<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="b36aaab84a5618e58a83fd28deda41c5"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="kernel-6274"
    timestamp="1243507430"
    engine="1.0">
  <yum:name>kernel</yum:name>
  <summary lang="en">Linux Kernel update</summary>
  <summary lang="de">Linux Kernel update</summary>
  <description lang="en">This kernel update for openSUSE 10.3 fixes some bugs and
several security problems.

The following security issues are fixed: A local denial of
service problem in the splice(2) system call.

CVE-2009-0834: The audit_syscall_entry function in the
Linux kernel on the x86_64 platform did not properly handle
(1) a 32-bit process making a 64-bit syscall or (2) a
64-bit process making a 32-bit syscall, which allows local
users to bypass certain syscall audit configurations via
crafted syscalls.

CVE-2009-1072: nfsd in the Linux kernel did not drop the
CAP_MKNOD capability before handling a user request in a
thread, which allows local users to create device nodes, as
demonstrated on a filesystem that has been exported with
the root_squash option.

CVE-2009-0835  The __secure_computing function in
kernel/seccomp.c in the seccomp subsystem in the Linux
kernel on the x86_64 platform, when CONFIG_SECCOMP is
enabled, does not properly handle (1) a 32-bit process
making a 64-bit syscall or (2) a 64-bit process making a
32-bit syscall, which allows local users to bypass intended
access restrictions via crafted syscalls that are
misinterpreted as (a) stat or (b) chmod.

CVE-2009-1439: Buffer overflow in fs/cifs/connect.c in CIFS
in the Linux kernel 2.6.29 and earlier allows remote
attackers to cause a denial of service (crash) or potential
code execution via a long nativeFileSystem field in a Tree
Connect response to an SMB mount request.

This requires that kernel can be made to mount a &quot;cifs&quot;
filesystem from a malicious CIFS server.

CVE-2009-1337: The exit_notify function in kernel/exit.c in
the Linux kernel did not restrict exit signals when the
CAP_KILL capability is held, which allows local users to
send an arbitrary signal to a process by running a program
that modifies the exit_signal field and then uses an exec
system call to launch a setuid application.

CVE-2009-0859: The shm_get_stat function in ipc/shm.c in
the shm subsystem in the Linux kernel, when CONFIG_SHMEM is
disabled, misinterprets the data type of an inode, which
allows local users to cause a denial of service (system
hang) via an SHM_INFO shmctl call, as demonstrated by
running the ipcs program. (SUSE is enabling CONFIG_SHMEM,
so is by default not affected, the fix is just for
completeness).

CVE-2009-1265: Integer overflow in rose_sendmsg
(sys/net/af_rose.c) in the Linux kernel might allow
attackers to obtain sensitive information via a large
length value, which causes &quot;garbage&quot; memory to be sent.

CVE-2009-0028: The clone system call in the Linux kernel
allows local users to send arbitrary signals to a parent
process from an unprivileged child process by launching an
additional child process with the CLONE_PARENT flag, and
then letting this new process exit.

CVE-2009-0676: The sock_getsockopt function in
net/core/sock.c in the Linux kernel does not initialize a
certain structure member, which allows local users to
obtain potentially sensitive information from kernel memory
via an SO_BSDCOMPAT getsockopt request.

CVE-2009-0322: drivers/firmware/dell_rbu.c in the Linux
kernel allows local users to cause a denial of service
(system crash) via a read system call that specifies zero
bytes from the (1) image_type or (2) packet_size file in
/sys/devices/platform/dell_rbu/.

CVE-2009-0269: fs/ecryptfs/inode.c in the eCryptfs
subsystem in the Linux kernel allows local users to cause a
denial of service (fault or memory corruption), or possibly
have unspecified other impact, via a readlink call that
results in an error, leading to use of a -1 return value as
an array index.

CVE-2009-0065: Buffer overflow in net/sctp/sm_statefuns.c
in the Stream Control Transmission Protocol (sctp)
implementation in the Linux kernel allows remote attackers
to have an unknown impact via an FWD-TSN (aka FORWARD-TSN)
chunk with a large stream ID.

CVE-2008-5702: Buffer underflow in the ibwdt_ioctl function
in drivers/watchdog/ib700wdt.c in the Linux kernel might
allow local users to have an unknown impact via a certain
/dev/watchdog WDIOC_SETTIMEOUT IOCTL call.

CVE-2008-4554: The do_splice_from function in fs/splice.c
in the Linux kernel does not reject file descriptors that
have the O_APPEND flag set, which allows local users to
bypass append mode and make arbitrary changes to other
locations in the file.

Some other non-security bugs were fixed, please see the RPM
changelog.
</description>
  <description lang="de">This kernel update for openSUSE 10.3 fixes some bugs and
several security problems.

The following security issues are fixed: A local denial of
service problem in the splice(2) system call.

CVE-2009-0834: The audit_syscall_entry function in the
Linux kernel on the x86_64 platform did not properly handle
(1) a 32-bit process making a 64-bit syscall or (2) a
64-bit process making a 32-bit syscall, which allows local
users to bypass certain syscall audit configurations via
crafted syscalls.

CVE-2009-1072: nfsd in the Linux kernel did not drop the
CAP_MKNOD capability before handling a user request in a
thread, which allows local users to create device nodes, as
demonstrated on a filesystem that has been exported with
the root_squash option.

CVE-2009-0835  The __secure_computing function in
kernel/seccomp.c in the seccomp subsystem in the Linux
kernel on the x86_64 platform, when CONFIG_SECCOMP is
enabled, does not properly handle (1) a 32-bit process
making a 64-bit syscall or (2) a 64-bit process making a
32-bit syscall, which allows local users to bypass intended
access restrictions via crafted syscalls that are
misinterpreted as (a) stat or (b) chmod.

CVE-2009-1439: Buffer overflow in fs/cifs/connect.c in CIFS
in the Linux kernel 2.6.29 and earlier allows remote
attackers to cause a denial of service (crash) or potential
code execution via a long nativeFileSystem field in a Tree
Connect response to an SMB mount request.

This requires that kernel can be made to mount a &quot;cifs&quot;
filesystem from a malicious CIFS server.

CVE-2009-1337: The exit_notify function in kernel/exit.c in
the Linux kernel did not restrict exit signals when the
CAP_KILL capability is held, which allows local users to
send an arbitrary signal to a process by running a program
that modifies the exit_signal field and then uses an exec
system call to launch a setuid application.

CVE-2009-0859: The shm_get_stat function in ipc/shm.c in
the shm subsystem in the Linux kernel, when CONFIG_SHMEM is
disabled, misinterprets the data type of an inode, which
allows local users to cause a denial of service (system
hang) via an SHM_INFO shmctl call, as demonstrated by
running the ipcs program. (SUSE is enabling CONFIG_SHMEM,
so is by default not affected, the fix is just for
completeness).

CVE-2009-1265: Integer overflow in rose_sendmsg
(sys/net/af_rose.c) in the Linux kernel might allow
attackers to obtain sensitive information via a large
length value, which causes &quot;garbage&quot; memory to be sent.

CVE-2009-0028: The clone system call in the Linux kernel
allows local users to send arbitrary signals to a parent
process from an unprivileged child process by launching an
additional child process with the CLONE_PARENT flag, and
then letting this new process exit.

CVE-2009-0676: The sock_getsockopt function in
net/core/sock.c in the Linux kernel does not initialize a
certain structure member, which allows local users to
obtain potentially sensitive information from kernel memory
via an SO_BSDCOMPAT getsockopt request.

CVE-2009-0322: drivers/firmware/dell_rbu.c in the Linux
kernel allows local users to cause a denial of service
(system crash) via a read system call that specifies zero
bytes from the (1) image_type or (2) packet_size file in
/sys/devices/platform/dell_rbu/.

CVE-2009-0269: fs/ecryptfs/inode.c in the eCryptfs
subsystem in the Linux kernel allows local users to cause a
denial of service (fault or memory corruption), or possibly
have unspecified other impact, via a readlink call that
results in an error, leading to use of a -1 return value as
an array index.

CVE-2009-0065: Buffer overflow in net/sctp/sm_statefuns.c
in the Stream Control Transmission Protocol (sctp)
implementation in the Linux kernel allows remote attackers
to have an unknown impact via an FWD-TSN (aka FORWARD-TSN)
chunk with a large stream ID.

CVE-2008-5702: Buffer underflow in the ibwdt_ioctl function
in drivers/watchdog/ib700wdt.c in the Linux kernel might
allow local users to have an unknown impact via a certain
/dev/watchdog WDIOC_SETTIMEOUT IOCTL call.

CVE-2008-4554: The do_splice_from function in fs/splice.c
in the Linux kernel does not reject file descriptors that
have the O_APPEND flag set, which allows local users to
bypass append mode and make arbitrary changes to other
locations in the file.

Some other non-security bugs were fixed, please see the RPM
changelog.
</description>
  <yum:version ver="6274" rel="0"/>
  <rpm:requires>
    <rpm:entry kind="atom" name="kernel-bigsmp" epoch="0" ver="2.6.22.19" rel="0.3" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-debug" epoch="0" ver="2.6.22.19" rel="0.3" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-default" epoch="0" ver="2.6.22.19" rel="0.3" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-kdump" epoch="0" ver="2.6.22.19" rel="0.3" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-ppc64" epoch="0" ver="2.6.22.19" rel="0.3" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-source" epoch="0" ver="2.6.22.19" rel="0.3" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-syms" epoch="0" ver="2.6.22.19" rel="0.3" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-xen" epoch="0" ver="2.6.22.19" rel="0.3" flags="EQ"/>
    <rpm:entry kind="atom" name="kernel-xenpae" epoch="0" ver="2.6.22.19" rel="0.3" flags="EQ"/>
  </rpm:requires>
  <reboot-needed/>
  <category>security</category>
    <license-to-confirm>
This update can be used to install a new kernel.
 
If you decide to use the kernel update, we recommend that you reboot
your system upon completion of the YaST Online Update, as additional
kernel modules may be needed which can only be loaded after the system
is rebooted.
    </license-to-confirm>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-bigsmp</name>
      <arch>i586</arch>
      <version epoch="0" ver="2.6.22.19" rel="0.3"/>
      <checksum type="sha" pkgid="YES">8651e337237509a5c89739aaa5619b7f07542f81</checksum>
      <time file="1243516475" build="1243507430"/>
      <size package="21371898" installed="90349787" archive="87013352"/>
      <location href="rpm/i586/kernel-bigsmp-2.6.22.19-0.3.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-bigsmp" epoch="0" ver="2.6.22.19" rel="0.3" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-bigsmp"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <deltarpm>
          <location href="rpm/i586/kernel-bigsmp-2.6.22.5_2.6.22.19-31_0.3.i586.delta.rpm"/>
          <checksum type="sha">ff05be926b6bff2f59b2c6c08c0e514a10a69689</checksum>
          <time file="1243517472" build="1243507430"/>
          <size package="5741961" archive="0"/>
          <base-version epoch="0" ver="2.6.22.5" rel="31" md5sum="3533474cb60a8049d4fffabd4c926143" buildtime="1190660862" sequence_info="kernel-bigsmp-2.6.22.5-31-a8b558ed447e3b321b0e3e2d1c375f57224121cdc4c160"/>
        </deltarpm>
        <deltarpm>
          <location href="rpm/i586/kernel-bigsmp-2.6.22.19-0.2_0.3.i586.delta.rpm"/>
          <checksum type="sha">969581a7026b34909866a88f4d671c681914f1ce</checksum>
          <time file="1243517501" build="1243507430"/>
          <size package="5018917" archive="0"/>
          <base-version epoch="0" ver="2.6.22.19" rel="0.2" md5sum="185407065da188dd136466760e95082c" buildtime="1231900464" sequence_info="kernel-bigsmp-2.6.22.19-0.2-bac84220c5c681df735f04a0fddc031e224121cdc4c170"/>
        </deltarpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-debug</name>
      <arch>i586</arch>
      <version epoch="0" ver="2.6.22.19" rel="0.3"/>
      <checksum type="sha" pkgid="YES">656bbf63f8a38d3db2dc34f3bfc3f044c93c178e</checksum>
      <time file="1243516520" build="1243508628"/>
      <size package="21919156" installed="91310816" archive="87970224"/>
      <location href="rpm/i586/kernel-debug-2.6.22.19-0.3.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-debug" epoch="0" ver="2.6.22.19" rel="0.3" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-debug"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <deltarpm>
          <location href="rpm/i586/kernel-debug-2.6.22.5_2.6.22.19-31_0.3.i586.delta.rpm"/>
          <checksum type="sha">614f5ce73d09fc44dd7a03125d69fcb318a96a88</checksum>
          <time file="1243517583" build="1243508628"/>
          <size package="6814457" archive="0"/>
          <base-version epoch="0" ver="2.6.22.5" rel="31" md5sum="b5d5658d5a89322570baf50ae850ad6d" buildtime="1190658504" sequence_info="kernel-debug-2.6.22.5-31-0d8db53b30629b2d48b56816dcd2d9ac224121adc4c160"/>
        </deltarpm>
        <deltarpm>
          <location href="rpm/i586/kernel-debug-2.6.22.19-0.2_0.3.i586.delta.rpm"/>
          <checksum type="sha">d8c291f7ce0de4e3f20d379ef4c074bfa32dcb5d</checksum>
          <time file="1243517612" build="1243508628"/>
          <size package="5403953" archive="0"/>
          <base-version epoch="0" ver="2.6.22.19" rel="0.2" md5sum="5e8302b6f6ab4833cad7156893e7a5fd" buildtime="1231902407" sequence_info="kernel-debug-2.6.22.19-0.2-564fe25513c598816be5675ae8c78fd42241218dc4c170"/>
        </deltarpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-debug</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.22.19" rel="0.3"/>
      <checksum type="sha" pkgid="YES">5e6d64ad5b2b1530934a2b11030c9a3859612419</checksum>
      <time file="1243516132" build="1243506977"/>
      <size package="20524127" installed="97984942" archive="94714856"/>
      <location href="rpm/x86_64/kernel-debug-2.6.22.19-0.3.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-debug" epoch="0" ver="2.6.22.19" rel="0.3" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-debug"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <deltarpm>
          <location href="rpm/x86_64/kernel-debug-2.6.22.5_2.6.22.19-31_0.3.x86_64.delta.rpm"/>
          <checksum type="sha">570eac5b0cc86a0a53fc6ab3354f2dae3544bb0a</checksum>
          <time file="1243517668" build="1243506977"/>
          <size package="6360500" archive="0"/>
          <base-version epoch="0" ver="2.6.22.5" rel="31" md5sum="d1f21548ec8ae52d87621a3d50f09927" buildtime="1190662181" sequence_info="kernel-debug-2.6.22.5-31-f6f447be7b2329005be3d28f88cfbfc0224121ac84c150"/>
        </deltarpm>
        <deltarpm>
          <location href="rpm/x86_64/kernel-debug-2.6.22.19-0.2_0.3.x86_64.delta.rpm"/>
          <checksum type="sha">cf47f3d038d71857ce5c4cf3b0ea60a7d339562e</checksum>
          <time file="1243517699" build="1243506977"/>
          <size package="5089834" archive="0"/>
          <base-version epoch="0" ver="2.6.22.19" rel="0.2" md5sum="667c5ff78e17cb03a84a097c43cc744f" buildtime="1232022303" sequence_info="kernel-debug-2.6.22.19-0.2-2264451f67410aa42a70cab343827b9f2241218c84c160"/>
        </deltarpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-default</name>
      <arch>i586</arch>
      <version epoch="0" ver="2.6.22.19" rel="0.3"/>
      <checksum type="sha" pkgid="YES">b6576cc7343fb5383700603e27246c75581c53f6</checksum>
      <time file="1243516416" build="1243507218"/>
      <size package="21229598" installed="65616682" archive="62276716"/>
      <location href="rpm/i586/kernel-default-2.6.22.19-0.3.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-default" epoch="0" ver="2.6.22.19" rel="0.3" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-default"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <deltarpm>
          <location href="rpm/i586/kernel-default-2.6.22.5_2.6.22.19-31_0.3.i586.delta.rpm"/>
          <checksum type="sha">863771a44873c8ab61a7443db6e1ddc448637b00</checksum>
          <time file="1243517758" build="1243507218"/>
          <size package="5590438" archive="0"/>
          <base-version epoch="0" ver="2.6.22.5" rel="31" md5sum="04fdfd737f981f17ae5eb738a2314161" buildtime="1190662911" sequence_info="kernel-default-2.6.22.5-31-438726766b987b7c5da18274445497cd224121cdc4c170"/>
        </deltarpm>
        <deltarpm>
          <location href="rpm/i586/kernel-default-2.6.22.19-0.2_0.3.i586.delta.rpm"/>
          <checksum type="sha">6f0fe1d6170b78caba8f455f5df4f81995fb8c4b</checksum>
          <time file="1243517788" build="1243507218"/>
          <size package="4916317" archive="0"/>
          <base-version epoch="0" ver="2.6.22.19" rel="0.2" md5sum="742b7e61500910c356c5dafe884028f5" buildtime="1231900965" sequence_info="kernel-default-2.6.22.19-0.2-500a2e11cba0cf664a527c485b005596224121cdc4c170"/>
        </deltarpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-default</name>
      <arch>ppc</arch>
      <version epoch="0" ver="2.6.22.19" rel="0.3"/>
      <checksum type="sha" pkgid="YES">75a2dd8fce3058cd0ed4c1b3a7705261a4852e18</checksum>
      <time file="1243515983" build="1243507353"/>
      <size package="14036781" installed="42195455" archive="39273196"/>
      <location href="rpm/ppc/kernel-default-2.6.22.19-0.3.ppc.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-default" epoch="0" ver="2.6.22.19" rel="0.3" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-default"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <deltarpm>
          <location href="rpm/ppc/kernel-default-2.6.22.5_2.6.22.19-31_0.3.ppc.delta.rpm"/>
          <checksum type="sha">cd0a9c1156033562896dba293e9c26792bb796b9</checksum>
          <time file="1243517844" build="1243507353"/>
          <size package="2020173" archive="0"/>
          <base-version epoch="0" ver="2.6.22.5" rel="31" md5sum="a47701b93e37a4e3f517f590f5cd5551" buildtime="1190657916" sequence_info="kernel-default-2.6.22.5-31-8fbcf1a6780bcad4a096de0a8375eba8223121c8b2c181"/>
        </deltarpm>
        <deltarpm>
          <location href="rpm/ppc/kernel-default-2.6.22.19-0.2_0.3.ppc.delta.rpm"/>
          <checksum type="sha">8711e2cec56d353ed337ab08558cde35a924d630</checksum>
          <time file="1243517860" build="1243507353"/>
          <size package="1211949" archive="0"/>
          <base-version epoch="0" ver="2.6.22.19" rel="0.2" md5sum="6a43fb0dcfcd5300ce24b66741532ea8" buildtime="1231901929" sequence_info="kernel-default-2.6.22.19-0.2-74507dacbb85ea67c4245632aeac8cf4223121c8b2c181"/>
        </deltarpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-default</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.22.19" rel="0.3"/>
      <checksum type="sha" pkgid="YES">48d274729ff8a9ad9f6735bf81be8bab42a49315</checksum>
      <time file="1243516076" build="1243506521"/>
      <size package="19946024" installed="96424769" archive="93148128"/>
      <location href="rpm/x86_64/kernel-default-2.6.22.19-0.3.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-default" epoch="0" ver="2.6.22.19" rel="0.3" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-default"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <deltarpm>
          <location href="rpm/x86_64/kernel-default-2.6.22.5_2.6.22.19-31_0.3.x86_64.delta.rpm"/>
          <checksum type="sha">c9c3819c2cae4d1616f47756fe8fadf01f4a451c</checksum>
          <time file="1243517901" build="1243506521"/>
          <size package="5379237" archive="0"/>
          <base-version epoch="0" ver="2.6.22.5" rel="31" md5sum="5bc9c1113c3398395767fb6b87809ffe" buildtime="1190661471" sequence_info="kernel-default-2.6.22.5-31-aa222b2d364cc5a61c85f300fea27737224121bb84c160"/>
        </deltarpm>
        <deltarpm>
          <location href="rpm/x86_64/kernel-default-2.6.22.19-0.2_0.3.x86_64.delta.rpm"/>
          <checksum type="sha">a10919c930d2cc979499574cc8c6332c7726ea9d</checksum>
          <time file="1243517931" build="1243506521"/>
          <size package="4794059" archive="0"/>
          <base-version epoch="0" ver="2.6.22.19" rel="0.2" md5sum="ea8dd993b8110e9418acde24f53f99c7" buildtime="1232019740" sequence_info="kernel-default-2.6.22.19-0.2-44e0d902d96d1cb1f01857fde25019de2241219b84c160"/>
        </deltarpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-kdump</name>
      <arch>ppc</arch>
      <version epoch="0" ver="2.6.22.19" rel="0.3"/>
      <checksum type="sha" pkgid="YES">583e30affd0ae72e49f8944fa344428d0f8657fc</checksum>
      <time file="1243516008" build="1243506441"/>
      <size package="10831993" installed="53102140" archive="50512004"/>
      <location href="rpm/ppc/kernel-kdump-2.6.22.19-0.3.ppc.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-kdump" epoch="0" ver="2.6.22.19" rel="0.3" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-kdump"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <deltarpm>
          <location href="rpm/ppc/kernel-kdump-2.6.22.19-0.2_0.3.ppc.delta.rpm"/>
          <checksum type="sha">ba2ebca2ebba16a7d4c917fb408ea131a83943b6</checksum>
          <time file="1243517960" build="1243506441"/>
          <size package="1118075" archive="0"/>
          <base-version epoch="0" ver="2.6.22.19" rel="0.2" md5sum="76a0211f84e343c22e1c50974c62b23b" buildtime="1231899442" sequence_info="kernel-kdump-2.6.22.19-0.2-7852492980e0fb37cfe591ccd22d03f4224111fec1c181"/>
        </deltarpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-ppc64</name>
      <arch>ppc</arch>
      <version epoch="0" ver="2.6.22.19" rel="0.3"/>
      <checksum type="sha" pkgid="YES">1e990f44b3c13ac70f36e4e471d77ee32ff35e4a</checksum>
      <time file="1243515994" build="1243506295"/>
      <size package="13491738" installed="68005918" archive="65218764"/>
      <location href="rpm/ppc/kernel-ppc64-2.6.22.19-0.3.ppc.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-ppc64" epoch="0" ver="2.6.22.19" rel="0.3" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-ppc64"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <deltarpm>
          <location href="rpm/ppc/kernel-ppc64-2.6.22.5_2.6.22.19-31_0.3.ppc.delta.rpm"/>
          <checksum type="sha">8b8580019cbb8d286acb2132bc69a13ae99c90d3</checksum>
          <time file="1243517990" build="1243506295"/>
          <size package="1970142" archive="0"/>
          <base-version epoch="0" ver="2.6.22.5" rel="31" md5sum="b03e5a9a6e99b3b73357a9d1371fdb48" buildtime="1190657430" sequence_info="kernel-ppc64-2.6.22.5-31-576f457d0ab9d756dccbc9de39edb2c8223121a892c170"/>
        </deltarpm>
        <deltarpm>
          <location href="rpm/ppc/kernel-ppc64-2.6.22.19-0.2_0.3.ppc.delta.rpm"/>
          <checksum type="sha">5c94d4461e3a9151418457c08e21e625e73dac3b</checksum>
          <time file="1243518014" build="1243506295"/>
          <size package="1183286" archive="0"/>
          <base-version epoch="0" ver="2.6.22.19" rel="0.2" md5sum="6f27517616a5b1787821223790401567" buildtime="1231899833" sequence_info="kernel-ppc64-2.6.22.19-0.2-ac3fbca8273e1d60ca0d40e719fb6156223121a892c181"/>
        </deltarpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-source</name>
      <arch>i586</arch>
      <version epoch="0" ver="2.6.22.19" rel="0.3"/>
      <checksum type="sha" pkgid="YES">f5f84c0f6015b7d2a530d69e1f2e6a76e5d9a177</checksum>
      <time file="1243516394" build="1243505065"/>
      <size package="51732981" installed="254952289" archive="262507396"/>
      <location href="rpm/i586/kernel-source-2.6.22.19-0.3.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-source" epoch="0" ver="2.6.22.19" rel="0.3" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-source"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <deltarpm>
          <location href="rpm/i586/kernel-source-2.6.22.5_2.6.22.19-31_0.3.i586.delta.rpm"/>
          <checksum type="sha">6f6db1dfd7538853b143afc869b5472e528439ee</checksum>
          <time file="1243518213" build="1243505065"/>
          <size package="5327907" archive="0"/>
          <base-version epoch="0" ver="2.6.22.5" rel="31" md5sum="a30e4f937156e183ff5ad757d78d7e41" buildtime="1190657403" sequence_info="kernel-source-2.6.22.5-31-93e94ce0c329d12ded00d7e18a5ca020b21cd31eae6144161413ed31cbe61441614139d318ae6144161413da31daa6144161413ea31faa6144161413abdf509ebb4108ebb410fdbb410ddbb410cdbb410bdbb410adbb4108dbb410fcbb410ecbb410dcbb410ccbb410bcbb4109cbb4108cbb410fbbb410ebbb4109bbb410989d31"/>
        </deltarpm>
        <deltarpm>
          <location href="rpm/i586/kernel-source-2.6.22.19-0.2_0.3.i586.delta.rpm"/>
          <checksum type="sha">796b0eea4b3d6fde3d750a03a9838039daea0727</checksum>
          <time file="1243518403" build="1243505065"/>
          <size package="4860152" archive="0"/>
          <base-version epoch="0" ver="2.6.22.19" rel="0.2" md5sum="d58389082bfe0b29b9665719feee145a" buildtime="1231898442" sequence_info="kernel-source-2.6.22.19-0.2-57b0af9487042e752bc3a8849f624532b21cd31eae6144161413ed31ebe61441614139d318ae6144161413da31daa6144161413ea31faa6144161413cadf50bebb410aebb4109ebb410fdbb410edbb410ddbb410cdbb410adbb4109dbb4108dbb410fcbb410ecbb410dcbb410bcbb410acbb4109cbb4108cbb410bbbb410b89d31"/>
        </deltarpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-source</name>
      <arch>ppc</arch>
      <version epoch="0" ver="2.6.22.19" rel="0.3"/>
      <checksum type="sha" pkgid="YES">3ce6fcb612cc8ae76f1c159ebced2d169d47016f</checksum>
      <time file="1243515972" build="1243505204"/>
      <size package="50282320" installed="254348285" archive="259710092"/>
      <location href="rpm/ppc/kernel-source-2.6.22.19-0.3.ppc.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-source" epoch="0" ver="2.6.22.19" rel="0.3" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-source"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <deltarpm>
          <location href="rpm/ppc/kernel-source-2.6.22.5_2.6.22.19-31_0.3.ppc.delta.rpm"/>
          <checksum type="sha">8bd538a22956f772fb490cd496761dbe92bb265f</checksum>
          <time file="1243518589" build="1243505204"/>
          <size package="4096719" archive="0"/>
          <base-version epoch="0" ver="2.6.22.5" rel="31" md5sum="6c2a8bcac40df7b2fc5d1b38bf08757c" buildtime="1190656171" sequence_info="kernel-source-2.6.22.5-31-772c2509285443a4132ae0ea51523c54f118821bd9414416142111c911fd931441614218b11e98414416142111bbdf50ad9c1108d9c110dc9c110cc9c110bc9c110ac9c1108c9c110fb9c110eb9c110db9c110cb9c110bb9c1109b9c1108b9c110fa9c110ea9c1109a9c110a898110"/>
        </deltarpm>
        <deltarpm>
          <location href="rpm/ppc/kernel-source-2.6.22.19-0.2_0.3.ppc.delta.rpm"/>
          <checksum type="sha">e6d7a9334fe31cf116966484d5abe10777cff1d3</checksum>
          <time file="1243518724" build="1243505204"/>
          <size package="3714626" archive="0"/>
          <base-version epoch="0" ver="2.6.22.19" rel="0.2" md5sum="029142152d9084220bec26b6845bf799" buildtime="1231898409" sequence_info="kernel-source-2.6.22.19-0.2-6b9aa70dba1c9529cd9d9e0318e81c81f118821ad9414416142111c911ed931441614218b11d98414416142111dadf50fc9c110dc9c110ac9c1109c9c1108c9c110fb9c110db9c110cb9c110bb9c110ab9c1109b9c1108b9c110ea9c110da9c110ca9c110ba9c110e99c1108898110"/>
        </deltarpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-source</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.22.19" rel="0.3"/>
      <checksum type="sha" pkgid="YES">2822f82da0bf50939f3e905b8750e0f1dc60046e</checksum>
      <time file="1243516072" build="1243504939"/>
      <size package="50726974" installed="254445053" archive="260519460"/>
      <location href="rpm/x86_64/kernel-source-2.6.22.19-0.3.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-source" epoch="0" ver="2.6.22.19" rel="0.3" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-source"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <deltarpm>
          <location href="rpm/x86_64/kernel-source-2.6.22.5_2.6.22.19-31_0.3.x86_64.delta.rpm"/>
          <checksum type="sha">b84f69af5b6329fadf940c20b2ff31ea403cf3e7</checksum>
          <time file="1243518919" build="1243504939"/>
          <size package="4475741" archive="0"/>
          <base-version epoch="0" ver="2.6.22.5" rel="31" md5sum="681c353abe9c148d4a1fa8abcd6e8d7d" buildtime="1190657906" sequence_info="kernel-source-2.6.22.5-31-52a4d887efacf6d3c20c2c2424737d30f11c11a931ea96144161413911da319f861441614139931ca861441614139bdf50ffdb210efdb210dfdb210bfdb210afdb2109fdb2108fdb210eedb210dedb210cedb210bedb210aedb2109edb210fddb210eddb210dddb210cddb210fcdb210aadd1108cd61"/>
        </deltarpm>
        <deltarpm>
          <location href="rpm/x86_64/kernel-source-2.6.22.19-0.2_0.3.x86_64.delta.rpm"/>
          <checksum type="sha">64dc4dd5a567cdfbc236997a611a5b60918381d2</checksum>
          <time file="1243519072" build="1243504939"/>
          <size package="4084235" archive="0"/>
          <base-version epoch="0" ver="2.6.22.19" rel="0.2" md5sum="39bd8341ba8cad3eb16f2dfe62191c44" buildtime="1232017390" sequence_info="kernel-source-2.6.22.19-0.2-c1a84599152e1646ec4e687c774be952f11c11a931ea96144161413911da318f861441614139931ba86144161413badf50dfdb210cfdb210bfdb2109fdb2108fdb210fedb210eedb210cedb210bedb210aedb2109edb2108edb210fddb210dddb210cddb210bddb210addb210dcdb2109add1108cd61"/>
        </deltarpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-syms</name>
      <arch>i586</arch>
      <version epoch="0" ver="2.6.22.19" rel="0.3"/>
      <checksum type="sha" pkgid="YES">6cd32ce6a9918b9cf0f800ed907408f1c66f457b</checksum>
      <time file="1243516592" build="1243509396"/>
      <size package="1912102" installed="4397556" archive="4402240"/>
      <location href="rpm/i586/kernel-syms-2.6.22.19-0.3.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-syms" epoch="0" ver="2.6.22.19" rel="0.3" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-syms"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <deltarpm>
          <location href="rpm/i586/kernel-syms-2.6.22.5_2.6.22.19-31_0.3.i586.delta.rpm"/>
          <checksum type="sha">4cea2d2c21f70bdfad6702f3d04743401748d80e</checksum>
          <time file="1243519118" build="1243509396"/>
          <size package="1437046" archive="0"/>
          <base-version epoch="0" ver="2.6.22.5" rel="31" md5sum="9c6aa963bdbd33d4413d9bb91da6eabb" buildtime="1190663938" sequence_info="kernel-syms-2.6.22.5-31-faf151c6860825043aa3a678fa472488b3"/>
        </deltarpm>
        <deltarpm>
          <location href="rpm/i586/kernel-syms-2.6.22.19-0.2_0.3.i586.delta.rpm"/>
          <checksum type="sha">3f3acb78f0276e6b7f9fc7a85a1e561955e73fbb</checksum>
          <time file="1243519120" build="1243509396"/>
          <size package="1301306" archive="0"/>
          <base-version epoch="0" ver="2.6.22.19" rel="0.2" md5sum="186d7704b5d13f88d384ba898c048eda" buildtime="1231903462" sequence_info="kernel-syms-2.6.22.19-0.2-f217f15f17e7e57a8fc71e0493e5a6d1b3"/>
        </deltarpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-syms</name>
      <arch>ppc</arch>
      <version epoch="0" ver="2.6.22.19" rel="0.3"/>
      <checksum type="sha" pkgid="YES">bbdfcec8773afbf428ef07f6985448c32a4c7bc7</checksum>
      <time file="1243516105" build="1243508256"/>
      <size package="1256771" installed="1510492" archive="1513332"/>
      <location href="rpm/ppc/kernel-syms-2.6.22.19-0.3.ppc.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-syms" epoch="0" ver="2.6.22.19" rel="0.3" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-syms"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <deltarpm>
          <location href="rpm/ppc/kernel-syms-2.6.22.5_2.6.22.19-31_0.3.ppc.delta.rpm"/>
          <checksum type="sha">17af65057418cfab5764ed3d78f8db67c763c2c6</checksum>
          <time file="1243519131" build="1243508256"/>
          <size package="1052279" archive="0"/>
          <base-version epoch="0" ver="2.6.22.5" rel="31" md5sum="94ce329057316d5b798043efd6162c2f" buildtime="1190658869" sequence_info="kernel-syms-2.6.22.5-31-96e23a3bcc4c5b987fd21448443e5a1d82"/>
        </deltarpm>
        <deltarpm>
          <location href="rpm/ppc/kernel-syms-2.6.22.19-0.2_0.3.ppc.delta.rpm"/>
          <checksum type="sha">bba82749bccbe12bf94498d8ef214cf7bbe44b8b</checksum>
          <time file="1243519133" build="1243508256"/>
          <size package="1053312" archive="0"/>
          <base-version epoch="0" ver="2.6.22.19" rel="0.2" md5sum="38426e830c156b33ed5686963f67ed4b" buildtime="1231902579" sequence_info="kernel-syms-2.6.22.19-0.2-9963e2a2c0d44e6ec1cf69882c7a195282"/>
        </deltarpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-syms</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.22.19" rel="0.3"/>
      <checksum type="sha" pkgid="YES">dbb3e34f5fac818e4bf26905d84ea71c66d94407</checksum>
      <time file="1243516152" build="1243507728"/>
      <size package="1471640" installed="2592656" archive="2595656"/>
      <location href="rpm/x86_64/kernel-syms-2.6.22.19-0.3.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-syms" epoch="0" ver="2.6.22.19" rel="0.3" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-syms"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <deltarpm>
          <location href="rpm/x86_64/kernel-syms-2.6.22.5_2.6.22.19-31_0.3.x86_64.delta.rpm"/>
          <checksum type="sha">5093db92fe09f2cddfec5d064fb1974f591e446a</checksum>
          <time file="1243519144" build="1243507728"/>
          <size package="1187166" archive="0"/>
          <base-version epoch="0" ver="2.6.22.5" rel="31" md5sum="8cb11a9f8073e772ed962c17b31a7acb" buildtime="1190663598" sequence_info="kernel-syms-2.6.22.5-31-d0fbb510a19359fdcabb341b7560660592"/>
        </deltarpm>
        <deltarpm>
          <location href="rpm/x86_64/kernel-syms-2.6.22.19-0.2_0.3.x86_64.delta.rpm"/>
          <checksum type="sha">21418dabb857df1f99cdc6b733d6347357660b46</checksum>
          <time file="1243519146" build="1243507728"/>
          <size package="1103136" archive="0"/>
          <base-version epoch="0" ver="2.6.22.19" rel="0.2" md5sum="d7fb45f4059fa0f971ce612535b2be67" buildtime="1232023284" sequence_info="kernel-syms-2.6.22.19-0.2-cd1d6fb5c948f6ab7fe1b12aa4a83ec392"/>
        </deltarpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-xen</name>
      <arch>i586</arch>
      <version epoch="0" ver="2.6.22.19" rel="0.3"/>
      <checksum type="sha" pkgid="YES">185ff1efc7f7c1516e90e0d977e60a308be739a8</checksum>
      <time file="1243516554" build="1243507060"/>
      <size package="19838898" installed="61339608" archive="58023604"/>
      <location href="rpm/i586/kernel-xen-2.6.22.19-0.3.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-xen" epoch="0" ver="2.6.22.19" rel="0.3" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-xen"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <deltarpm>
          <location href="rpm/i586/kernel-xen-2.6.22.5_2.6.22.19-31_0.3.i586.delta.rpm"/>
          <checksum type="sha">ad0c7c9a83a6ad1761634edb6546450d6b780e74</checksum>
          <time file="1243519199" build="1243507060"/>
          <size package="5293740" archive="0"/>
          <base-version epoch="0" ver="2.6.22.5" rel="31" md5sum="c2c9342d212914229bef1df7fdaf23ea" buildtime="1190660752" sequence_info="kernel-xen-2.6.22.5-31-47593b40b75fa85e30ae41f442c9d84822511188a4c160"/>
        </deltarpm>
        <deltarpm>
          <location href="rpm/i586/kernel-xen-2.6.22.19-0.2_0.3.i586.delta.rpm"/>
          <checksum type="sha">25650c0024e70c35d9ef8f6ec54c0ddb59733b01</checksum>
          <time file="1243519225" build="1243507060"/>
          <size package="4302857" archive="0"/>
          <base-version epoch="0" ver="2.6.22.19" rel="0.2" md5sum="0c345195b1709de701a210f101827987" buildtime="1231902591" sequence_info="kernel-xen-2.6.22.19-0.2-a515e095fee07b7b5a08a153195e252922511188a4c170"/>
        </deltarpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-xen</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.6.22.19" rel="0.3"/>
      <checksum type="sha" pkgid="YES">3ec2ed173df160568ebf04f7a185d90aebaf9df0</checksum>
      <time file="1243516104" build="1243506930"/>
      <size package="19733137" installed="74919811" archive="71614960"/>
      <location href="rpm/x86_64/kernel-xen-2.6.22.19-0.3.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-xen" epoch="0" ver="2.6.22.19" rel="0.3" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-xen"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <deltarpm>
          <location href="rpm/x86_64/kernel-xen-2.6.22.5_2.6.22.19-31_0.3.x86_64.delta.rpm"/>
          <checksum type="sha">65ad9c17a287fc1a644f465c9e214a6e57dd0761</checksum>
          <time file="1243519294" build="1243506930"/>
          <size package="5601475" archive="0"/>
          <base-version epoch="0" ver="2.6.22.5" rel="31" md5sum="88faa5aa228936f4c4c0750ee84a0be9" buildtime="1190660584" sequence_info="kernel-xen-2.6.22.5-31-4709d7669b53205d15f407f836fe2724225111ec84c150"/>
        </deltarpm>
        <deltarpm>
          <location href="rpm/x86_64/kernel-xen-2.6.22.19-0.2_0.3.x86_64.delta.rpm"/>
          <checksum type="sha">aac66198913cf4ffd14f4e1a792704436cb1ec50</checksum>
          <time file="1243519322" build="1243506930"/>
          <size package="4548367" archive="0"/>
          <base-version epoch="0" ver="2.6.22.19" rel="0.2" md5sum="379d55855c15f67dc4fe7acfb6167eba" buildtime="1232018868" sequence_info="kernel-xen-2.6.22.19-0.2-a0d69bacb1ca97946c13085a7465f600225111cc84c160"/>
        </deltarpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>kernel-xenpae</name>
      <arch>i586</arch>
      <version epoch="0" ver="2.6.22.19" rel="0.3"/>
      <checksum type="sha" pkgid="YES">9581bbb29cb66c449bc3d282507bc5038efa939d</checksum>
      <time file="1243516570" build="1243507051"/>
      <size package="19931541" installed="61511871" archive="58187448"/>
      <location href="rpm/i586/kernel-xenpae-2.6.22.19-0.3.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="kernel-xenpae" epoch="0" ver="2.6.22.19" rel="0.3" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="kernel-xenpae"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <deltarpm>
          <location href="rpm/i586/kernel-xenpae-2.6.22.5_2.6.22.19-31_0.3.i586.delta.rpm"/>
          <checksum type="sha">f9a65f9862910111f877a0cc360979dbe1ad1dcf</checksum>
          <time file="1243519388" build="1243507051"/>
          <size package="5499145" archive="0"/>
          <base-version epoch="0" ver="2.6.22.5" rel="31" md5sum="928bc90e69999e6e1722e34d6a1463d9" buildtime="1190659853" sequence_info="kernel-xenpae-2.6.22.5-31-03c6d6045004280dd804b9cf691a2d84225111ef94c160"/>
        </deltarpm>
        <deltarpm>
          <location href="rpm/i586/kernel-xenpae-2.6.22.19-0.2_0.3.i586.delta.rpm"/>
          <checksum type="sha">472cc44da8e0e334a54de88fd88bd9c29696f4d1</checksum>
          <time file="1243519417" build="1243507051"/>
          <size package="4401704" archive="0"/>
          <base-version epoch="0" ver="2.6.22.19" rel="0.2" md5sum="acb91e530c35a46ba8703ff724367a33" buildtime="1231899958" sequence_info="kernel-xenpae-2.6.22.19-0.2-bf91a6a5405fd88028ee9132c5cb2af1225111ef94c170"/>
        </deltarpm>
      </pkgfiles>
    </package>
  </atoms>
</patch>
