These packages provide the OpenJDK 6 Java Runtime Environment and theOpenJDK 6 Software Development Kit.A flaw was found in the Swing library. Forged TimerEvents could be used tobypass SecurityManager checks, allowing access to otherwise blocked filesand directories. (CVE-2010-4465)A flaw was found in the HotSpot component in OpenJDK. Certain bytecodeinstructions confused the memory management within the Java Virtual Machine(JVM), which could lead to heap corruption. (CVE-2010-4469)A flaw was found in the way JAXP (Java API for XML Processing) componentswere handled, allowing them to be manipulated by untrusted applets. Thiscould be used to elevate privileges and bypass secure XML processingrestrictions. (CVE-2010-4470)It was found that untrusted applets could create and place cache entries inthe name resolution cache. This could allow an attacker targetedmanipulation over name resolution until the OpenJDK VM is restarted.(CVE-2010-4448)It was found that the Java launcher provided by OpenJDK did not check theLD_LIBRARY_PATH environment variable for insecure empty path elements. Alocal attacker able to trick a user into running the Java launcher whileworking from an attacker-writable directory could use this flaw to load anuntrusted library, subverting the Java security model. (CVE-2010-4450)A flaw was found in the XML Digital Signature component in OpenJDK.Untrusted code could use this flaw to replace the Java Runtime Environment(JRE) XML Digital Signature Transform or C14N algorithm implementations tointercept digital signature operations. (CVE-2010-4472)Note: All of the above flaws can only be remotely triggered in OpenJDK bycalling the "appletviewer" application.This update also provides one defense in depth patch. (BZ#676019)All users of java-1.6.0-openjdk are advised to upgrade to these updatedpackages, which resolve these issues. All running instances of OpenJDK Javamust be restarted for the update to take effect.