<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="43611872eac06dc35f1c7183ae1db620"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="slesp2-java-1_4_2-ibm-5846"
    timestamp="1228354378"
    engine="1.0">
  <yum:name>slesp2-java-1_4_2-ibm</yum:name>
  <summary lang="en">Security update for IBM Java</summary>
  <summary lang="de">Security update for IBM Java</summary>
  <description lang="en">IBM Java 1.4.2 SR12 fixes the following security problems:

- CVE-2008-3104: Security vulnerabilities in the Java
  Runtime Environment may allow an untrusted applet that is
  loaded from a remote system to circumvent network access
  restrictions and establish socket connections to certain
  services running on the local host, as if it were loaded
  from the system that the applet is running on. This may
  allow the untrusted remote applet the ability to exploit
  any security vulnerabilities existing in the services it
  has connected to.

- CVE-2008-3112: A vulnerability in Java Web Start may
  allow an untrusted Java Web Start application downloaded
  from a website to create arbitrary files with the
  permissions of the user running the untrusted Java Web
  Start application.

- CVE-2008-3113: A vulnerability in Java Web Start may
  allow an untrusted Java Web Start application downloaded
  from a website to create or delete arbitrary files with
  the permissions of the user running the untrusted Java
  Web Start application.

- CVE-2008-3114: A vulnerability in Java Web Start may
  allow an untrusted Java Web Start application to
  determine the location of the Java Web Start cache.
</description>
  <description lang="de">IBM Java 1.4.2 SR12 fixes the following security problems:

- CVE-2008-3104: Security vulnerabilities in the Java
  Runtime Environment may allow an untrusted applet that is
  loaded from a remote system to circumvent network access
  restrictions and establish socket connections to certain
  services running on the local host, as if it were loaded
  from the system that the applet is running on. This may
  allow the untrusted remote applet the ability to exploit
  any security vulnerabilities existing in the services it
  has connected to.

- CVE-2008-3112: A vulnerability in Java Web Start may
  allow an untrusted Java Web Start application downloaded
  from a website to create arbitrary files with the
  permissions of the user running the untrusted Java Web
  Start application.

- CVE-2008-3113: A vulnerability in Java Web Start may
  allow an untrusted Java Web Start application downloaded
  from a website to create or delete arbitrary files with
  the permissions of the user running the untrusted Java
  Web Start application.

- CVE-2008-3114: A vulnerability in Java Web Start may
  allow an untrusted Java Web Start application to
  determine the location of the Java Web Start cache.
</description>
  <yum:version ver="5846" rel="0"/>
  <rpm:requires>
    <rpm:entry kind="atom" name="java-1_4_2-ibm" epoch="0" ver="1.4.2_sr12" rel="0.4" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_4_2-ibm-devel" epoch="0" ver="1.4.2_sr12" rel="0.4" flags="EQ"/>
  </rpm:requires>
  <category>security</category>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_4_2-ibm</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="1.4.2_sr12" rel="0.4"/>
      <checksum type="sha" pkgid="YES">9f6c4a1e73a86876d1035212947edfe592677851</checksum>
      <time file="1228397009" build="1228354378"/>
      <size package="38661464" installed="63219528" archive="62929264"/>
      <location xml:base="media://#1" href="suse/x86_64/java-1_4_2-ibm-1.4.2_sr13-0.4.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_4_2-ibm" epoch="0" ver="1.4.2_sr12" rel="0.4" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_4_2-ibm"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_4_2-ibm-devel</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="1.4.2_sr12" rel="0.4"/>
      <checksum type="sha" pkgid="YES">a19ae8a388bac4ef44aa8a419d95f6f0681c37b0</checksum>
      <time file="1228397010" build="1228354378"/>
      <size package="2420716" installed="3423502" archive="3432900"/>
      <location xml:base="media://#1" href="suse/x86_64/java-1_4_2-ibm-devel-1.4.2_sr13-0.4.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_4_2-ibm-devel" epoch="0" ver="1.4.2_sr12" rel="0.4" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_4_2-ibm-devel"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
  </atoms>
</patch>
