<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="3b591511d815dc7c85fac2e9b6b66d53"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="sledp3-java-1_5_0-ibm-7077"
    timestamp="1276794917"
    engine="1.0">
  <yum:name>sledp3-java-1_5_0-ibm</yum:name>
  <summary lang="en">Security update for IBM Java 1.5.0</summary>
  <description lang="en">
This update of IBM Java 1.5.0 to SR11 FP2 to fixes the following security 
issues:

    * 

      Various unspecified and undocumented vulnerabilities that allows
      remote attackers to affect confidentiality, integrity and
      availability via various unknown vectors. (CVE-2010-0084
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0084&gt; ,
      CVE-2010-0085
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0085&gt; ,
      CVE-2010-0087
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0087&gt; ,
      CVE-2010-0088
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0088&gt; ,
      CVE-2010-0089
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0089&gt; ,
      CVE-2010-0091
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0091&gt; ,
      CVE-2010-0092
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0092&gt; ,
      CVE-2010-0095
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0095&gt; ,
      CVE-2010-0837
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0837&gt; ,
      CVE-2010-0839
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0839&gt; )

    * 

      Unspecified vulnerability in the Java Runtime Environment component
      in Oracle Java SE and Java for Business 6 Update 18 and 5.0 Update 23
      allows remote attackers to affect confidentiality, integrity, and
      availability via unknown vectors. NOTE: the previous information was
      obtained from the March 2010 CPU. Oracle has not commented on claims
      from a reliable researcher that this is due to missing privilege
      checks during deserialization of RMIConnectionImpl objects, which
      allows remote attackers to call system-level Java functions via the
      class loader of a constructor that is being deserialized. (
      CVE-2010-0094
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0094&gt; )

    * 

      Unspecified vulnerability in the Java 2D component in Oracle Java SE
      and Java for Business 6 Update 18, 5.0, Update, and 23 allows remote
      attackers to affect confidentiality, integrity, and availability via
      unknown vectors. NOTE: the previous information was obtained from the
      March 2010 CPU. Oracle has not commented on claims from a reliable
      researcher that this is a stack-based buffer overflow using an
      untrusted size value in the readMabCurveData function in the CMM
      module of the JVM. (CVE-2010-0838
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0838&gt; )

    * 

      Unspecified vulnerability in the Java Runtime Environment component
      in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23,
      and 1.4.2_25 allows remote attackers to affect confidentiality,
      integrity, and availability via unknown vectors. NOTE: the previous
      information was obtained from the March 2010 CPU. Oracle has not
      commented on claims from a reliable researcher that this is related
      to improper checks when executing privileged methods in the Java
      Runtime Environment (JRE), which allows attackers to execute
      arbitrary code via (1) an untrusted object that extends the trusted
      class but has not modified a certain method, or (2) &quot;a similar trust
      issue with interfaces,&quot; aka &quot;Trusted Methods Chaining Remote Code
      Execution Vulnerability.&quot; (CVE-2010-0840
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0840&gt; )

    * 

      Unspecified vulnerability in the ImageIO component in Oracle Java SE
      and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows
      remote attackers to affect confidentiality, integrity, and
      availability via unknown vectors. NOTE: the previous information was
      obtained from the March 2010 CPU. Oracle has not commented on claims
      from a reliable researcher that this is an integer overflow in the
      Java Runtime Environment that allows remote attackers to execute
      arbitrary code via a JPEG image that contains subsample dimensions
      with large values, related to JPEGImageReader and &quot;stepX&quot;. (
      CVE-2010-0841
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0841&gt; )

    * 

      Unspecified vulnerability in the Sound component in Oracle Java SE
      and Java for Business 6 Update 18, 5.0 Update 23, 1.4.225, and 1.3.1
      27 allows remote attackers to affect confidentiality, integrity, and
      availability via unknown vectors. NOTE: the previous information was
      obtained from the March 2010 CPU. Oracle has not commented on claims
      from a reliable researcher that this is an uncontrolled array index
      that allows remote attackers to execute arbitrary code via a MIDI
      file with a crafted MixerSequencer object, related to the GM_Song
      structure. (CVE-2010-0842
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0842&gt; )

    * 

      Unspecified vulnerability in the Sound component in Oracle Java SE
      and Java for Business 6 Update 18, 5.0 Update 23, 1.4.225, and 1.3.1
      27 allows remote attackers to affect confidentiality, integrity, and
      availability via unknown vectors. NOTE: the previous information was
      obtained from the March 2010 CPU. Oracle has not commented on claims
      from a reliable researcher that this is related to XNewPtr and
      improper handling of an integer parameter when allocating heap memory
      in the com.sun.media.sound libraries, which allows remote attackers
      to execute arbitrary code. (CVE-2010-0843
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0843&gt; )

    * 

      Unspecified vulnerability in the Sound component in Oracle Java SE
      and Java for Business 6 Update 18, 5.0 Update 23, 1.4.225, and 1.3.1
      27 allows remote attackers to affect confidentiality, integrity, and
      availability via unknown vectors. NOTE: the previous information was
      obtained from the March 2010 CPU. Oracle has not commented on claims
      from a reliable researcher that this is for improper parsing of a
      crafted MIDI stream when creating a MixerSequencer object, which
      causes a pointer to be corrupted and allows a NULL byte to be written
      to arbitrary memory. (CVE-2010-0844
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0844&gt; )

    * 

      Unspecified vulnerability in the ImageIO component in Oracle Java SE
      and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and
      1.3.1_27 allows remote attackers to affect confidentiality,
      integrity, and availability via unknown vectors. NOTE: the previous
      information was obtained from the March 2010 CPU. Oracle has not
      commented on claims from a reliable researcher that this is a
      heap-based buffer overflow that allows remote attackers to execute
      arbitrary code, related to an &quot;invalid assignment&quot; and inconsistent
      length values in a JPEG image encoder (JPEGImageEncoderImpl). (
      CVE-2010-0846
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0846&gt; )

    * 

      Unspecified vulnerability in the Java 2D component in Oracle Java SE
      and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and
      1.3.1_27 allows remote attackers to affect confidentiality,
      integrity, and availability via unknown vectors. NOTE: the previous
      information was obtained from the March 2010 CPU. Oracle has not
      commented on claims from a reliable researcher that this is a
      heap-based buffer overflow that allows arbitrary code execution via a
      crafted image. (CVE-2010-0847
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0847&gt; )

    * 

      Unspecified vulnerability in the Java 2D component in Oracle Java SE
      and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and
      1.3.1_27 allows remote attackers to affect confidentiality,
      integrity, and availability via unknown vectors. (CVE-2010-0848
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0848&gt; )

    * 

      Unspecified vulnerability in the Java 2D component in Oracle Java SE
      and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and
      1.3.1_27 allows remote attackers to affect confidentiality,
      integrity, and availability via unknown vectors. NOTE: the previous
      information was obtained from the March 2010 CPU. Oracle has not
      commented on claims from a reliable researcher that this is a
      heap-based buffer overflow in a decoding routine used by the 
      JPEGImageDecoderImpl interface, which allows code execution via a
      crafted JPEG image. (CVE-2010-0849
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0849&gt; )

    * 

      CVE-2009-3555: The TLS protocol, and the SSL protocol 3.0 and
      possibly earlier, as used in Microsoft Internet Information Services
      (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier,
      OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network
      Security Services (NSS) 3.12.4 and earlier, multiple Cisco products,
      and other products, does not properly associate renegotiation
      handshakes with an existing connection, which allows
      man-in-the-middle attackers to insert data into HTTPS sessions, and
      possibly other types of sessions protected by TLS or SSL, by sending
      an unauthenticated request that is processed retroactively by a
      server in a post-renegotiation context, related to a &quot;plaintext
      injection&quot; attack, aka the &quot;Project Mogul&quot; issue. (CVE-2009-3555
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555&gt; )

This update of IBM Java 1.5.0 to SR11 FP2 brings various bug and lots of 
security fixes.

Following security issues were fixed: CVE-2010-0084: Unspecified 
vulnerability in the Java Runtime Environment component in Oracle Java SE 
and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows 
remote attackers to affect confidentiality via unknown vectors.

CVE-2010-0085: Unspecified vulnerability in the Java Runtime Environment 
component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 
23, 1.4.225, and 1.3.127 allows remote attackers to affect confidentiality, 
integrity, and availability via unknown vectors.

CVE-2010-0087: Unspecified vulnerability in the Java Web Start, Java 
Plug-in component in Oracle Java SE and Java for Business 6 Update 18, 5.0 
Update 23, 1.4.225, and 1.3.127 allows remote attackers to affect 
confidentiality, integrity, and availability via unknown vectors.

CVE-2010-0088: Unspecified vulnerability in the Java Runtime Environment 
component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 
23, 1.4.225, and 1.3.127 allows remote attackers to affect confidentiality, 
integrity, and availability via unknown vectors.

CVE-2010-0089: Unspecified vulnerability in the Java Web Start, Java 
Plug-in component in Oracle Java SE and Java for Business 6 Update 18, 5.0 
Update 23, and 1.4.2_25 allows remote attackers to affect availability via 
unknown vectors.

CVE-2010-0091: Unspecified vulnerability in the Java Runtime Environment 
component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 
23, and 1.4.2_25 allows remote attackers to affect confidentiality via 
unknown vectors.

CVE-2010-0092: Unspecified vulnerability in the Java Runtime Environment 
component in Oracle Java SE and Java for Business 6 Update 18, and 5.0 
Update 23 allows remote attackers to affect confidentiality, integrity, and 
availability via unknown vectors.

CVE-2009-3555: The TLS protocol, and the SSL protocol 3.0 and possibly 
earlier, as used in Microsoft Internet Information Services (IIS) 7.0, 
mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 
0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 
3.12.4 and earlier, multiple Cisco products, and other products, does not 
properly associate renegotiation handshakes with an existing connection, 
which allows man-in-the-middle attackers to insert data into HTTPS 
sessions, and possibly other types of sessions protected by TLS or SSL, by 
sending an unauthenticated request that is processed retroactively by a 
server in a post-renegotiation context, related to a &quot;plaintext injection&quot; 
attack, aka the &quot;Project Mogul&quot; issue.

CVE-2010-0094: Unspecified vulnerability in the Java Runtime Environment 
component in Oracle Java SE and Java for Business 6 Update 18 and 5.0 
Update 23 allows remote attackers to affect confidentiality, integrity, and 
availability via unknown vectors. NOTE: the previous information was 
obtained from the March 2010 CPU. Oracle has not commented on claims from a 
reliable researcher that this is due to missing privilege checks during 
deserialization of RMIConnectionImpl objects, which allows remote attackers 
to call system-level Java functions via the ClassLoader of a constructor 
that is being deserialized.

CVE-2010-0095: Unspecified vulnerability in the Java Runtime Environment 
component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 
23, and 1.4.2_25 allows remote attackers to affect confidentiality, 
integrity, and availability via unknown vectors.

CVE-2010-0837: Unspecified vulnerability in the Pack200 component in Oracle 
Java SE and Java for Business 6 Update 18, 5.0, Update, and 23 allows 
remote attackers to affect confidentiality, integrity, and availability via 
unknown vectors.

CVE-2010-0838: Unspecified vulnerability in the Java 2D component in Oracle 
Java SE and Java for Business 6 Update 18, 5.0, Update, and 23 allows 
remote attackers to affect confidentiality, integrity, and availability via 
unknown vectors. NOTE: the previous information was obtained from the March 
2010 CPU. Oracle has not commented on claims from a reliable researcher 
that this is a stack-based buffer overflow using an untrusted size value in 
the readMabCurveData function in the CMM module in the JVM.

CVE-2010-0839: Unspecified vulnerability in the Sound component in Oracle 
Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.225, and 
1.3.127 allows remote attackers to affect confidentiality, integrity, and 
availability via unknown vectors.

CVE-2010-0840: Unspecified vulnerability in the Java Runtime Environment 
component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 
23, and 1.4.2_25 allows remote attackers to affect confidentiality, 
integrity, and availability via unknown vectors. NOTE: the previous 
information was obtained from the March 2010 CPU. Oracle has not commented 
on claims from a reliable researcher that this is related to improper 
checks when executing privileged methods in the Java Runtime Environment 
(JRE), which allows attackers to execute arbitrary code via (1) an 
untrusted object that extends the trusted class but has not modified a 
certain method, or (2) &quot;a similar trust issue with interfaces,&quot; aka 
&quot;Trusted Methods Chaining Remote Code Execution Vulnerability.&quot;

CVE-2010-0841: Unspecified vulnerability in the ImageIO component in Oracle 
Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 
allows remote attackers to affect confidentiality, integrity, and 
availability via unknown vectors. NOTE: the previous information was 
obtained from the March 2010 CPU. Oracle has not commented on claims from a 
reliable researcher that this is an integer overflow in the Java Runtime 
Environment that allows remote attackers to execute arbitrary code via a 
JPEG image that contains subsample dimensions with large values, related to 
JPEGImageReader and &quot;stepX&quot;.

CVE-2010-0842: Unspecified vulnerability in the Sound component in Oracle 
Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.225, and 
1.3.127 allows remote attackers to affect confidentiality, integrity, and 
availability via unknown vectors. NOTE: the previous information was 
obtained from the March 2010 CPU. Oracle has not commented on claims from a 
reliable researcher that this is an uncontrolled array index that allows 
remote attackers to execute arbitrary code via a MIDI file with a crafted 
MixerSequencer object, related to the GM_Song structure.

CVE-2010-0843: Unspecified vulnerability in the Sound component in Oracle 
Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.225, and 
1.3.127 allows remote attackers to affect confidentiality, integrity, and 
availability via unknown vectors. NOTE: the previous information was 
obtained from the March 2010 CPU. Oracle has not commented on claims from a 
reliable researcher that this is related to XNewPtr and improper handling 
of an integer parameter when allocating heap memory in the 
com.sun.media.sound libraries, which allows remote attackers to execute 
arbitrary code.

CVE-2010-0844: Unspecified vulnerability in the Sound component in Oracle 
Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.225, and 
1.3.127 allows remote attackers to affect confidentiality, integrity, and 
availability via unknown vectors. NOTE: the previous information was 
obtained from the March 2010 CPU. Oracle has not commented on claims from a 
reliable researcher that this is for improper parsing of a crafted MIDI 
stream when creating a MixerSequencer object, which causes a pointer to be 
corrupted and allows a NULL byte to be written to arbitrary memory.

CVE-2010-0846: Unspecified vulnerability in the ImageIO component in Oracle 
Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 
1.3.1_27 allows remote attackers to affect confidentiality, integrity, and 
availability via unknown vectors. NOTE: the previous information was 
obtained from the March 2010 CPU. Oracle has not commented on claims from a 
reliable researcher that this is a heap-based buffer overflow that allows 
remote attackers to execute arbitrary code, related to an &quot;invalid 
assignment&quot; and inconsistent length values in a JPEG image encoder 
(JPEGImageEncoderImpl).

CVE-2010-0847: Unspecified vulnerability in the Java 2D component in Oracle 
Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 
1.3.1_27 allows remote attackers to affect confidentiality, integrity, and 
availability via unknown vectors. NOTE: the previous information was 
obtained from the March 2010 CPU. Oracle has not commented on claims from a 
reliable researcher that this is a heap-based buffer overflow that allows 
arbitrary code execution via a crafted image.

CVE-2010-0848: Unspecified vulnerability in the Java 2D component in Oracle 
Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 
1.3.1_27 allows remote attackers to affect confidentiality, integrity, and 
availability via unknown vectors.

CVE-2010-0849: Unspecified vulnerability in the Java 2D component in Oracle 
Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 
1.3.1_27 allows remote attackers to affect confidentiality, integrity, and 
availability via unknown vectors. NOTE: the previous information was 
obtained from the March 2010 CPU. Oracle has not commented on claims from a 
reliable researcher that this is a heap-based buffer overflow in a decoding 
routine used by the JPEGImageDecoderImpl interface, which allows code 
execution via a crafted JPEG image.

Security Issues:

    * CVE-2010-0084
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0084&gt;
    * CVE-2010-0085
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0085&gt;
    * CVE-2010-0087
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0087&gt;
    * CVE-2010-0088
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0088&gt;
    * CVE-2010-0089
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0089&gt;
    * CVE-2010-0091
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0091&gt;
    * CVE-2010-0092
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0092&gt;
    * CVE-2009-3555
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555&gt;
    * CVE-2010-0094
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0094&gt;
    * CVE-2010-0095
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0095&gt;
    * CVE-2010-0837
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0837&gt;
    * CVE-2010-0838
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0838&gt;
    * CVE-2010-0839
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0839&gt;
    * CVE-2010-0840
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0840&gt;
    * CVE-2010-0841
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0841&gt;
    * CVE-2010-0842
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0842&gt;
    * CVE-2010-0843
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0843&gt;
    * CVE-2010-0844
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0844&gt;
    * CVE-2010-0846
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0846&gt;
    * CVE-2010-0847
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0847&gt;
    * CVE-2010-0848
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0848&gt;
    * CVE-2010-0849
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0849&gt;

</description>
  <yum:version ver="7077" rel="0"/>
  <rpm:requires>
    <rpm:entry kind="atom" name="java-1_5_0-ibm" epoch="0" ver="1.5.0_sr11.2" rel="0.4.1" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_5_0-ibm-32bit" epoch="0" ver="1.5.0_sr11.2" rel="0.4.1" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_5_0-ibm-alsa-32bit" epoch="0" ver="1.5.0_sr11.2" rel="0.4.1" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_5_0-ibm-demo" epoch="0" ver="1.5.0_sr11.2" rel="0.4.1" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_5_0-ibm-devel" epoch="0" ver="1.5.0_sr11.2" rel="0.4.1" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_5_0-ibm-devel-32bit" epoch="0" ver="1.5.0_sr11.2" rel="0.4.1" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_5_0-ibm-fonts" epoch="0" ver="1.5.0_sr11.2" rel="0.4.1" flags="EQ"/>
    <rpm:entry kind="atom" name="java-1_5_0-ibm-src" epoch="0" ver="1.5.0_sr11.2" rel="0.4.1" flags="EQ"/>
  </rpm:requires>
  <category>security</category>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_5_0-ibm</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="1.5.0_sr11.2" rel="0.4.1"/>
      <checksum type="sha" pkgid="YES">092de5cdcbc70d3616c3a022b5d50fec6daf14f1</checksum>
      <time file="1276794980" build="1276794917"/>
      <size package="48851437" installed="77464959" archive="77522424"/>
      <location xml:base="media://#1" href="suse/x86_64/java-1_5_0-ibm-1.5.0_sr11.2-0.4.1.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_5_0-ibm" epoch="0" ver="1.5.0_sr11.2" rel="0.4.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_5_0-ibm"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_5_0-ibm-32bit</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="1.5.0_sr11.2" rel="0.4.1"/>
      <checksum type="sha" pkgid="YES">d9828524f8df85c841b061cee250aeba445fc109</checksum>
      <time file="1276795071" build="1276795031"/>
      <size package="46063169" installed="68903921" archive="68966824"/>
      <location xml:base="media://#1" href="suse/x86_64/java-1_5_0-ibm-32bit-1.5.0_sr11.2-0.4.1.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_5_0-ibm-32bit" epoch="0" ver="1.5.0_sr11.2" rel="0.4.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_5_0-ibm-32bit"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_5_0-ibm-alsa-32bit</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="1.5.0_sr11.2" rel="0.4.1"/>
      <checksum type="sha" pkgid="YES">9181d3b2a1e7aad5e4349251a6f87fd9474dcb7e</checksum>
      <time file="1276795071" build="1276794983"/>
      <size package="48151" installed="92345" archive="93224"/>
      <location xml:base="media://#1" href="suse/x86_64/java-1_5_0-ibm-alsa-32bit-1.5.0_sr11.2-0.4.1.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_5_0-ibm-alsa-32bit" epoch="0" ver="1.5.0_sr11.2" rel="0.4.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_5_0-ibm-alsa-32bit"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_5_0-ibm-demo</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="1.5.0_sr11.2" rel="0.4.1"/>
      <checksum type="sha" pkgid="YES">0257ea7b53e9472b4b589a4f37888c39cb214812</checksum>
      <time file="1276794980" build="1276794917"/>
      <size package="3452038" installed="6506369" archive="6621420"/>
      <location xml:base="media://#1" href="suse/x86_64/java-1_5_0-ibm-demo-1.5.0_sr11.2-0.4.1.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_5_0-ibm-demo" epoch="0" ver="1.5.0_sr11.2" rel="0.4.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_5_0-ibm-demo"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_5_0-ibm-devel</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="1.5.0_sr11.2" rel="0.4.1"/>
      <checksum type="sha" pkgid="YES">377608cfbea30d35c8a66428da69fa75fe1342e7</checksum>
      <time file="1276794980" build="1276794917"/>
      <size package="3125585" installed="4644310" archive="4651388"/>
      <location xml:base="media://#1" href="suse/x86_64/java-1_5_0-ibm-devel-1.5.0_sr11.2-0.4.1.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_5_0-ibm-devel" epoch="0" ver="1.5.0_sr11.2" rel="0.4.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_5_0-ibm-devel"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_5_0-ibm-devel-32bit</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="1.5.0_sr11.2" rel="0.4.1"/>
      <checksum type="sha" pkgid="YES">b9f417863a6cb57764a10dab49c882947c81c7eb</checksum>
      <time file="1276795072" build="1276794984"/>
      <size package="3686927" installed="5263853" archive="5272236"/>
      <location xml:base="media://#1" href="suse/x86_64/java-1_5_0-ibm-devel-32bit-1.5.0_sr11.2-0.4.1.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_5_0-ibm-devel-32bit" epoch="0" ver="1.5.0_sr11.2" rel="0.4.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_5_0-ibm-devel-32bit"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_5_0-ibm-fonts</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="1.5.0_sr11.2" rel="0.4.1"/>
      <checksum type="sha" pkgid="YES">923eed1d6cf83700c7ead16223c4baed7aa4b7ec</checksum>
      <time file="1276794981" build="1276794917"/>
      <size package="1707282" installed="2998643" archive="2984560"/>
      <location xml:base="media://#1" href="suse/x86_64/java-1_5_0-ibm-fonts-1.5.0_sr11.2-0.4.1.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_5_0-ibm-fonts" epoch="0" ver="1.5.0_sr11.2" rel="0.4.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_5_0-ibm-fonts"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>java-1_5_0-ibm-src</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="1.5.0_sr11.2" rel="0.4.1"/>
      <checksum type="sha" pkgid="YES">38775432cbd466d1a669f32ccb6db60aa90d059d</checksum>
      <time file="1276794981" build="1276794917"/>
      <size package="8177435" installed="8457295" archive="8457740"/>
      <location xml:base="media://#1" href="suse/x86_64/java-1_5_0-ibm-src-1.5.0_sr11.2-0.4.1.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="java-1_5_0-ibm-src" epoch="0" ver="1.5.0_sr11.2" rel="0.4.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="java-1_5_0-ibm-src"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
  </atoms>
</patch>
