user
to forge a digital signature that would be accepted as
valid. Applications that validate HMAC-based digital
signatures might be vulnerable to this type of attack.

CVE-2009-3869: A buffer overflow vulnerability in the Java
Runtime Environment with processing image files might allow
an untrusted applet or Java Web Start application to
escalate privileges. For example, an untrusted applet might
grant itself permissions to read and write local files or
run local applications that are accessible to the user
running the untrusted applet.

CVE-2009-3871: A buffer overflow vulnerability in the Java
Runtime Environment with processing image files might allow
an untrusted applet or Java Web Start application to
escalate privileges. For example, an untrusted applet might
grant itself permissions to read and write local files or
run local applications that are accessible to the user
running the untrusted applet.

CVE-2009-3874: An integer overflow vulnerability in the
Java Runtime Environment with processing JPEG images might
allow an untrusted applet or Java Web Start application to
escalate privileges. For example, an untrusted applet might
grant itself permissions to read and write local files or
run local applications that are accessible to the user
running the untrusted applet.

CVE-2009-2493: The Java Runtime Environment includes the
Java Web Start technology that uses the Java Web Start
ActiveX control to launch Java Web Start in Internet
Explorer. A security vulnerability in the Active Template
Library (ATL) in various releases of Microsoft Visual
Studio, which is used by the Java Web Start ActiveX
control, might allow the Java Web Start ActiveX control to
be leveraged to run arbitrary code. This might occur as the
result of a user of the Java Runtime Environment viewing a
specially crafted web page that exploits this vulnerability.

Please also see
http://www.ibm.com/developerworks/java/jdk/alerts/
</description>
  <yum:version ver="6741" rel="0"/>
  <rpm:requires>
    <rpm:entry kind="atom" name="java-1_5_0-ibm" epoch="0" ver="1.5.0_sr11" rel="0.4.2" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_5_0-ibm-demo" epoch="0" ver="1.5.0_sr11" rel="0.4.2" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_5_0-ibm-devel" epoch="0" ver="1.5.0_sr11" rel="0.4.2" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_5_0-ibm-fonts" epoch="0" ver="1.5.0_sr11" rel="0.4.2" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_5_0-ibm-jdbc" epoch="0" ver="1.5.0_sr11" rel="0.4.2" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_5_0-ibm-plugin" epoch="0" ver="1.5.0_sr11" rel="0.4.2" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_5_0-ibm-src" epoch="0" ver="1.5.0_sr11" rel="0.4.2" flags="EQ"/>
  </rpm:requires>
  <category>security</category>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_5_0-ibm</name>
      <arch>i586</arch>
      <version epoch="0" ver="1.5.0_sr11" rel="0.4.2"/>
      <checksum type="sha" pkgid="YES">6a511e63b971f87d4002fe54f05802eee032adb9</checksum>
      <time file="1260152625" build="1260152437"/>
      <size package="52547971" installed="76343953" archive="76407348"/>
      <location xml:base="media://#1" href="suse/i586/java-1_5_0-ibm-1.5.0_sr11-0.4.2.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_5_0-ibm" epoch="0" ver="1.5.0_sr11" rel="0.4.2" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_5_0-ibm"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_5_0-ibm-demo</name>
      <arch>i586</arch>
      <version epoch="0" ver="1.5.0_sr11" rel="0.4.2"/>
      <checksum type="sha" pkgid="YES">5c62e8f26efd9a239dee980fb13e282f0733d9b1</checksum>
      <time file="1260152627" build="1260152437"/>
      <size package="3451380" installed="6506369" archive="6621420"/>
      <location xml:base="media://#1" href="suse/i586/java-1_5_0-ibm-demo-1.5.0_sr11-0.4.2.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_5_0-ibm-demo" epoch="0" ver="1.5.0_sr11" rel="0.4.2" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_5_0-ibm-demo"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_5_0-ibm-devel</name>
      <arch>i586</arch>
      <version epoch="0" ver="1.5.0_sr11" rel="0.4.2"/>
      <checksum type="sha" pkgid="YES">5524ce248218620786f6df326b2e5f1b88d0edc7</checksum>
      <time file="1260152627" build="1260152437"/>
      <size package="3693332" installed="5301273" archive="5309404"/>
      <location xml:base="media://#1" href="suse/i586/java-1_5_0-ibm-devel-1.5.0_sr11-0.4.2.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_5_0-ibm-devel" epoch="0" ver="1.5.0_sr11" rel="0.4.2" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_5_0-ibm-devel"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_5_0-ibm-fonts</name>
      <arch>i586</arch>
      <version epoch="0" ver="1.5.0_sr11" rel="0.4.2"/>
      <checksum type="sha" pkgid="YES">0fc82d185a1bd59c569806609fdc0d087b9d3358</checksum>
      <time file="1260152627" build="1260152437"/>
      <size package="1706537" installed="2998643" archive="2984560"/>
      <location xml:base="media://#1" href="suse/i586/java-1_5_0-ibm-fonts-1.5.0_sr11-0.4.2.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_5_0-ibm-fonts" epoch="0" ver="1.5.0_sr11" rel="0.4.2" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_5_0-ibm-fonts"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_5_0-ibm-jdbc</name>
      <arch>i586</arch>
      <version epoch="0" ver="1.5.0_sr11" rel="0.4.2"/>
      <checksum type="sha" pkgid="YES">c1d2040ca14960a6ced01b143bdb2049d30df337</checksum>
      <time file="1260152627" build="1260152437"/>
      <size package="33672" installed="70940" archive="71232"/>
      <location xml:base="media://#1" href="suse/i586/java-1_5_0-ibm-jdbc-1.5.0_sr11-0.4.2.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_5_0-ibm-jdbc" epoch="0" ver="1.5.0_sr11" rel="0.4.2" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_5_0-ibm-jdbc"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_5_0-ibm-plugin</name>
      <arch>i586</arch>
      <version epoch="0" ver="1.5.0_sr11" rel="0.4.2"/>
      <checksum type="sha" pkgid="YES">3144aa79d6229a7afd60f68c39fbaa0e413c0743</checksum>
      <time file="1260152627" build="1260152437"/>
      <size package="876014" installed="2508660" archive="1929588"/>
      <location xml:base="media://#1" href="suse/i586/java-1_5_0-ibm-plugin-1.5.0_sr11-0.4.2.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_5_0-ibm-plugin" epoch="0" ver="1.5.0_sr11" rel="0.4.2" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_5_0-ibm-plugin"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_5_0-ibm-src</name>
      <arch>i586</arch>
      <version epoch="0" ver="1.5.0_sr11" rel="0.4.2"/>
      <checksum type="sha" pkgid="YES">3e828287153f1f5c8f5c7a1f710f98bd54b6aee3</checksum>
      <time file="1260152628" build="1260152437"/>
      <size package="8167776" installed="8447607" archive="8448052"/>
      <location xml:base="media://#1" href="suse/i586/java-1_5_0-ibm-src-1.5.0_sr11-0.4.2.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_5_0-ibm-src" epoch="0" ver="1.5.0_sr11" rel="0.4.2" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_5_0-ibm-src"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
  </atoms>
</patch>
