<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="cedebf2070cadf7ee6c941a4d0e6eba0"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="sdkp1-kernel-4745"
    timestamp="1195900069"
    engine="1.0">
  <yum:name>sdkp1-kernel</yum:name>
  <summary lang="en">Security update for Linux kernel</summary>
  <summary lang="de">Security update for Linux kernel</summary>
  <description lang="en">This kernel update fixes the following security problems:

++ CVE-2007-3104: The sysfs_readdir function in the Linux
 kernel 2.6 allows local users to cause a denial of
 service  (kernel OOPS) by dereferencing a null pointer to
 an inode in a dentry.

++ CVE-2007-4997: A 2 byte buffer underflow in the
 ieee80211 stack was fixed, which might be used by
 attackers in the local WLAN reach to crash the machine.

++ CVE-2007-3740: The CIFS filesystem, when Unix extension
 support is enabled, did not honor the umask of a process,
 which allowed local users to gain privileges.

++ CVE-2007-4573: It was possible for local user to become
 root by exploiting a bug in the IA32 system call
 emulation. This problem affects the x86_64 platform only,
 on all distributions.

                  This problem was fixed for regular
kernels, but had not been fixed for the XEN kernels. This
update fixes the problem also for the XEN kernels.

++ CVE-2007-4308: The (1) aac_cfg_open and (2)
 aac_compat_ioctl functions in the SCSI layer ioctl path in
 aacraid did not check permissions for ioctls, which might
 have allowed local users to cause a denial of service or
 gain privileges.

++ CVE-2007-3843: The Linux kernel checked the wrong global
 variable for the CIFS sec mount option, which might allow
 remote attackers to spoof CIFS network traffic that the
 client configured for security signatures, as demonstrated
 by lack of signing despite sec=ntlmv2i in a SetupAndX
 request.

++ CVE-2007-5904: Multiple buffer overflows in CIFS VFS in
 the Linux kernel allowed remote attackers to cause a
 denial of service (crash) and possibly execute arbitrary
 code via long SMB responses that trigger the overflows in
 the SendReceive function.

                  This requires the attacker to mis-present
/ replace a CIFS server the client machine is connected to.

++ CVE-2007-6063: Buffer overflow in the isdn_net_setcfg
 function in isdn_net.c in the Linux kernel allowed local
 users to have an unknown impact via a crafted argument to
 the isdn_ioctl function.


and the following non security bugs:

++
patches.drivers/pci-delete-ACPI-hook-from-pci_set_power_stat
 e.patch: Delete ACPI hook from pci_set_power_state()
 [#162320] Still execute the code on Lenovo ThinkPads (or
 USB ports do not work anymore after suspend  [#329232]
++  patches.drivers/alsa-post-sp1-hda-probe-blacklist:
 [ALSA] hda-intel - Add probe_mask blacklist  [#172330]
++  patches.drivers/alsa-post-sp1-hda-robust-probe:  [ALSA]
 hda-intel - Improve HD-audio codec probing robustness
 [#172330]
++  patches.arch/i386-hpet-lost-interrupts-fix.patch:
 Backport i386 hpet lost interrupts code  [#257035]
++  patches.fixes/megaraid_mbox-dell-cerc-support: Dell
 CERC support for megaraid_mbox   [#267134]
++  patches.fixes/nfsv4-MAXNAME-fix.diff: knfsd: query
 filesystem for NFSv4 getattr of FATTR4_MAXNAME  [#271803]
++
patches.drivers/ide-amd74xx-add-ignore_enablebits-parameter:
  amd74xx: add ignore_enable_bits module parameter
 [#272786]
++  patches.fixes/legacy-pty-count-kernel-parm.patch: Add a
 kernel boot parameter to overwrite the legacy PTY count.
 The default value of 64 is insufficient occasionally
 [#277846]
++  patches.fixes/lockd-grant-shutdown: Stop GRANT callback
 from crashing if NFS server has been stopped.  [#292478]
++  Kernel update to 2.6.16.54 [#298719] including (among
 others):
    +  lots of md fixes
    +  fix of sparc bugs
    +  fix of TCP handling of SACK in bidirectional flows
    +  fix of MCA bus matching
    +  fix of PPC issues:
       *  Fix osize too small errors when decoding mppe.
       *  Fix output buffer size in ppp_decompress_frame().
++
patches.fixes/assign-task_struct.exit_code-before-taskstats_
 exit.patch: Assign task_struct.exit_code before
 taskstats_exit()   [#307504]
++  patches.fixes/bonding_no_addrconf_for_bond_slaves:
 bonding / ipv6: no addrconf for slaves separately from
 master.  [#310254]
++  patches.fixes/bonding_support_carrier_state_for_master:
 bonding: support carrier state for master  [#310254]
++
patches.fixes/fix-sys-devices-system-node-node0-meminfo-from
 -having-anonpages-wrapped.patch: fix
 /sys/devices/system/node/node0/meminfo from having
 anonpages wrapped   [#310744]
++
patches.fixes/nfs-remove-bogus-cache-change-attribute-check.
 diff fix bogus cache change to make data available
 immediately, on direct write   [#325877]
++
patches.fixes/tcp-send-ACKs-each-2nd-received-segment.patch:
  Send ACKs each 2nd received segment. This fixes a problem
 where the tcp cubic congestion algorithm was too slow in
 converging  [#327848]
++  patches.drivers/libata-fix-spindown:  libata: fix disk
 spindown on shutdown   [#330722]
++  patches.fixes/scsi-reset-resid: busy status on tape
 write results in incorrect residual  [#330926]
++  patches.fixes/condense-output-of-show_free_areas.patch:
 Condense output of show_free_areas()   [#331251]
++  patches.arch/powernowk8_family_freq_from_fiddid.patch:
 To find the frequency given the fid and did is family
 dependant.  [#332722]
++  patches.fixes/tcp-saner-thash_entries-default.patch:
 Limit the size of the TCP established hash to 512k entries
 by default  [#333273]
++  patches.drivers/alsa-emu10k1-spdif-mem-fix: [ALSA]
 emu10k1 - Fix memory corruption   [#333314]
++  patches.drivers/alsa-post-sp1-hda-stac-error-fix:
 [ALSA] Fix error probing with STAC codecs  [#333320]
++
 patches.fixes/qla2xxx-avoid-duplicate-pci_disable_device:
 Fixup patch to not refer to stale pointer  [#333542]
++  large backport of dm-crypt fixes:  [#333905]
    +  patches.fixes/dm-disable_barriers.diff: dm: disable
barriers.
    +
patches.fixes/dm-crypt-restructure_for_workqueue_change.diff
    +
patches.fixes/dm-crypt-restructure_write_processing.diff
    +  patches.fixes/dm-crypt-move_io_to_workqueue.diff
    +  patches.fixes/dm-crypt-use_private_biosets.diff
    +  patches.fixes/dm-crypt-fix_call_to_clone_init.diff
    +
patches.fixes/dm-crypt-fix_avoid_cloned_bio_ref_after_free.d
iff
    +  patches.fixes/dm-crypt-fix_remove_first_clone.diff
    +
patches.fixes/dm-crypt-use_smaller_bvecs_in_clones.diff
    +
patches.fixes/dm-crypt-fix_panic_on_large_request.diff
++  patches.fixes/initramfs-fix-cpio-hardlink-check.patch:
 initramfs: fix CPIO hardlink check  [#334612]
++  patches.drivers/lpfc-8.1.10.12-update: driver update to
 fix severe issues in lpfc 8.1.10.9 driver [#334630]
 [#342044]
++  patches.fixes/nfs-direct-io-fix-1: NFS: Fix error
 handling in nfs_direct_write_result()  [#336200]
++  patches.fixes/nfs-direct-io-fix-2:  NFS: Fix a refcount
 leakage in O_DIRECT   [#336200]
++  add patches.drivers/ibmvscsi-migration-login.patch
 prohibit IO during adapter login process  [#337980]
++  patches.arch/acpi_thinkpad_brightness_fix.patch: Take
 care of latest Lenovo ThinkPad brightness control
 [#338274] [#343660]
++  patches.fixes/ramdisk-2.6.23-corruption_fix.diff: rd:
 fix data corruption on memory pressure  [#338643]
++
 patches.fixes/fc_transport-remove-targets-on-host-remove:
 memory use after free error in mptfc  [#338730]
++
patches.fixes/ipmi-ipmi_msghandler.c-fix-a-memory-leak.patch
 : IPMI: ipmi_msghandler.c: fix a memory leak   [#339413]
++  add patches.arch/ppc-pseries-rtas_ibm_suspend_me.patch
 fix multiple bugs in rtas_ibm_suspend_me code   [#339927]
++  patches.fixes/nfsacl-retval.diff:  knfsd: fix spurious
 EINVAL errors on first access of new filesystem  [#340873]
++  patches.fixes/avm-fix-capilib-locking:  [ISDN] Fix
 random hard freeze with AVM cards. [#341894]
++  patches.fixes/ipv6_rh_processing_fix:  [IPV6]: Restore
 semantics of Routing Header processing  [#343100]
++  The following set of XEN fixes has been applied:
 [#343612]
    +  patches.xen/14280-net-fake-carrier-flag.patch:
netfront: Better fix for netfront_tx_slot_available().
    +  patches.xen/14893-copy-more-skbs.patch: netback:
Copy skbuffs that are presented to the start_xmit()
function.
    +  patches.xen/157-netfront-skb-deref.patch: net front:
Avoid deref'ing skb after it is potentially freed.
    +  patches.xen/263-xfs-unmap.patch: xfs: eagerly remove
vmap mappings to avoid upsetting Xen.
    +  patches.xen/xen-i386-set-fixmap: i386/PAE: avoid
temporarily inconsistent pte-s.
    +  patches.xen/xen-isa-dma: Suppress all use of ISA DMA
on Xen.
    +  patches.xen/xen-x86-panic-smp,
    +  patches.xen/xen-netback-alloc,
    +  patches.xen/xen-split-pt-lock,
    +  patches.xen/137-netfront-copy-release.patch,
    +  patches.xen/141-driver-autoload.patch,
    +  patches.xen/xen-balloon-max-target,
    +  patches.xen/xen-balloon-min,
    +  patches.xen/xen-i386-highpte,
    +  patches.xen/xen-intel-agp,
    +  patches.xen/xen-multicall-check,
    +  patches.xen/xen-x86-dcr-fallback,
    +  patches.xen/xen-x86-pXX_val,
    +  patches.xen/xen-x86-performance: Adjust.
++  patches.arch/acpi_backport_video.c.patch: Backport
 video driver from 2.6.23-rc9  [#343660]
++  patches.arch/acpi_find_bcl_support.patch: Store
 brightness/video functionality of ACPI provided by BIOS
 [#343660]
</description>
  <description lang="de">This kernel update fixes the following security problems:

++ CVE-2007-3104: The sysfs_readdir function in the Linux
 kernel 2.6 allows local users to cause a denial of
 service  (kernel OOPS) by dereferencing a null pointer to
 an inode in a dentry.

++ CVE-2007-4997: A 2 byte buffer underflow in the
 ieee80211 stack was fixed, which might be used by
 attackers in the local WLAN reach to crash the machine.

++ CVE-2007-3740: The CIFS filesystem, when Unix extension
 support is enabled, did not honor the umask of a process,
 which allowed local users to gain privileges.

++ CVE-2007-4573: It was possible for local user to become
 root by exploiting a bug in the IA32 system call
 emulation. This problem affects the x86_64 platform only,
 on all distributions.

                  This problem was fixed for regular
kernels, but had not been fixed for the XEN kernels. This
update fixes the problem also for the XEN kernels.

++ CVE-2007-4308: The (1) aac_cfg_open and (2)
 aac_compat_ioctl functions in the SCSI layer ioctl path in
 aacraid did not check permissions for ioctls, which might
 have allowed local users to cause a denial of service or
 gain privileges.

++ CVE-2007-3843: The Linux kernel checked the wrong global
 variable for the CIFS sec mount option, which might allow
 remote attackers to spoof CIFS network traffic that the
 client configured for security signatures, as demonstrated
 by lack of signing despite sec=ntlmv2i in a SetupAndX
 request.

++ CVE-2007-5904: Multiple buffer overflows in CIFS VFS in
 the Linux kernel allowed remote attackers to cause a
 denial of service (crash) and possibly execute arbitrary
 code via long SMB responses that trigger the overflows in
 the SendReceive function.

                  This requires the attacker to mis-present
/ replace a CIFS server the client machine is connected to.

++ CVE-2007-6063: Buffer overflow in the isdn_net_setcfg
 function in isdn_net.c in the Linux kernel allowed local
 users to have an unknown impact via a crafted argument to
 the isdn_ioctl function.


and the following non security bugs:

++
patches.drivers/pci-delete-ACPI-hook-from-pci_set_power_stat
 e.patch: Delete ACPI hook from pci_set_power_state()
 [#162320] Still execute the code on Lenovo ThinkPads (or
 USB ports do not work anymore after suspend  [#329232]
++  patches.drivers/alsa-post-sp1-hda-probe-blacklist:
 [ALSA] hda-intel - Add probe_mask blacklist  [#172330]
++  patches.drivers/alsa-post-sp1-hda-robust-probe:  [ALSA]
 hda-intel - Improve HD-audio codec probing robustness
 [#172330]
++  patches.arch/i386-hpet-lost-interrupts-fix.patch:
 Backport i386 hpet lost interrupts code  [#257035]
++  patches.fixes/megaraid_mbox-dell-cerc-support: Dell
 CERC support for megaraid_mbox   [#267134]
++  patches.fixes/nfsv4-MAXNAME-fix.diff: knfsd: query
 filesystem for NFSv4 getattr of FATTR4_MAXNAME  [#271803]
++
patches.drivers/ide-amd74xx-add-ignore_enablebits-parameter:
  amd74xx: add ignore_enable_bits module parameter
 [#272786]
++  patches.fixes/legacy-pty-count-kernel-parm.patch: Add a
 kernel boot parameter to overwrite the legacy PTY count.
 The default value of 64 is insufficient occasionally
 [#277846]
++  patches.fixes/lockd-grant-shutdown: Stop GRANT callback
 from crashing if NFS server has been stopped.  [#292478]
++  Kernel update to 2.6.16.54 [#298719] including (among
 others):
    +  lots of md fixes
    +  fix of sparc bugs
    +  fix of TCP handling of SACK in bidirectional flows
    +  fix of MCA bus matching
    +  fix of PPC issues:
       *  Fix osize too small errors when decoding mppe.
       *  Fix output buffer size in ppp_decompress_frame().
++
patches.fixes/assign-task_struct.exit_code-before-taskstats_
 exit.patch: Assign task_struct.exit_code before
 taskstats_exit()   [#307504]
++  patches.fixes/bonding_no_addrconf_for_bond_slaves:
 bonding / ipv6: no addrconf for slaves separately from
 master.  [#310254]
++  patches.fixes/bonding_support_carrier_state_for_master:
 bonding: support carrier state for master  [#310254]
++
patches.fixes/fix-sys-devices-system-node-node0-meminfo-from
 -having-anonpages-wrapped.patch: fix
 /sys/devices/system/node/node0/meminfo from having
 anonpages wrapped   [#310744]
++
patches.fixes/nfs-remove-bogus-cache-change-attribute-check.
 diff fix bogus cache change to make data available
 immediately, on direct write   [#325877]
++
patches.fixes/tcp-send-ACKs-each-2nd-received-segment.patch:
  Send ACKs each 2nd received segment. This fixes a problem
 where the tcp cubic congestion algorithm was too slow in
 converging  [#327848]
++  patches.drivers/libata-fix-spindown:  libata: fix disk
 spindown on shutdown   [#330722]
++  patches.fixes/scsi-reset-resid: busy status on tape
 write results in incorrect residual  [#330926]
++  patches.fixes/condense-output-of-show_free_areas.patch:
 Condense output of show_free_areas()   [#331251]
++  patches.arch/powernowk8_family_freq_from_fiddid.patch:
 To find the frequency given the fid and did is family
 dependant.  [#332722]
++  patches.fixes/tcp-saner-thash_entries-default.patch:
 Limit the size of the TCP established hash to 512k entries
 by default  [#333273]
++  patches.drivers/alsa-emu10k1-spdif-mem-fix: [ALSA]
 emu10k1 - Fix memory corruption   [#333314]
++  patches.drivers/alsa-post-sp1-hda-stac-error-fix:
 [ALSA] Fix error probing with STAC codecs  [#333320]
++
 patches.fixes/qla2xxx-avoid-duplicate-pci_disable_device:
 Fixup patch to not refer to stale pointer  [#333542]
++  large backport of dm-crypt fixes:  [#333905]
    +  patches.fixes/dm-disable_barriers.diff: dm: disable
barriers.
    +
patches.fixes/dm-crypt-restructure_for_workqueue_change.diff
    +
patches.fixes/dm-crypt-restructure_write_processing.diff
    +  patches.fixes/dm-crypt-move_io_to_workqueue.diff
    +  patches.fixes/dm-crypt-use_private_biosets.diff
    +  patches.fixes/dm-crypt-fix_call_to_clone_init.diff
    +
patches.fixes/dm-crypt-fix_avoid_cloned_bio_ref_after_free.d
iff
    +  patches.fixes/dm-crypt-fix_remove_first_clone.diff
    +
patches.fixes/dm-crypt-use_smaller_bvecs_in_clones.diff
    +
patches.fixes/dm-crypt-fix_panic_on_large_request.diff
++  patches.fixes/initramfs-fix-cpio-hardlink-check.patch:
 initramfs: fix CPIO hardlink check  [#334612]
++  patches.drivers/lpfc-8.1.10.12-update: driver update to
 fix severe issues in lpfc 8.1.10.9 driver [#334630]
 [#342044]
++  patches.fixes/nfs-direct-io-fix-1: NFS: Fix error
 handling in nfs_direct_write_result()  [#336200]
++  patches.fixes/nfs-direct-io-fix-2:  NFS: Fix a refcount
 leakage in O_DIRECT   [#336200]
++  add patches.drivers/ibmvscsi-migration-login.patch
 prohibit IO during adapter login process  [#337980]
++  patches.arch/acpi_thinkpad_brightness_fix.patch: Take
 care of latest Lenovo ThinkPad brightness control
 [#338274] [#343660]
++  patches.fixes/ramdisk-2.6.23-corruption_fix.diff: rd:
 fix data corruption on memory pressure  [#338643]
++
 patches.fixes/fc_transport-remove-targets-on-host-remove:
 memory use after free error in mptfc  [#338730]
++
patches.fixes/ipmi-ipmi_msghandler.c-fix-a-memory-leak.patch
 : IPMI: ipmi_msghandler.c: fix a memory leak   [#339413]
++  add patches.arch/ppc-pseries-rtas_ibm_suspend_me.patch
 fix multiple bugs in rtas_ibm_suspend_me code   [#339927]
++  patches.fixes/nfsacl-retval.diff:  knfsd: fix spurious
 EINVAL errors on first access of new filesystem  [#340873]
++  patches.fixes/avm-fix-capilib-locking:  [ISDN] Fix
 random hard freeze with AVM cards. [#341894]
++  patches.fixes/ipv6_rh_processing_fix:  [IPV6]: Restore
 semantics of Routing Header processing  [#343100]
++  The following set of XEN fixes has been applied:
 [#343612]
    +  patches.xen/14280-net-fake-carrier-flag.patch:
netfront: Better fix for netfront_tx_slot_available().
    +  patches.xen/14893-copy-more-skbs.patch: netback:
Copy skbuffs that are presented to the start_xmit()
function.
    +  patches.xen/157-netfront-skb-deref.patch: net front:
Avoid deref'ing skb after it is potentially freed.
    +  patches.xen/263-xfs-unmap.patch: xfs: eagerly remove
vmap mappings to avoid upsetting Xen.
    +  patches.xen/xen-i386-set-fixmap: i386/PAE: avoid
temporarily inconsistent pte-s.
    +  patches.xen/xen-isa-dma: Suppress all use of ISA DMA
on Xen.
    +  patches.xen/xen-x86-panic-smp,
    +  patches.xen/xen-netback-alloc,
    +  patches.xen/xen-split-pt-lock,
    +  patches.xen/137-netfront-copy-release.patch,
    +  patches.xen/141-driver-autoload.patch,
    +  patches.xen/xen-balloon-max-target,
    +  patches.xen/xen-balloon-min,
    +  patches.xen/xen-i386-highpte,
    +  patches.xen/xen-intel-agp,
    +  patches.xen/xen-multicall-check,
    +  patches.xen/xen-x86-dcr-fallback,
    +  patches.xen/xen-x86-pXX_val,
    +  patches.xen/xen-x86-performance: Adjust.
++  patches.arch/acpi_backport_video.c.patch: Backport
 video driver from 2.6.23-rc9  [#343660]
++  patches.arch/acpi_find_bcl_support.patch: Store
 brightness/video functionality of ACPI provided by BIOS
 [#343660]
</description>
  <yum:version ver="4745" rel="0"/>
  <rpm:requires>
    <rpm:entry kind="atom" name="kernel-debug" epoch="0" ver="2.6.16.54" rel="0.2.3" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-kdump" epoch="0" ver="2.6.16.54" rel="0.2.3" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-xen" epoch="0" ver="2.6.16.54" rel="0.2.3" flags="EQ"/>
  </rpm:requires>
  <reboot-needed/>
  <category>security</category>
    <license-to-confirm>
This update can be used to install a new kernel.
 
If you decide to use the kernel update, we recommend that you reboot
your system upon completion of the YaST Online Update, as additional
kernel modules may be needed which can only be loaded after the system
is rebooted.

If you are in the course of performing a new installation, the installer
will reboot the machine after installing the patch. If you do not want 
to reboot, deselect this patch.
    </license-to-confirm>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-debug</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.54" rel="0.2.3"/>
      <checksum type="sha" pkgid="YES">91efe63ae0d98e3775173db606d5e5e408157cc9</checksum>
      <time file="1196088731" build="1195900069"/>
      <size package="17702286" installed="82540711" archive="79459760"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-debug-2.6.16.54-0.2.5.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-debug" epoch="0" ver="2.6.16.54" rel="0.2.3" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-debug"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-kdump</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.54" rel="0.2.3"/>
      <checksum type="sha" pkgid="YES">b1cb9be211ead222c2bbd298169cef8ff4e6e58e</checksum>
      <time file="1196088692" build="1195900365"/>
      <size package="15468560" installed="58965118" archive="55883684"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-kdump-2.6.16.54-0.2.5.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-kdump" epoch="0" ver="2.6.16.54" rel="0.2.3" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-kdump"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-xen</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.16.54" rel="0.2.3"/>
      <checksum type="sha" pkgid="YES">1e6a6c52745e9b90fe37b243f877a09322612e48</checksum>
      <time file="1196088717" build="1195901819"/>
      <size package="17137540" installed="63063067" archive="59965508"/>
      <location xml:base="media://#1" href="suse/x86_64/kernel-xen-2.6.16.54-0.2.5.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-xen" epoch="0" ver="2.6.16.54" rel="0.2.3" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-xen"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
  </atoms>
</patch>
