<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="d5c49d253f068382dcf6120eb25b280c"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="slesp2-java-1_5_0-ibm-6253"
    timestamp="1242398543"
    engine="1.0">
  <yum:name>slesp2-java-1_5_0-ibm</yum:name>
  <summary lang="en">Security update for IBM Java 5</summary>
  <summary lang="de">Security update for IBM Java 5</summary>
  <description lang="en">The update brings IBM Java 5 to SR9-SSU.

It fixes a lot of security issues: CVE-2009-1100: A
vulnerability in the Java Runtime Environment (JRE) with
storing temporary font files may allow an untrusted applet
or application to consume a disproportionate amount of disk
space resulting in a denial-of-service condition.

CVE-2009-1100: A vulnerability in the Java Runtime
Environment (JRE) with processing temporary font files may
allow an untrusted applet or application to retain
temporary files resulting in a denial-of-service condition.

CVE-2009-1103: A vulnerability in the Java Plug-in with
deserializing applets may allow an untrusted applet to
escalate privileges. For example, an untrusted applet may
grant itself permissions to read and write local files or
execute local applications that are accessible to the user
running the untrusted applet.

CVE-2009-1104: The Java Plug-in allows Javascript code that
is loaded from the localhost to connect to any port on the
system. This may be leveraged together with XSS
vulnerabilities in a blended attack to access other
applications listening on ports other than the one where
the Javascript code was served from.

CVE-2009-1093: A vulnerability in the Java Runtime
Environment (JRE) with initializing LDAP connections may be
exploited by a remote client to cause a denial-of-service
condition on the LDAP service.

CVE-2009-1094: A vulnerability in Java Runtime Environment
LDAP client implementation may allow malicious data from an
LDAP server to cause malicious code to be unexpectedly
loaded and executed on an LDAP client.

CVE-2009-1107: The Java Plugin displays a warning dialog
for signed applets. A signed applet can obscure the
contents of the dialog and trick a user into trusting the
applet.

CVE-2009-1095 CVE-2009-1096: Buffer overflow
vulnerabilities in the Java Runtime Environment (JRE) with
unpacking applets and Java Web Start applications using the
unpack200 JAR unpacking utility may allow an untrusted
applet or application to escalate privileges. For example,
an untrusted applet may grant itself permissions to read
and write local files or execute local applications that
are accessible to the user running the untrusted applet.

CVE-2009-1098: A buffer overflow vulnerability in the Java
Runtime Environment with processing GIF images may allow an
untrusted applet or Java Web Start application to escalate
privileges. For example, an untrusted applet may grant
itself permissions to read and write local files or execute
local applications that are accessible to the user running
the untrusted applet.

CVE-2009-1099: A buffer overflow vulnerability in the Java
Runtime Environment with processing fonts may allow an
untrusted applet or Java Web Start application to escalate
privileges. For example, an untrusted applet may grant
itself permissions to read and write local files or execute
local applications that are accessible to the user running
the untrusted applet.
</description>
  <description lang="de">The update brings IBM Java 5 to SR9-SSU.

It fixes a lot of security issues: CVE-2009-1100: A
vulnerability in the Java Runtime Environment (JRE) with
storing temporary font files may allow an untrusted applet
or application to consume a disproportionate amount of disk
space resulting in a denial-of-service condition.

CVE-2009-1100: A vulnerability in the Java Runtime
Environment (JRE) with processing temporary font files may
allow an untrusted applet or application to retain
temporary files resulting in a denial-of-service condition.

CVE-2009-1103: A vulnerability in the Java Plug-in with
deserializing applets may allow an untrusted applet to
escalate privileges. For example, an untrusted applet may
grant itself permissions to read and write local files or
execute local applications that are accessible to the user
running the untrusted applet.

CVE-2009-1104: The Java Plug-in allows Javascript code that
is loaded from the localhost to connect to any port on the
system. This may be leveraged together with XSS
vulnerabilities in a blended attack to access other
applications listening on ports other than the one where
the Javascript code was served from.

CVE-2009-1093: A vulnerability in the Java Runtime
Environment (JRE) with initializing LDAP connections may be
exploited by a remote client to cause a denial-of-service
condition on the LDAP service.

CVE-2009-1094: A vulnerability in Java Runtime Environment
LDAP client implementation may allow malicious data from an
LDAP server to cause malicious code to be unexpectedly
loaded and executed on an LDAP client.

CVE-2009-1107: The Java Plugin displays a warning dialog
for signed applets. A signed applet can obscure the
contents of the dialog and trick a user into trusting the
applet.

CVE-2009-1095 CVE-2009-1096: Buffer overflow
vulnerabilities in the Java Runtime Environment (JRE) with
unpacking applets and Java Web Start applications using the
unpack200 JAR unpacking utility may allow an untrusted
applet or application to escalate privileges. For example,
an untrusted applet may grant itself permissions to read
and write local files or execute local applications that
are accessible to the user running the untrusted applet.

CVE-2009-1098: A buffer overflow vulnerability in the Java
Runtime Environment with processing GIF images may allow an
untrusted applet or Java Web Start application to escalate
privileges. For example, an untrusted applet may grant
itself permissions to read and write local files or execute
local applications that are accessible to the user running
the untrusted applet.

CVE-2009-1099: A buffer overflow vulnerability in the Java
Runtime Environment with processing fonts may allow an
untrusted applet or Java Web Start application to escalate
privileges. For example, an untrusted applet may grant
itself permissions to read and write local files or execute
local applications that are accessible to the user running
the untrusted applet.
</description>
  <yum:version ver="6253" rel="0"/>
  <rpm:requires>
    <rpm:entry kind="atom" name="java-1_5_0-ibm" epoch="0" ver="1.5.0_sr9" rel="2.8" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_5_0-ibm-32bit" epoch="0" ver="1.5.0_sr9" rel="2.8" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_5_0-ibm-alsa-32bit" epoch="0" ver="1.5.0_sr9" rel="2.8" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_5_0-ibm-devel" epoch="0" ver="1.5.0_sr9" rel="2.8" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_5_0-ibm-devel-32bit" epoch="0" ver="1.5.0_sr9" rel="2.8" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_5_0-ibm-fonts" epoch="0" ver="1.5.0_sr9" rel="2.8" flags="EQ"/>
  </rpm:requires>
  <category>security</category>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_5_0-ibm</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="1.5.0_sr9" rel="2.8"/>
      <checksum type="sha" pkgid="YES">b8ada43d72ba9cadf88c46d9c6e842aec964d2d5</checksum>
      <time file="1242400320" build="1242398543"/>
      <size package="42723505" installed="67352274" archive="67399692"/>
      <location xml:base="media://#1" href="suse/x86_64/java-1_5_0-ibm-1.5.0_sr10-0.3.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_5_0-ibm" epoch="0" ver="1.5.0_sr9" rel="2.8" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_5_0-ibm"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_5_0-ibm-32bit</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="1.5.0_sr9" rel="2.8"/>
      <checksum type="sha" pkgid="YES">18aaef8133f9b6bae8c20afbbc11164f68d6af40</checksum>
      <time file="1242399769" build="1242398879"/>
      <size package="40136240" installed="59343348" archive="59396292"/>
      <location xml:base="media://#1" href="suse/x86_64/java-1_5_0-ibm-32bit-1.5.0_sr10-0.3.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_5_0-ibm-32bit" epoch="0" ver="1.5.0_sr9" rel="2.8" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_5_0-ibm-32bit"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_5_0-ibm-alsa-32bit</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="1.5.0_sr9" rel="2.8"/>
      <checksum type="sha" pkgid="YES">e5df62927a00222039a4c4fc6b6f64ca145bccab</checksum>
      <time file="1242399769" build="1242398894"/>
      <size package="46443" installed="91494" archive="92372"/>
      <location xml:base="media://#1" href="suse/x86_64/java-1_5_0-ibm-alsa-32bit-1.5.0_sr10-0.3.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_5_0-ibm-alsa-32bit" epoch="0" ver="1.5.0_sr9" rel="2.8" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_5_0-ibm-alsa-32bit"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_5_0-ibm-devel</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="1.5.0_sr9" rel="2.8"/>
      <checksum type="sha" pkgid="YES">9396f75efd253006c74c038a20e44743c6ca60f3</checksum>
      <time file="1242400320" build="1242398543"/>
      <size package="8498805" installed="12938495" archive="12959940"/>
      <location xml:base="media://#1" href="suse/x86_64/java-1_5_0-ibm-devel-1.5.0_sr10-0.3.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_5_0-ibm-devel" epoch="0" ver="1.5.0_sr9" rel="2.8" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_5_0-ibm-devel"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_5_0-ibm-devel-32bit</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="1.5.0_sr9" rel="2.8"/>
      <checksum type="sha" pkgid="YES">982bee4a7de4a56240bf89daf330c526ce859237</checksum>
      <time file="1242399770" build="1242398895"/>
      <size package="9033745" installed="13559848" archive="13582736"/>
      <location xml:base="media://#1" href="suse/x86_64/java-1_5_0-ibm-devel-32bit-1.5.0_sr10-0.3.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_5_0-ibm-devel-32bit" epoch="0" ver="1.5.0_sr9" rel="2.8" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_5_0-ibm-devel-32bit"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_5_0-ibm-fonts</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="1.5.0_sr9" rel="2.8"/>
      <checksum type="sha" pkgid="YES">d2aa9eb7bf8b48af3f267f17c2da15c90b4e0089</checksum>
      <time file="1242400320" build="1242398543"/>
      <size package="1705679" installed="2998643" archive="2984560"/>
      <location xml:base="media://#1" href="suse/x86_64/java-1_5_0-ibm-fonts-1.5.0_sr10-0.3.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_5_0-ibm-fonts" epoch="0" ver="1.5.0_sr9" rel="2.8" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_5_0-ibm-fonts"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
  </atoms>
</patch>
