<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="a356a79c407627003e7a1be8c946b43f"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="java-1_4_2-sun-4536"
    timestamp="1192098944"
    engine="1.0">
  <yum:name>java-1_4_2-sun</yum:name>
  <summary lang="en">java-1_4_2-sun: Security update to 1.4.2 patchlevel 16</summary>
  <summary lang="de">java-1_4_2-sun: Security update auf 1.4.2 Patchlevel 16</summary>
  <description lang="en">The Sun JAVA JDK 1.4.2 was upgraded to release 16 to fix
various bugs, including the following security bugs:

http://sunsolve.sun.com/search/document.do?assetkey=1-26-103
079-1

CVE-2007-5232: Sun Java Runtime Environment (JRE) in JDK
and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12
and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and
JRE 1.3.1_20 and earlier, when applet caching is enabled,
allows remote attackers to violate the security model for
an applet's outbound connections via a DNS rebinding attack.

http://sunsolve.sun.com/search/document.do?assetkey=1-26-103
073-1

CVE-2007-5236: Java Web Start in Sun JDK and JRE 5.0 Update
12 and earlier, and SDK and JRE 1.4.2_15 and earlier, on
Windows does not properly enfor ce access restrictions for
untrusted applications, which allows user-assisted remote
attackers to read local files via an untrusted applica tion.

CVE-2007-5237: Java Web Start in Sun JDK and JRE 6 Update 2
and earlier does not properly enforce access restrictions
for untrusted applications, which allows user-assisted
remote attackers to read and modify local files via an
untrusted application, aka &quot;two vulnerabilities&quot;.

CVE-2007-5238: Java Web Start in Sun JDK and JRE 6 Update 2
and earlier, JDK and JRE 5.0 Update 12 and earlier, and SDK
and JRE 1.4.2_15 and earlier does not properly enforce
access restrictions for untrusted applications, which
allows user-assisted remote attackers to obtain sensitive
information (the Java Web Start cache location) via an
untrusted application, aka &quot;three vulnerabilities.&quot;

http://sunsolve.sun.com/search/document.do?assetkey=1-26-103
072-1

CVE-2007-5239: Java Web Start in Sun JDK and JRE 6 Update 2
and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and
JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and
earlier does not properly enforce access restrictions for
untrusted (1) applications and (2) applets, which allows
user-assisted remote attackers to copy or rename arbitrary
files when local users perform drag-and-drop operations
from the untrusted application or applet window onto
certain types of desktop applications.

http://sunsolve.sun.com/search/document.do?assetkey=1-26-103
071-1

CVE-2007-5240: Visual truncation vulnerability in the Java
Runtime Environment in Sun JDK and JRE 6 Update 2 and
earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE
1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier
allows remote attackers to circumvent display of the
untrusted-code warning banner by creating a window larger
than the workstation screen.

http://sunsolve.sun.com/search/document.do?assetkey=1-26-103
078-1

CVE-2007-5273: Sun Java Runtime Environment (JRE) in JDK
and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12
and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and
JRE 1.3.1_20 and earlier, when an HTTP proxy server is
used, allows remote attackers to violate the security model
for an applet's outbound connections via a multi-pin DNS
rebinding attack in which the applet download relies on DNS
resolution on the proxy server, but the applet's socket
operations rely on DNS resolution on the local machine, a
different issue than CVE-2007-5274.

CVE-2007-5274: Sun Java Runtime Environment (JRE) in JDK
and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12
and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and
JRE 1.3.1_20 and earlier, when Firefox or Opera is used,
allows remote attackers to violate the security model for
JavaScript outbound connections via a multi-pin DNS
rebinding attack dependent on the LiveConnect API, in which
JavaScript download relies on DNS resolution by the
browser, but JavaScript socket operations rely on separate
DNS resolution by a Java Virtual Machine (JVM), a different
issue than CVE-2007-5273.
</description>
  <description lang="de">Das Sun JAVA JDK 1.4.2 wurde auf Release 16 gebracht, die
unter anderem folgende Sicherheitsprobleme behebt,
aufgelistet in englisch:

http://sunsolve.sun.com/search/document.do?assetkey=1-26-103
079-1

CVE-2007-5232: Sun Java Runtime Environment (JRE) in JDK
and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12
and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and
JRE 1.3.1_20 and earlier, when applet caching is enabled,
allows remote attackers to violate the security model for
an applet's outbound connections via a DNS rebinding attack.

http://sunsolve.sun.com/search/document.do?assetkey=1-26-103
073-1

CVE-2007-5236: Java Web Start in Sun JDK and JRE 5.0 Update
12 and earlier, and SDK and JRE 1.4.2_15 and earlier, on
Windows does not properly enfor ce access restrictions for
untrusted applications, which allows user-assisted remote
attackers to read local files via an untrusted applica tion.

CVE-2007-5237: Java Web Start in Sun JDK and JRE 6 Update 2
and earlier does not properly enforce access restrictions
for untrusted applications, which allows user-assisted
remote attackers to read and modify local files via an
untrusted application, aka &quot;two vulnerabilities&quot;.

CVE-2007-5238: Java Web Start in Sun JDK and JRE 6 Update 2
and earlier, JDK and JRE 5.0 Update 12 and earlier, and SDK
and JRE 1.4.2_15 and earlier does not properly enforce
access restrictions for untrusted applications, which
allows user-assisted remote attackers to obtain sensitive
information (the Java Web Start cache location) via an
untrusted application, aka &quot;three vulnerabilities.&quot;

http://sunsolve.sun.com/search/document.do?assetkey=1-26-103
072-1

CVE-2007-5239: Java Web Start in Sun JDK and JRE 6 Update 2
and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and
JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and
earlier does not properly enforce access restrictions for
untrusted (1) applications and (2) applets, which allows
user-assisted remote attackers to copy or rename arbitrary
files when local users perform drag-and-drop operations
from the untrusted application or applet window onto
certain types of desktop applications.

http://sunsolve.sun.com/search/document.do?assetkey=1-26-103
071-1

CVE-2007-5240: Visual truncation vulnerability in the Java
Runtime Environment in Sun JDK and JRE 6 Update 2 and
earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE
1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier
allows remote attackers to circumvent display of the
untrusted-code warning banner by creating a window larger
than the workstation screen.

http://sunsolve.sun.com/search/document.do?assetkey=1-26-103
078-1

CVE-2007-5273: Sun Java Runtime Environment (JRE) in JDK
and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12
and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and
JRE 1.3.1_20 and earlier, when an HTTP proxy server is
used, allows remote attackers to violate the security model
for an applet's outbound connections via a multi-pin DNS
rebinding attack in which the applet download relies on DNS
resolution on the proxy server, but the applet's socket
operations rely on DNS resolution on the local machine, a
different issue than CVE-2007-5274.

CVE-2007-5274: Sun Java Runtime Environment (JRE) in JDK
and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12
and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and
JRE 1.3.1_20 and earlier, when Firefox or Opera is used,
allows remote attackers to violate the security model for
JavaScript outbound connections via a multi-pin DNS
rebinding attack dependent on the LiveConnect API, in which
JavaScript download relies on DNS resolution by the
browser, but JavaScript socket operations rely on separate
DNS resolution by a Java Virtual Machine (JVM), a different
issue than CVE-2007-5273.
</description>
  <yum:version ver="4536" rel="0"/>
  <rpm:requires>
    <rpm:entry kind="atom" name="java-1_4_2-sun" epoch="0" ver="1.4.2.16" rel="0.2" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_4_2-sun-alsa" epoch="0" ver="1.4.2.16" rel="0.2" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_4_2-sun-demo" epoch="0" ver="1.4.2.16" rel="0.2" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_4_2-sun-devel" epoch="0" ver="1.4.2.16" rel="0.2" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_4_2-sun-jdbc" epoch="0" ver="1.4.2.16" rel="0.2" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_4_2-sun-plugin" epoch="0" ver="1.4.2.16" rel="0.2" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_4_2-sun-src" epoch="0" ver="1.4.2.16" rel="0.2" flags="EQ"/>
  </rpm:requires>
  <category>security</category>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_4_2-sun</name>
      <arch>i586</arch>
      <version epoch="0" ver="1.4.2.16" rel="0.2"/>
      <checksum type="sha" pkgid="YES">4877d2564e8e18e4cb1b02fc8eb8b7ab29fbbb7d</checksum>
      <time file="1192112695" build="1192098944"/>
      <size package="18808154" installed="60013319" archive="60138832"/>
      <location href="rpm/i586/java-1_4_2-sun-1.4.2.16-0.2.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_4_2-sun" epoch="0" ver="1.4.2.16" rel="0.2" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_4_2-sun"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <patchrpm>
          <location href="rpm/i586/java-1_4_2-sun-1.4.2.16-0.2.i586.patch.rpm"/>
          <checksum type="sha">3b8dc71b48282918ff8d4a110bbeaf0fb37568e2</checksum>
          <time file="1192120526" build="1192098944"/>
          <size package="18746158" archive="60077796"/>
          <base-version epoch="0" ver="1.4.2.11" rel="8"/>
          <base-version epoch="0" ver="1.4.2.13" rel="0.2"/>
          <base-version epoch="0" ver="1.4.2.15" rel="2.1"/>
        </patchrpm>
        <deltarpm>
          <location href="rpm/i586/java-1_4_2-sun-1.4.2.11_1.4.2.16-8_0.2.i586.delta.rpm"/>
          <checksum type="sha">0adb687ba8db02914f204ffc30626d10bbd2d02b</checksum>
          <time file="1192120564" build="1192098944"/>
          <size package="1484546" archive="0"/>
          <base-version epoch="0" ver="1.4.2.11" rel="8" md5sum="132e982597bcf31d810aa4c5ace1d3b3" buildtime="1146233451" sequence_info="java-1_4_2-sun-1.4.2.11-8-8f20a3929183f24b816b94b76abc066fbb21aa15cd66c1"/>
        </deltarpm>
        <deltarpm>
          <location href="rpm/i586/java-1_4_2-sun-1.4.2.15_1.4.2.16-2.1_0.2.i586.delta.rpm"/>
          <checksum type="sha">f102be68ddcc765a05ca5a0ebf04e2051d9ee87d</checksum>
          <time file="1192120593" build="1192098944"/>
          <size package="456842" archive="0"/>
          <base-version epoch="0" ver="1.4.2.15" rel="2.1" md5sum="159c176de609647b9cbc4e2f477a793d" buildtime="1183637404" sequence_info="java-1_4_2-sun-1.4.2.15-2.1-803426b4249b46ffd7130d1240347aa3e32bf11aa15cf6"/>
        </deltarpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_4_2-sun-alsa</name>
      <arch>i586</arch>
      <version epoch="0" ver="1.4.2.16" rel="0.2"/>
      <checksum type="sha" pkgid="YES">014540adcb26a5902db161a6ce8f9afc340c041f</checksum>
      <time file="1192112696" build="1192098944"/>
      <size package="21978" installed="26584" archive="26888"/>
      <location href="rpm/i586/java-1_4_2-sun-alsa-1.4.2.16-0.2.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_4_2-sun-alsa" epoch="0" ver="1.4.2.16" rel="0.2" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_4_2-sun-alsa"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <patchrpm>
          <location href="rpm/i586/java-1_4_2-sun-alsa-1.4.2.16-0.2.i586.patch.rpm"/>
          <checksum type="sha">8d3eb9aa5e8446868a0c5877b195ea2b69bf2eb8</checksum>
          <time file="1192120606" build="1192098944"/>
          <size package="22166" archive="26888"/>
          <base-version epoch="0" ver="1.4.2.11" rel="8"/>
          <base-version epoch="0" ver="1.4.2.13" rel="0.2"/>
          <base-version epoch="0" ver="1.4.2.15" rel="2.1"/>
        </patchrpm>
        <deltarpm>
          <location href="rpm/i586/java-1_4_2-sun-alsa-1.4.2.11_1.4.2.16-8_0.2.i586.delta.rpm"/>
          <checksum type="sha">a1b7dee72dd1fe4ce42721d9dc78a202fed696ca</checksum>
          <time file="1192120607" build="1192098944"/>
          <size package="11242" archive="0"/>
          <base-version epoch="0" ver="1.4.2.11" rel="8" md5sum="1c2f0c9d0e6048a878d160830b9ce6ba" buildtime="1146233451" sequence_info="java-1_4_2-sun-alsa-1.4.2.11-8-1db3cf409807390581071c3239d770f310"/>
        </deltarpm>
        <deltarpm>
          <location href="rpm/i586/java-1_4_2-sun-alsa-1.4.2.15_1.4.2.16-2.1_0.2.i586.delta.rpm"/>
          <checksum type="sha">2be8bcc7ca00165db4375955cb8220b1ca24d6c5</checksum>
          <time file="1192120608" build="1192098944"/>
          <size package="11230" archive="0"/>
          <base-version epoch="0" ver="1.4.2.15" rel="2.1" md5sum="e51e6c719126ab5efe679786c4f47cba" buildtime="1183637404" sequence_info="java-1_4_2-sun-alsa-1.4.2.15-2.1-ec43d8d80a8ab1f7319526665761443a10"/>
        </deltarpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_4_2-sun-demo</name>
      <arch>i586</arch>
      <version epoch="0" ver="1.4.2.16" rel="0.2"/>
      <checksum type="sha" pkgid="YES">e030335e812d7f5777aca133f12cc7c9466569ea</checksum>
      <time file="1192112696" build="1192098944"/>
      <size package="6318459" installed="9468084" archive="9650800"/>
      <location href="rpm/i586/java-1_4_2-sun-demo-1.4.2.16-0.2.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_4_2-sun-demo" epoch="0" ver="1.4.2.16" rel="0.2" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_4_2-sun-demo"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <patchrpm>
          <location href="rpm/i586/java-1_4_2-sun-demo-1.4.2.16-0.2.i586.patch.rpm"/>
          <checksum type="sha">1449de43fbd7f88bd4295583f9849726aef10e01</checksum>
          <time file="1192120617" build="1192098944"/>
          <size package="4501386" archive="4662796"/>
          <base-version epoch="0" ver="1.4.2.11" rel="8"/>
          <base-version epoch="0" ver="1.4.2.13" rel="0.2"/>
          <base-version epoch="0" ver="1.4.2.15" rel="2.1"/>
        </patchrpm>
        <deltarpm>
          <location href="rpm/i586/java-1_4_2-sun-demo-1.4.2.11_1.4.2.16-8_0.2.i586.delta.rpm"/>
          <checksum type="sha">da1cf64e183fbfab84a5c56b452c3c6627f2cab0</checksum>
          <time file="1192120622" build="1192098944"/>
          <size package="132327" archive="0"/>
          <base-version epoch="0" ver="1.4.2.11" rel="8" md5sum="3a1e9cb86b535ea653803231dd18294b" buildtime="1146233451" sequence_info="java-1_4_2-sun-demo-1.4.2.11-8-b41c10a6083449e44a034ee7f269ba0fecf1"/>
        </deltarpm>
        <deltarpm>
          <location href="rpm/i586/java-1_4_2-sun-demo-1.4.2.15_1.4.2.16-2.1_0.2.i586.delta.rpm"/>
          <checksum type="sha">b48434b7632f5ba3bb74fe255aec517ed3694889</checksum>
          <time file="1192120627" build="1192098944"/>
          <size package="132068" archive="0"/>
          <base-version epoch="0" ver="1.4.2.15" rel="2.1" md5sum="066dc7eda76f25899b25cea8079afc0f" buildtime="1183637404" sequence_info="java-1_4_2-sun-demo-1.4.2.15-2.1-d7a1918b187d19de8d5b95f21aa1c658ecf1"/>
        </deltarpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_4_2-sun-devel</name>
      <arch>i586</arch>
      <version epoch="0" ver="1.4.2.16" rel="0.2"/>
      <checksum type="sha" pkgid="YES">e9c71415eb5c40e53071fa6a0f34c701335e13f9</checksum>
      <time file="1192112696" build="1192098944"/>
      <size package="2912590" installed="8027822" archive="8038236"/>
      <location href="rpm/i586/java-1_4_2-sun-devel-1.4.2.16-0.2.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_4_2-sun-devel" epoch="0" ver="1.4.2.16" rel="0.2" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_4_2-sun-devel"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <patchrpm>
          <location href="rpm/i586/java-1_4_2-sun-devel-1.4.2.16-0.2.i586.patch.rpm"/>
          <checksum type="sha">3e21981e5975d69daf3c62c484344dba215eb806</checksum>
          <time file="1192120638" build="1192098944"/>
          <size package="2818335" archive="7945328"/>
          <base-version epoch="0" ver="1.4.2.11" rel="8"/>
          <base-version epoch="0" ver="1.4.2.13" rel="0.2"/>
          <base-version epoch="0" ver="1.4.2.15" rel="2.1"/>
        </patchrpm>
        <deltarpm>
          <location href="rpm/i586/java-1_4_2-sun-devel-1.4.2.11_1.4.2.16-8_0.2.i586.delta.rpm"/>
          <checksum type="sha">f82ceba0c36da7fac09d7006b5390a9d9debf593</checksum>
          <time file="1192120642" build="1192098944"/>
          <size package="277893" archive="0"/>
          <base-version epoch="0" ver="1.4.2.11" rel="8" md5sum="4923f5499ede7d839a42dbc107364006" buildtime="1146233451" sequence_info="java-1_4_2-sun-devel-1.4.2.11-8-5e4d9a91e2947d7dda1ec570e06efe35d55d10"/>
        </deltarpm>
        <deltarpm>
          <location href="rpm/i586/java-1_4_2-sun-devel-1.4.2.15_1.4.2.16-2.1_0.2.i586.delta.rpm"/>
          <checksum type="sha">607de76cb1560ae77317c64b8861f42092c4aa55</checksum>
          <time file="1192120646" build="1192098944"/>
          <size package="198299" archive="0"/>
          <base-version epoch="0" ver="1.4.2.15" rel="2.1" md5sum="5599dfe80fe053e4a3332cc4f76e7720" buildtime="1183637404" sequence_info="java-1_4_2-sun-devel-1.4.2.15-2.1-90ed0e25d4725c5e84a10e0efe8af527d5"/>
        </deltarpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_4_2-sun-jdbc</name>
      <arch>i586</arch>
      <version epoch="0" ver="1.4.2.16" rel="0.2"/>
      <checksum type="sha" pkgid="YES">e6712568a0207070643ecd297360dbb0cb832f33</checksum>
      <time file="1192112696" build="1192098944"/>
      <size package="24202" installed="50016" archive="50316"/>
      <location href="rpm/i586/java-1_4_2-sun-jdbc-1.4.2.16-0.2.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_4_2-sun-jdbc" epoch="0" ver="1.4.2.16" rel="0.2" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_4_2-sun-jdbc"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <patchrpm>
          <location href="rpm/i586/java-1_4_2-sun-jdbc-1.4.2.16-0.2.i586.patch.rpm"/>
          <checksum type="sha">13cdcbecde84758478eb10630808183cb0ab4e0a</checksum>
          <time file="1192120649" build="1192098944"/>
          <size package="24388" archive="50316"/>
          <base-version epoch="0" ver="1.4.2.11" rel="8"/>
          <base-version epoch="0" ver="1.4.2.13" rel="0.2"/>
          <base-version epoch="0" ver="1.4.2.15" rel="2.1"/>
        </patchrpm>
        <deltarpm>
          <location href="rpm/i586/java-1_4_2-sun-jdbc-1.4.2.11_1.4.2.16-8_0.2.i586.delta.rpm"/>
          <checksum type="sha">2be3579ac5e830704053aa401482317410cf97b3</checksum>
          <time file="1192120650" build="1192098944"/>
          <size package="11227" archive="0"/>
          <base-version epoch="0" ver="1.4.2.11" rel="8" md5sum="5cc8dbfcfcd9e7264ef16e9baf0d24fc" buildtime="1146233451" sequence_info="java-1_4_2-sun-jdbc-1.4.2.11-8-51614a6cd22f0de9368279bc597a7cb310"/>
        </deltarpm>
        <deltarpm>
          <location href="rpm/i586/java-1_4_2-sun-jdbc-1.4.2.15_1.4.2.16-2.1_0.2.i586.delta.rpm"/>
          <checksum type="sha">89af644074a58d1d7da3572e97de987780e5f453</checksum>
          <time file="1192120650" build="1192098944"/>
          <size package="11228" archive="0"/>
          <base-version epoch="0" ver="1.4.2.15" rel="2.1" md5sum="15d749d534785cfdf8bd109b7e1f76c9" buildtime="1183637404" sequence_info="java-1_4_2-sun-jdbc-1.4.2.15-2.1-e70fcec5cb5165499dfd3f9ff960d23510"/>
        </deltarpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_4_2-sun-plugin</name>
      <arch>i586</arch>
      <version epoch="0" ver="1.4.2.16" rel="0.2"/>
      <checksum type="sha" pkgid="YES">0adb8ab6ba5c9335273df21295a1804a47d99cad</checksum>
      <time file="1192112696" build="1192098944"/>
      <size package="800608" installed="2648930" archive="2654792"/>
      <location href="rpm/i586/java-1_4_2-sun-plugin-1.4.2.16-0.2.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_4_2-sun-plugin" epoch="0" ver="1.4.2.16" rel="0.2" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_4_2-sun-plugin"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <patchrpm>
          <location href="rpm/i586/java-1_4_2-sun-plugin-1.4.2.16-0.2.i586.patch.rpm"/>
          <checksum type="sha">48da53fc2f16625d8a44ce99c1e7913c13d2f9e6</checksum>
          <time file="1192120655" build="1192098944"/>
          <size package="800842" archive="2654492"/>
          <base-version epoch="0" ver="1.4.2.11" rel="8"/>
          <base-version epoch="0" ver="1.4.2.13" rel="0.2"/>
          <base-version epoch="0" ver="1.4.2.15" rel="2.1"/>
        </patchrpm>
        <deltarpm>
          <location href="rpm/i586/java-1_4_2-sun-plugin-1.4.2.11_1.4.2.16-8_0.2.i586.delta.rpm"/>
          <checksum type="sha">2dd9c2784c2fc25290b371963c0e98f41474acaa</checksum>
          <time file="1192120657" build="1192098944"/>
          <size package="43261" archive="0"/>
          <base-version epoch="0" ver="1.4.2.11" rel="8" md5sum="969bbef285e0217fe353eadc9e0d66e0" buildtime="1146233451" sequence_info="java-1_4_2-sun-plugin-1.4.2.11-8-c9ff66d58fb25d505736775630c5fd3fc312"/>
        </deltarpm>
        <deltarpm>
          <location href="rpm/i586/java-1_4_2-sun-plugin-1.4.2.15_1.4.2.16-2.1_0.2.i586.delta.rpm"/>
          <checksum type="sha">24daa950c58cd2db1925ee22617f472c7b877988</checksum>
          <time file="1192120658" build="1192098944"/>
          <size package="37165" archive="0"/>
          <base-version epoch="0" ver="1.4.2.15" rel="2.1" md5sum="fc9e644929c7571f281382375f808dc7" buildtime="1183637404" sequence_info="java-1_4_2-sun-plugin-1.4.2.15-2.1-34e81718cf1740a89667c36c296751aec312"/>
        </deltarpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_4_2-sun-src</name>
      <arch>i586</arch>
      <version epoch="0" ver="1.4.2.16" rel="0.2"/>
      <checksum type="sha" pkgid="YES">ca8ec3a2dd299bf0e9a454304c5aeea362808183</checksum>
      <time file="1192112698" build="1192098944"/>
      <size package="10948552" installed="11524761" archive="11525044"/>
      <location href="rpm/i586/java-1_4_2-sun-src-1.4.2.16-0.2.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_4_2-sun-src" epoch="0" ver="1.4.2.16" rel="0.2" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_4_2-sun-src"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <patchrpm>
          <location href="rpm/i586/java-1_4_2-sun-src-1.4.2.16-0.2.i586.patch.rpm"/>
          <checksum type="sha">b956be5d2149f2f52813da2a5cde71e819b17f7a</checksum>
          <time file="1192120677" build="1192098944"/>
          <size package="10948703" archive="11525044"/>
          <base-version epoch="0" ver="1.4.2.13" rel="0.2"/>
          <base-version epoch="0" ver="1.4.2.15" rel="2.1"/>
        </patchrpm>
        <deltarpm>
          <location href="rpm/i586/java-1_4_2-sun-src-1.4.2.11_1.4.2.16-8_0.2.i586.delta.rpm"/>
          <checksum type="sha">4bddbac0ec73ced302af8ffe7941c3063373e94e</checksum>
          <time file="1192120688" build="1192098944"/>
          <size package="734147" archive="0"/>
          <base-version epoch="0" ver="1.4.2.11" rel="8" md5sum="88f239cf5b9712eb3b0652dd228e86d7" buildtime="1146233451" sequence_info="java-1_4_2-sun-src-1.4.2.11-8-f420a66a18700e86ceafb47eec96663f10"/>
        </deltarpm>
        <deltarpm>
          <location href="rpm/i586/java-1_4_2-sun-src-1.4.2.15_1.4.2.16-2.1_0.2.i586.delta.rpm"/>
          <checksum type="sha">95a84181ab39fe30d06a92e76128c29c2b40a447</checksum>
          <time file="1192120697" build="1192098944"/>
          <size package="393792" archive="0"/>
          <base-version epoch="0" ver="1.4.2.15" rel="2.1" md5sum="1a23c8b996815dd55f80c4298830256f" buildtime="1183637404" sequence_info="java-1_4_2-sun-src-1.4.2.15-2.1-98ae2b23fa5a8a538e1f06ec926388cf10"/>
        </deltarpm>
      </pkgfiles>
    </package>
  </atoms>
</patch>
