<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="a356a79c407627003e7a1be8c946b43f"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="java-1_4_2-sun-4536"
    timestamp="1192098889"
    engine="1.0">
  <yum:name>java-1_4_2-sun</yum:name>
  <summary lang="en">java-1_4_2-sun: Security update to 1.4.2 patchlevel 16</summary>
  <summary lang="de">java-1_4_2-sun: Security update auf 1.4.2 Patchlevel 16</summary>
  <description lang="en">The Sun JAVA JDK 1.4.2 was upgraded to release 16 to fix
various bugs, including the following security bugs:

http://sunsolve.sun.com/search/document.do?assetkey=1-26-103
079-1

CVE-2007-5232: Sun Java Runtime Environment (JRE) in JDK
and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12
and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and
JRE 1.3.1_20 and earlier, when applet caching is enabled,
allows remote attackers to violate the security model for
an applet's outbound connections via a DNS rebinding attack.

http://sunsolve.sun.com/search/document.do?assetkey=1-26-103
073-1

CVE-2007-5236: Java Web Start in Sun JDK and JRE 5.0 Update
12 and earlier, and SDK and JRE 1.4.2_15 and earlier, on
Windows does not properly enfor ce access restrictions for
untrusted applications, which allows user-assisted remote
attackers to read local files via an untrusted applica tion.

CVE-2007-5237: Java Web Start in Sun JDK and JRE 6 Update 2
and earlier does not properly enforce access restrictions
for untrusted applications, which allows user-assisted
remote attackers to read and modify local files via an
untrusted application, aka &quot;two vulnerabilities&quot;.

CVE-2007-5238: Java Web Start in Sun JDK and JRE 6 Update 2
and earlier, JDK and JRE 5.0 Update 12 and earlier, and SDK
and JRE 1.4.2_15 and earlier does not properly enforce
access restrictions for untrusted applications, which
allows user-assisted remote attackers to obtain sensitive
information (the Java Web Start cache location) via an
untrusted application, aka &quot;three vulnerabilities.&quot;

http://sunsolve.sun.com/search/document.do?assetkey=1-26-103
072-1

CVE-2007-5239: Java Web Start in Sun JDK and JRE 6 Update 2
and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and
JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and
earlier does not properly enforce access restrictions for
untrusted (1) applications and (2) applets, which allows
user-assisted remote attackers to copy or rename arbitrary
files when local users perform drag-and-drop operations
from the untrusted application or applet window onto
certain types of desktop applications.

http://sunsolve.sun.com/search/document.do?assetkey=1-26-103
071-1

CVE-2007-5240: Visual truncation vulnerability in the Java
Runtime Environment in Sun JDK and JRE 6 Update 2 and
earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE
1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier
allows remote attackers to circumvent display of the
untrusted-code warning banner by creating a window larger
than the workstation screen.

http://sunsolve.sun.com/search/document.do?assetkey=1-26-103
078-1

CVE-2007-5273: Sun Java Runtime Environment (JRE) in JDK
and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12
and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and
JRE 1.3.1_20 and earlier, when an HTTP proxy server is
used, allows remote attackers to violate the security model
for an applet's outbound connections via a multi-pin DNS
rebinding attack in which the applet download relies on DNS
resolution on the proxy server, but the applet's socket
operations rely on DNS resolution on the local machine, a
different issue than CVE-2007-5274.

CVE-2007-5274: Sun Java Runtime Environment (JRE) in JDK
and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12
and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and
JRE 1.3.1_20 and earlier, when Firefox or Opera is used,
allows remote attackers to violate the security model for
JavaScript outbound connections via a multi-pin DNS
rebinding attack dependent on the LiveConnect API, in which
JavaScript download relies on DNS resolution by the
browser, but JavaScript socket operations rely on separate
DNS resolution by a Java Virtual Machine (JVM), a different
issue than CVE-2007-5273.
</description>
  <description lang="de">Das Sun JAVA JDK 1.4.2 wurde auf Release 16 gebracht, die
unter anderem folgende Sicherheitsprobleme behebt,
aufgelistet in englisch:

http://sunsolve.sun.com/search/document.do?assetkey=1-26-103
079-1

CVE-2007-5232: Sun Java Runtime Environment (JRE) in JDK
and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12
and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and
JRE 1.3.1_20 and earlier, when applet caching is enabled,
allows remote attackers to violate the security model for
an applet's outbound connections via a DNS rebinding attack.

http://sunsolve.sun.com/search/document.do?assetkey=1-26-103
073-1

CVE-2007-5236: Java Web Start in Sun JDK and JRE 5.0 Update
12 and earlier, and SDK and JRE 1.4.2_15 and earlier, on
Windows does not properly enfor ce access restrictions for
untrusted applications, which allows user-assisted remote
attackers to read local files via an untrusted applica tion.

CVE-2007-5237: Java Web Start in Sun JDK and JRE 6 Update 2
and earlier does not properly enforce access restrictions
for untrusted applications, which allows user-assisted
remote attackers to read and modify local files via an
untrusted application, aka &quot;two vulnerabilities&quot;.

CVE-2007-5238: Java Web Start in Sun JDK and JRE 6 Update 2
and earlier, JDK and JRE 5.0 Update 12 and earlier, and SDK
and JRE 1.4.2_15 and earlier does not properly enforce
access restrictions for untrusted applications, which
allows user-assisted remote attackers to obtain sensitive
information (the Java Web Start cache location) via an
untrusted application, aka &quot;three vulnerabilities.&quot;

http://sunsolve.sun.com/search/document.do?assetkey=1-26-103
072-1

CVE-2007-5239: Java Web Start in Sun JDK and JRE 6 Update 2
and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and
JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and
earlier does not properly enforce access restrictions for
untrusted (1) applications and (2) applets, which allows
user-assisted remote attackers to copy or rename arbitrary
files when local users perform drag-and-drop operations
from the untrusted application or applet window onto
certain types of desktop applications.

http://sunsolve.sun.com/search/document.do?assetkey=1-26-103
071-1

CVE-2007-5240: Visual truncation vulnerability in the Java
Runtime Environment in Sun JDK and JRE 6 Update 2 and
earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE
1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier
allows remote attackers to circumvent display of the
untrusted-code warning banner by creating a window larger
than the workstation screen.

http://sunsolve.sun.com/search/document.do?assetkey=1-26-103
078-1

CVE-2007-5273: Sun Java Runtime Environment (JRE) in JDK
and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12
and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and
JRE 1.3.1_20 and earlier, when an HTTP proxy server is
used, allows remote attackers to violate the security model
for an applet's outbound connections via a multi-pin DNS
rebinding attack in which the applet download relies on DNS
resolution on the proxy server, but the applet's socket
operations rely on DNS resolution on the local machine, a
different issue than CVE-2007-5274.

CVE-2007-5274: Sun Java Runtime Environment (JRE) in JDK
and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12
and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and
JRE 1.3.1_20 and earlier, when Firefox or Opera is used,
allows remote attackers to violate the security model for
JavaScript outbound connections via a multi-pin DNS
rebinding attack dependent on the LiveConnect API, in which
JavaScript download relies on DNS resolution by the
browser, but JavaScript socket operations rely on separate
DNS resolution by a Java Virtual Machine (JVM), a different
issue than CVE-2007-5273.
</description>
  <yum:version ver="4536" rel="0"/>
  <rpm:requires>
    <rpm:entry kind="atom" name="java-1_4_2-sun" epoch="0" ver="1.4.2_update16" rel="0.1" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_4_2-sun-alsa" epoch="0" ver="1.4.2_update16" rel="0.1" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_4_2-sun-demo" epoch="0" ver="1.4.2_update16" rel="0.1" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_4_2-sun-devel" epoch="0" ver="1.4.2_update16" rel="0.1" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_4_2-sun-jdbc" epoch="0" ver="1.4.2_update16" rel="0.1" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_4_2-sun-plugin" epoch="0" ver="1.4.2_update16" rel="0.1" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_4_2-sun-src" epoch="0" ver="1.4.2_update16" rel="0.1" flags="EQ"/>
  </rpm:requires>
  <category>security</category>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_4_2-sun</name>
      <arch>i586</arch>
      <version epoch="0" ver="1.4.2_update16" rel="0.1"/>
      <checksum type="sha" pkgid="YES">ba735961c4e723a3d6be52de6bb1dd0518164c4c</checksum>
      <time file="1192119260" build="1192098889"/>
      <size package="18808838" installed="60012701" archive="60142432"/>
      <location href="rpm/i586/java-1_4_2-sun-1.4.2_update16-0.1.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_4_2-sun" epoch="0" ver="1.4.2_update16" rel="0.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_4_2-sun"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <patchrpm>
          <location href="rpm/i586/java-1_4_2-sun-1.4.2_update16-0.1.i586.patch.rpm"/>
          <checksum type="sha">0b30b83df188e9dac4cd871d857beb5d03db5da7</checksum>
          <time file="1192120753" build="1192098889"/>
          <size package="18749766" archive="60081396"/>
          <base-version epoch="0" ver="1.4.2_update12" rel="17"/>
          <base-version epoch="0" ver="1.4.2_update13" rel="3.1"/>
          <base-version epoch="0" ver="1.4.2_update15" rel="0.1"/>
        </patchrpm>
        <deltarpm>
          <location href="rpm/i586/java-1_4_2-sun-1.4.2_update12_1.4.2_update16-17_0.1.i586.delta.rpm"/>
          <checksum type="sha">4643d40230595648885fdec94eb6f129273149c0</checksum>
          <time file="1192120792" build="1192098889"/>
          <size package="1339551" archive="0"/>
          <base-version epoch="0" ver="1.4.2_update12" rel="17" md5sum="d9c2ce9d86d93fe2f5622c9a037e29d4" buildtime="1164480922" sequence_info="java-1_4_2-sun-1.4.2_update12-17-d7413a5ce7a6bef04aaba7815902693cbb21aa15ee66c1"/>
        </deltarpm>
        <deltarpm>
          <location href="rpm/i586/java-1_4_2-sun-1.4.2_update15_1.4.2_update16-0.1.i586.delta.rpm"/>
          <checksum type="sha">7bfc52033ef3c1a1171d67a49852afbb73331e59</checksum>
          <time file="1192120828" build="1192098889"/>
          <size package="459718" archive="0"/>
          <base-version epoch="0" ver="1.4.2_update15" rel="0.1" md5sum="d127e4f44e096a9dd06c14814bd2182c" buildtime="1183635016" sequence_info="java-1_4_2-sun-1.4.2_update15-0.1-4fd0693249691a5eb3e453d01118fbabe32bf11aa15cf6"/>
        </deltarpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_4_2-sun-alsa</name>
      <arch>i586</arch>
      <version epoch="0" ver="1.4.2_update16" rel="0.1"/>
      <checksum type="sha" pkgid="YES">ba4efc68f3060ce0321f4b6cea5930c153e34c55</checksum>
      <time file="1192119261" build="1192098889"/>
      <size package="22240" installed="26584" archive="26892"/>
      <location href="rpm/i586/java-1_4_2-sun-alsa-1.4.2_update16-0.1.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_4_2-sun-alsa" epoch="0" ver="1.4.2_update16" rel="0.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_4_2-sun-alsa"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <patchrpm>
          <location href="rpm/i586/java-1_4_2-sun-alsa-1.4.2_update16-0.1.i586.patch.rpm"/>
          <checksum type="sha">6e5bff6656505c5e7b30b2d364ce8e4baa1c20eb</checksum>
          <time file="1192120842" build="1192098889"/>
          <size package="22449" archive="26892"/>
          <base-version epoch="0" ver="1.4.2_update12" rel="17"/>
          <base-version epoch="0" ver="1.4.2_update13" rel="3.1"/>
          <base-version epoch="0" ver="1.4.2_update15" rel="0.1"/>
        </patchrpm>
        <deltarpm>
          <location href="rpm/i586/java-1_4_2-sun-alsa-1.4.2_update12_1.4.2_update16-17_0.1.i586.delta.rpm"/>
          <checksum type="sha">d1b8772ef49ee2ba21fdd831fa33329fd0aaafdc</checksum>
          <time file="1192120842" build="1192098889"/>
          <size package="11512" archive="0"/>
          <base-version epoch="0" ver="1.4.2_update12" rel="17" md5sum="8745b1ae55f13a8fbc6799c225f27db3" buildtime="1164480922" sequence_info="java-1_4_2-sun-alsa-1.4.2_update12-17-3c1fae20ee368ac3fe4bca3fc119398410"/>
        </deltarpm>
        <deltarpm>
          <location href="rpm/i586/java-1_4_2-sun-alsa-1.4.2_update15_1.4.2_update16-0.1.i586.delta.rpm"/>
          <checksum type="sha">af2744731c80a7375414ed03d13e1d3c4e2d9b93</checksum>
          <time file="1192120843" build="1192098889"/>
          <size package="11510" archive="0"/>
          <base-version epoch="0" ver="1.4.2_update15" rel="0.1" md5sum="a37f8d08c7e9789fc7876dc3e37da5b9" buildtime="1183635016" sequence_info="java-1_4_2-sun-alsa-1.4.2_update15-0.1-ed262b3c868ae7ea723ccb002ffe69a610"/>
        </deltarpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_4_2-sun-demo</name>
      <arch>i586</arch>
      <version epoch="0" ver="1.4.2_update16" rel="0.1"/>
      <checksum type="sha" pkgid="YES">53efe58baf9d0cb73dff678ae8cdcb661f2d3bd0</checksum>
      <time file="1192119263" build="1192098889"/>
      <size package="6318778" installed="9468084" archive="9650800"/>
      <location href="rpm/i586/java-1_4_2-sun-demo-1.4.2_update16-0.1.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_4_2-sun-demo" epoch="0" ver="1.4.2_update16" rel="0.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_4_2-sun-demo"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <patchrpm>
          <location href="rpm/i586/java-1_4_2-sun-demo-1.4.2_update16-0.1.i586.patch.rpm"/>
          <checksum type="sha">e72019046ec6620a247b8d3dd67ddd6bf14d0b97</checksum>
          <time file="1192120854" build="1192098889"/>
          <size package="4501771" archive="4662796"/>
          <base-version epoch="0" ver="1.4.2_update12" rel="17"/>
          <base-version epoch="0" ver="1.4.2_update13" rel="3.1"/>
          <base-version epoch="0" ver="1.4.2_update15" rel="0.1"/>
        </patchrpm>
        <deltarpm>
          <location href="rpm/i586/java-1_4_2-sun-demo-1.4.2_update15_1.4.2_update16-0.1.i586.delta.rpm"/>
          <checksum type="sha">3e91942caafa562d0c6d1b43997db89e05846b6a</checksum>
          <time file="1192120859" build="1192098889"/>
          <size package="132379" archive="0"/>
          <base-version epoch="0" ver="1.4.2_update15" rel="0.1" md5sum="0f2e825414bbfd9c1902c2d4d8471e43" buildtime="1183635016" sequence_info="java-1_4_2-sun-demo-1.4.2_update15-0.1-d7a1918b187d19de8d5b95f21aa1c658ecf1"/>
        </deltarpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_4_2-sun-devel</name>
      <arch>i586</arch>
      <version epoch="0" ver="1.4.2_update16" rel="0.1"/>
      <checksum type="sha" pkgid="YES">1dd718c738d6af5ceeb2415f8a3f5781769bcf23</checksum>
      <time file="1192119263" build="1192098889"/>
      <size package="2913049" installed="8027822" archive="8038492"/>
      <location href="rpm/i586/java-1_4_2-sun-devel-1.4.2_update16-0.1.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_4_2-sun-devel" epoch="0" ver="1.4.2_update16" rel="0.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_4_2-sun-devel"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <patchrpm>
          <location href="rpm/i586/java-1_4_2-sun-devel-1.4.2_update16-0.1.i586.patch.rpm"/>
          <checksum type="sha">f49a0270a44402257de8ffc9ae0805f63b46edf7</checksum>
          <time file="1192120868" build="1192098889"/>
          <size package="2818938" archive="7945584"/>
          <base-version epoch="0" ver="1.4.2_update12" rel="17"/>
          <base-version epoch="0" ver="1.4.2_update13" rel="3.1"/>
          <base-version epoch="0" ver="1.4.2_update15" rel="0.1"/>
        </patchrpm>
        <deltarpm>
          <location href="rpm/i586/java-1_4_2-sun-devel-1.4.2_update12_1.4.2_update16-17_0.1.i586.delta.rpm"/>
          <checksum type="sha">265b755e1eea99d13b922041f0c5413942bc0dcc</checksum>
          <time file="1192120873" build="1192098889"/>
          <size package="278076" archive="0"/>
          <base-version epoch="0" ver="1.4.2_update12" rel="17" md5sum="cb56af07b21e6b8d8660f2376b6b566c" buildtime="1164480922" sequence_info="java-1_4_2-sun-devel-1.4.2_update12-17-8c6255f7f833beb78dc8a3daf67c062ad55d10"/>
        </deltarpm>
        <deltarpm>
          <location href="rpm/i586/java-1_4_2-sun-devel-1.4.2_update15_1.4.2_update16-0.1.i586.delta.rpm"/>
          <checksum type="sha">f4e26a7903bc4fe4bb2338f1669dc058206f2792</checksum>
          <time file="1192120877" build="1192098889"/>
          <size package="198569" archive="0"/>
          <base-version epoch="0" ver="1.4.2_update15" rel="0.1" md5sum="d01ae6db6325f64a6b6a01aebe342031" buildtime="1183635016" sequence_info="java-1_4_2-sun-devel-1.4.2_update15-0.1-15a0acbc42bc5b8c10794aee8d6e2005d5"/>
        </deltarpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_4_2-sun-jdbc</name>
      <arch>i586</arch>
      <version epoch="0" ver="1.4.2_update16" rel="0.1"/>
      <checksum type="sha" pkgid="YES">2d9c5c7df36c1d3c7eb661b973d0f57ae41f1063</checksum>
      <time file="1192119263" build="1192098889"/>
      <size package="24502" installed="50016" archive="50324"/>
      <location href="rpm/i586/java-1_4_2-sun-jdbc-1.4.2_update16-0.1.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_4_2-sun-jdbc" epoch="0" ver="1.4.2_update16" rel="0.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_4_2-sun-jdbc"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <patchrpm>
          <location href="rpm/i586/java-1_4_2-sun-jdbc-1.4.2_update16-0.1.i586.patch.rpm"/>
          <checksum type="sha">b5dc78e7dd64f164092548a56aba0a4ce7aefe57</checksum>
          <time file="1192120879" build="1192098889"/>
          <size package="24713" archive="50324"/>
          <base-version epoch="0" ver="1.4.2_update12" rel="17"/>
          <base-version epoch="0" ver="1.4.2_update13" rel="3.1"/>
          <base-version epoch="0" ver="1.4.2_update15" rel="0.1"/>
        </patchrpm>
        <deltarpm>
          <location href="rpm/i586/java-1_4_2-sun-jdbc-1.4.2_update12_1.4.2_update16-17_0.1.i586.delta.rpm"/>
          <checksum type="sha">9e7e7600e7d6d2c2cdc581b00b80939d2731481c</checksum>
          <time file="1192120879" build="1192098889"/>
          <size package="11474" archive="0"/>
          <base-version epoch="0" ver="1.4.2_update12" rel="17" md5sum="723910672f3f75aa5197ef3cad95f408" buildtime="1164480922" sequence_info="java-1_4_2-sun-jdbc-1.4.2_update12-17-401dfdd0080741ff2220a2bc7f7507d410"/>
        </deltarpm>
        <deltarpm>
          <location href="rpm/i586/java-1_4_2-sun-jdbc-1.4.2_update15_1.4.2_update16-0.1.i586.delta.rpm"/>
          <checksum type="sha">d30df10856847bdf8482000def8e7728dde6cb7d</checksum>
          <time file="1192120879" build="1192098889"/>
          <size package="11487" archive="0"/>
          <base-version epoch="0" ver="1.4.2_update15" rel="0.1" md5sum="a86f7b7b752b6dbb45a1368027f393d6" buildtime="1183635016" sequence_info="java-1_4_2-sun-jdbc-1.4.2_update15-0.1-1211414e2ecfa613b8afd35a5ff6b2de10"/>
        </deltarpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_4_2-sun-plugin</name>
      <arch>i586</arch>
      <version epoch="0" ver="1.4.2_update16" rel="0.1"/>
      <checksum type="sha" pkgid="YES">ccee67a8717ca148a6476bf7b54d52bd728c9588</checksum>
      <time file="1192119263" build="1192098889"/>
      <size package="800775" installed="2648245" archive="2654260"/>
      <location href="rpm/i586/java-1_4_2-sun-plugin-1.4.2_update16-0.1.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_4_2-sun-plugin" epoch="0" ver="1.4.2_update16" rel="0.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_4_2-sun-plugin"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <patchrpm>
          <location href="rpm/i586/java-1_4_2-sun-plugin-1.4.2_update16-0.1.i586.patch.rpm"/>
          <checksum type="sha">26cd15b9f2cb1cad88ce882cdd3ae2494e1e4887</checksum>
          <time file="1192120883" build="1192098889"/>
          <size package="800920" archive="2653960"/>
          <base-version epoch="0" ver="1.4.2_update12" rel="17"/>
          <base-version epoch="0" ver="1.4.2_update13" rel="3.1"/>
          <base-version epoch="0" ver="1.4.2_update15" rel="0.1"/>
        </patchrpm>
        <deltarpm>
          <location href="rpm/i586/java-1_4_2-sun-plugin-1.4.2_update12_1.4.2_update16-17_0.1.i586.delta.rpm"/>
          <checksum type="sha">7b7728fecbc54aad3d3c3ca7f21af2fdfeb68403</checksum>
          <time file="1192120884" build="1192098889"/>
          <size package="43687" archive="0"/>
          <base-version epoch="0" ver="1.4.2_update12" rel="17" md5sum="752a6dce7b45f4ac8b34d9fe6eae89b7" buildtime="1164480922" sequence_info="java-1_4_2-sun-plugin-1.4.2_update12-17-b5c2d31fb7bbb7a7725be9202c5991d2c312"/>
        </deltarpm>
        <deltarpm>
          <location href="rpm/i586/java-1_4_2-sun-plugin-1.4.2_update15_1.4.2_update16-0.1.i586.delta.rpm"/>
          <checksum type="sha">4adfa0b981deaaf44d8de62b39bff5043b79a1a2</checksum>
          <time file="1192120886" build="1192098889"/>
          <size package="41694" archive="0"/>
          <base-version epoch="0" ver="1.4.2_update15" rel="0.1" md5sum="4c9ff9f65b29b68a28ce1a8e84bf4813" buildtime="1183635016" sequence_info="java-1_4_2-sun-plugin-1.4.2_update15-0.1-74fe1ad42b527bc56e0631fa5974327ec312"/>
        </deltarpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_4_2-sun-src</name>
      <arch>i586</arch>
      <version epoch="0" ver="1.4.2_update16" rel="0.1"/>
      <checksum type="sha" pkgid="YES">b269043cca1da6ffcfcfa226def68092cbdafbd7</checksum>
      <time file="1192119265" build="1192098889"/>
      <size package="10947917" installed="11524761" archive="11525052"/>
      <location href="rpm/i586/java-1_4_2-sun-src-1.4.2_update16-0.1.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_4_2-sun-src" epoch="0" ver="1.4.2_update16" rel="0.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_4_2-sun-src"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <patchrpm>
          <location href="rpm/i586/java-1_4_2-sun-src-1.4.2_update16-0.1.i586.patch.rpm"/>
          <checksum type="sha">9d674cdfc3f972e3e2822b8ebcb215820b1c0fa9</checksum>
          <time file="1192120907" build="1192098889"/>
          <size package="10948082" archive="11525052"/>
          <base-version epoch="0" ver="1.4.2_update13" rel="3.1"/>
          <base-version epoch="0" ver="1.4.2_update15" rel="0.1"/>
        </patchrpm>
        <deltarpm>
          <location href="rpm/i586/java-1_4_2-sun-src-1.4.2_update15_1.4.2_update16-0.1.i586.delta.rpm"/>
          <checksum type="sha">826eb11e58c6a94459e968bf3f953c16a5e9e83d</checksum>
          <time file="1192120920" build="1192098889"/>
          <size package="394926" archive="0"/>
          <base-version epoch="0" ver="1.4.2_update15" rel="0.1" md5sum="18020d2e7c086751659f79fc54ca7fc6" buildtime="1183635016" sequence_info="java-1_4_2-sun-src-1.4.2_update15-0.1-0dfc9ebc9d4785670dc1fe8df44638bb10"/>
        </deltarpm>
      </pkgfiles>
    </package>
  </atoms>
</patch>
