<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="f558fc6a0e3ea683889ee8d14ceac1b3"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="slesp3-java-1_4_2-ibm-6755"
    timestamp="1262707667"
    engine="1.0">
  <yum:name>slesp3-java-1_4_2-ibm</yum:name>
  <summary lang="en">Security update for IBM Java 1.4.2</summary>
  <summary lang="de">Security update for IBM Java 1.4.2</summary>
  <description lang="en">IBM Java 1.4.2 was updated to 13 fp3.

The following security issues were fixed: CVE-2009-3867: A
buffer overflow vulnerability in the Java Runtime
Environment audio system might allow an untrusted applet or
Java Web Start application to escalate privileges. For
example, an untrusted applet might grant itself permissions
to read and write local files, or run local applications
that are accessible to the user running the untrusted
applet.

CVE-2009-3875: A security vulnerability in the Java Runtime
Environment with verifying HMAC digests might allow
authentication to be bypassed. This action can allow a user
to forge a digital signature that would be accepted as
valid. Applications that validate HMAC-based digital
signatures might be vulnerable to this type of attack.

CVE-2009-3869: A buffer overflow vulnerability in the Java
Runtime Environment with processing image files might allow
an untrusted applet or Java Web Start application to
escalate privileges. For example, an untrusted applet might
grant itself permissions to read and write local files or
run local applications that are accessible to the user
running the untrusted applet.

CVE-2009-3871: A buffer overflow vulnerability in the Java
Runtime Environment with processing image files might allow
an untrusted applet or Java Web Start application to
escalate privileges. For example, an untrusted applet might
grant itself permissions to read and write local files or
run local applications that are accessible to the user
running the untrusted applet.

CVE-2009-3874: An integer overflow vulnerability in the
Java Runtime Environment with processing JPEG images might
allow an untrusted applet or Java Web Start application to
escalate privileges. For example, an untrusted applet might
grant itself permissions to read and write local files or
run local applications that are accessible to the user
running the untrusted applet.
</description>
  <description lang="de">IBM Java 1.4.2 was updated to 13 fp3.

The following security issues were fixed: CVE-2009-3867: A
buffer overflow vulnerability in the Java Runtime
Environment audio system might allow an untrusted applet or
Java Web Start application to escalate privileges. For
example, an untrusted applet might grant itself permissions
to read and write local files, or run local applications
that are accessible to the user running the untrusted
applet.

CVE-2009-3875: A security vulnerability in the Java Runtime
Environment with verifying HMAC digests might allow
authentication to be bypassed. This action can allow a user
to forge a digital signature that would be accepted as
valid. Applications that validate HMAC-based digital
signatures might be vulnerable to this type of attack.

CVE-2009-3869: A buffer overflow vulnerability in the Java
Runtime Environment with processing image files might allow
an untrusted applet or Java Web Start application to
escalate privileges. For example, an untrusted applet might
grant itself permissions to read and write local files or
run local applications that are accessible to the user
running the untrusted applet.

CVE-2009-3871: A buffer overflow vulnerability in the Java
Runtime Environment with processing image files might allow
an untrusted applet or Java Web Start application to
escalate privileges. For example, an untrusted applet might
grant itself permissions to read and write local files or
run local applications that are accessible to the user
running the untrusted applet.

CVE-2009-3874: An integer overflow vulnerability in the
Java Runtime Environment with processing JPEG images might
allow an untrusted applet or Java Web Start application to
escalate privileges. For example, an untrusted applet might
grant itself permissions to read and write local files or
run local applications that are accessible to the user
running the untrusted applet.
</description>
  <yum:version ver="6755" rel="0"/>
  <rpm:requires>
    <rpm:entry kind="atom" name="java-1_4_2-ibm" epoch="0" ver="1.4.2_sr13.3" rel="1.4.1" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_4_2-ibm-devel" epoch="0" ver="1.4.2_sr13.3" rel="1.4.1" flags="EQ"/>
  </rpm:requires>
  <category>security</category>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_4_2-ibm</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="1.4.2_sr13.3" rel="1.4.1"/>
      <checksum type="sha" pkgid="YES">829d55a48d0b257a2120e5597b3445bcdbc1bde8</checksum>
      <time file="1262707721" build="1262707667"/>
      <size package="43032252" installed="68196159" archive="67903484"/>
      <location xml:base="media://#1" href="suse/x86_64/java-1_4_2-ibm-1.4.2_sr13.3-1.4.1.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_4_2-ibm" epoch="0" ver="1.4.2_sr13.3" rel="1.4.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_4_2-ibm"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_4_2-ibm-devel</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="1.4.2_sr13.3" rel="1.4.1"/>
      <checksum type="sha" pkgid="YES">2a7b6b7b9049d9768225b913f6675fc50a23b38c</checksum>
      <time file="1262707721" build="1262707667"/>
      <size package="2425953" installed="3529482" archive="3538660"/>
      <location xml:base="media://#1" href="suse/x86_64/java-1_4_2-ibm-devel-1.4.2_sr13.3-1.4.1.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_4_2-ibm-devel" epoch="0" ver="1.4.2_sr13.3" rel="1.4.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_4_2-ibm-devel"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
  </atoms>
</patch>
