<?xml version="1.0" encoding="UTF-8"?>
<patch version="2.0" xmlns="http://www.novell.com/metadata/zypp/xml-store">
  <name>kernel</name>
  <version ver="4943" rel="0" epoch="0" />
  <arch>noarch</arch>
      <provides><capability kind="patch" >kernel == 4943-0</capability>
</provides>
    <requires><capability kind="atom" >kernel-xenpae == 2.6.22.16-0.1</capability>
<capability kind="atom" >kernel-kdump == 2.6.22.16-0.1</capability>
<capability kind="atom" >kernel-source == 2.6.22.16-0.1</capability>
<capability kind="atom" >kernel-bigsmp == 2.6.22.16-0.1</capability>
<capability kind="atom" >kernel-default == 2.6.22.16-0.1</capability>
<capability kind="atom" >kernel-debug == 2.6.22.16-0.1</capability>
<capability kind="atom" >kernel-syms == 2.6.22.16-0.1</capability>
<capability kind="atom" >kernel-xen == 2.6.22.16-0.1</capability>
<capability kind="atom" >kernel-rt == 2.6.22.16-0.1</capability>
<capability kind="atom" >kernel-rt_debug == 2.6.22.16-0.1</capability>
<capability kind="atom" >kernel-ppc64 == 2.6.22.16-0.1</capability>
</requires>

<summary lang="de">Linux Kernel update</summary>
<summary lang="en">Linux Kernel update</summary>
<description lang="de">Dieses Kernel Update auf 2.6.22.16 behebt folgende
Sicherheitsprobleme (aufgelistet in englischer Sprache):

CVE-2008-0007: Insufficient range checks in certain fault
handlers could be used by local attackers to potentially
read or write kernel memory.

CVE-2008-0001: Incorrect access mode checks could be used
by local attackers to corrupt directory contents and so
cause denial of service attacks or potentially execute code.

CVE-2007-5966: Integer overflow in the hrtimer_start
function in kernel/hrtimer.c in the Linux kernel before
2.6.23.10 allows local users to execute arbitrary code or
cause a denial of service (panic) via a large relative
timeout value. NOTE: some of these details are obtained
from third party information.

CVE-2007-3843: The Linux kernel checked the wrong global
variable for the CIFS sec mount option, which might allow
remote attackers to spoof CIFS network traffic that the
client configured for security signatures, as demonstrated
by lack of signing despite sec=ntlmv2i in a SetupAndX
request.

Und behebt folgende Fehler (aufgelistet in englischer
Sprache mit Bugzilla Nummern):
- patches.fixes/input-add-amilo-pro-v-to-nomux.patch: Add
  Fujitsu-Siemens Amilo Pro 2010 to nomux list (345699).
- patches.arch/acpica-psd.patch: Changed resolution of
  named references in packages
  (https://bugzilla.novell.com/show_bug.cgi?id=346831).
- patches.fixes/acpica_sizeof.patch: SizeOf operator ACPI
  interpreter fix
  (http://bugzilla.kernel.org/show_bug.cgi?id=9558).
- patches.drivers/libata-sata_sis-fix-scr-access: sata_sis:
  fix SCR access (331610).
- patches.drivers/libata-tape-fix: libata: backport tape
  support fixes (345438).
- patches.arch/powernowk8_family_freq_from_fiddid.patch: To
  find the frequency given the fid and did is family
  dependant. (#332722).
- patches.drivers/libata-force-cable-type: libata:
  implement libata.force_cbl parameter (337610).
- patches.drivers/libata-sata_nv-disable-ADMA: sata_nv:
  disable ADMA by default (346508).
- patches.fixes/via-velocity-dont-oops-on-mtu-change-1:
  [VIA_VELOCITY]: Don&apos;t oops on MTU change. (341537).
- patches.fixes/via-velocity-dont-oops-on-mtu-change-2:
  via-velocity: don&apos;t oops on MTU change while down
  (341537).
-
patches.fixes/sony-laptop-call-sonypi_compat_init-earlier: s
  ony-laptop: call sonypi_compat_init earlier (343483).
- Updated kABI symbols for 2.6.22.15 changes, and Xen
  x86_64 changes.
- series.conf file cleanup: group together latency tracing
  patches.
- Fix a memory leak and a panic in drivers/block/cciss.c
  patches.drivers/cciss-panic-in-blk_rq_map_sg: Panic in
  blk_rq_map_sg() from CCISS driver.
- patches.drivers/cciss-fix_memory_leak:
- Address missed-interrupt issues discovered upstream.
- Update to 2.6.22.15
  - fixes CVE-2007-5966
  - lots of libata fixes, which cause the following to be
    removed:
     -
patches.drivers/libata-add-NCQ-spurious-completion-horkages
     -
patches.drivers/libata-add-ST9120822AS-to-NCQ-blacklist
     -
patches.drivers/libata-disable-NCQ-for-ST9160821AS-3.ALD
  - removed patches already in this release:
     -
patches.fixes/i4l-avoid-copying-an-overly-long-string.patch:
     - patches.fixes/ramdisk-2.6.23-corruption_fix.diff
     - patches.fixes/microtek_hal.diff: Delete.
  - fixed previous poweroff regression from 2.6.22.10
  - lots of other fixes and some new pci ids.
- Thousands of changes in patches.rt/ for the kernel-rt*
  kernels.
- patches.fixes/usb_336850.diff: fix missing quirk leading
  to a device disconnecting under load (336850).
- patches.fixes/nfs-unmount-leak.patch: NFSv2/v3: Fix a
  memory leak when using -onolock (336253).
- add xenfb-module-param patch to make Xen virtual frame
  buffer configurable in the guest domains, instead of a
  fixed resolution of 800x600.
- patches.xen/xen3-aux-at_vector_size.patch:  Also include
  x86-64 (310037).
- patches.xen/xen3-patch-2.6.18: Fix system lockup (335121).
- patches.fixes/acpi_autoload_baydock.patch: autloading of
  dock module (302482). Fixed a general bug with linux
  specific hids there.
- patches.xen/xen3-patch-2.6.22.11-12: Linux 2.6.22.12.
- patches.xen/xen3-fixup-arch-i386: Fix CONFIG_APM=m issue.
- patches.xen/xen-x86-no-lapic: Re-diff.
</description>
<description lang="en">This kernel update brings the kernel to version 2.6.22.16
and fixes the following security problems:

CVE-2008-0007: Insufficient range checks in certain fault
handlers could be used by local attackers to potentially
read or write kernel memory.

CVE-2008-0001: Incorrect access mode checks could be used
by local attackers to corrupt directory contents and so
cause denial of service attacks or potentially execute code.

CVE-2007-5966: Integer overflow in the hrtimer_start
function in kernel/hrtimer.c in the Linux kernel before
2.6.23.10 allows local users to execute arbitrary code or
cause a denial of service (panic) via a large relative
timeout value. NOTE: some of these details are obtained
from third party information.

CVE-2007-3843: The Linux kernel checked the wrong global
variable for the CIFS sec mount option, which might allow
remote attackers to spoof CIFS network traffic that the
client configured for security signatures, as demonstrated
by lack of signing despite sec=ntlmv2i in a SetupAndX
request.

CVE-2007-6417: The shmem_getpage function (mm/shmem.c) in
Linux kernel 2.6.11 through 2.6.23 does not properly clear
allocated memory in some rare circumstances, which might
allow local users to read sensitive kernel data or cause a
denial of service (crash).

And the following bugs (numbers are
https://bugzilla.novell.com/ references):

- patches.fixes/input-add-amilo-pro-v-to-nomux.patch: Add
  Fujitsu-Siemens Amilo Pro 2010 to nomux list (345699).
- patches.arch/acpica-psd.patch: Changed resolution of
  named references in packages
  (https://bugzilla.novell.com/show_bug.cgi?id=346831).
- patches.fixes/acpica_sizeof.patch: SizeOf operator ACPI
  interpreter fix
  (http://bugzilla.kernel.org/show_bug.cgi?id=9558).
- patches.drivers/libata-sata_sis-fix-scr-access: sata_sis:
  fix SCR access (331610).
- patches.drivers/libata-tape-fix: libata: backport tape
  support fixes (345438).
- patches.arch/powernowk8_family_freq_from_fiddid.patch: To
  find the frequency given the fid and did is family
  dependant. (#332722).
- patches.drivers/libata-force-cable-type: libata:
  implement libata.force_cbl parameter (337610).
- patches.drivers/libata-sata_nv-disable-ADMA: sata_nv:
  disable ADMA by default (346508).
- patches.fixes/via-velocity-dont-oops-on-mtu-change-1:
  [VIA_VELOCITY]: Don&apos;t oops on MTU change. (341537).
- patches.fixes/via-velocity-dont-oops-on-mtu-change-2:
  via-velocity: don&apos;t oops on MTU change while down
  (341537).
-
patches.fixes/sony-laptop-call-sonypi_compat_init-earlier: s
  ony-laptop: call sonypi_compat_init earlier (343483).
- Updated kABI symbols for 2.6.22.15 changes, and Xen
  x86_64 changes.
- series.conf file cleanup: group together latency tracing
  patches.
- Fix a memory leak and a panic in drivers/block/cciss.c
  patches.drivers/cciss-panic-in-blk_rq_map_sg: Panic in
  blk_rq_map_sg() from CCISS driver.
- patches.drivers/cciss-fix_memory_leak:
- Address missed-interrupt issues discovered upstream.
- Update to 2.6.22.15
  - fixes CVE-2007-5966
  - lots of libata fixes, which cause the following to be
    removed:
     -
patches.drivers/libata-add-NCQ-spurious-completion-horkages
     -
patches.drivers/libata-add-ST9120822AS-to-NCQ-blacklist
     -
patches.drivers/libata-disable-NCQ-for-ST9160821AS-3.ALD
  - removed patches already in this release:
     -
patches.fixes/i4l-avoid-copying-an-overly-long-string.patch:
     - patches.fixes/ramdisk-2.6.23-corruption_fix.diff
     - patches.fixes/microtek_hal.diff: Delete.
  - fixed previous poweroff regression from 2.6.22.10
  - lots of other fixes and some new pci ids.
- Thousands of changes in patches.rt/ for the kernel-rt*
  kernels.
- patches.fixes/usb_336850.diff: fix missing quirk leading
  to a device disconnecting under load (336850).
- patches.fixes/nfs-unmount-leak.patch: NFSv2/v3: Fix a
  memory leak when using -onolock (336253).
- add xenfb-module-param patch to make Xen virtual frame
  buffer configurable in the guest domains, instead of a
  fixed resolution of 800x600.
- patches.xen/xen3-aux-at_vector_size.patch:  Also include
  x86-64 (310037).
- patches.xen/xen3-patch-2.6.18: Fix system lockup (335121).
- patches.fixes/acpi_autoload_baydock.patch: autloading of
  dock module (302482). Fixed a general bug with linux
  specific hids there.
- patches.xen/xen3-patch-2.6.22.11-12: Linux 2.6.22.12.
- patches.xen/xen3-fixup-arch-i386: Fix CONFIG_APM=m issue.
- patches.xen/xen-x86-no-lapic: Re-diff.
</description>
<license-to-confirm>
This update can be used to install a new kernel.
 
If you decide to use the kernel update, we recommend that you reboot
your system upon completion of the YaST Online Update, as additional
kernel modules may be needed which can only be loaded after the system
is rebooted.
    </license-to-confirm>
  <vendor></vendor>
  <size>0</size>
  <archive-size>0</archive-size>
  <install-only>false</install-only>
  <build-time>0</build-time>
  <install-time>1202203402</install-time>
<id>kernel-4943</id>
<timestamp>1201112697</timestamp>
<category>security</category>
<affects-package-manager>false</affects-package-manager>
<reboot-needed>true</reboot-needed>
  <atoms>
<atom>
  <name>kernel-xenpae</name>
  <version ver="2.6.22.16" rel="0.1" epoch="0" />
  <arch>i586</arch>
      <provides><capability kind="atom" >kernel-xenpae == 2.6.22.16-0.1</capability>
</provides>
    <freshens><capability kind="package" >kernel-xenpae</capability>
</freshens>
    <requires><capability kind="package" >kernel-xenpae &gt;= 2.6.22.16-0.1</capability>
</requires>


  <vendor></vendor>
  <size>61492981</size>
  <archive-size>0</archive-size>
  <install-only>false</install-only>
  <build-time>1201112743</build-time>
  <install-time>1202203402</install-time>
</atom>


<atom>
  <name>kernel-kdump</name>
  <version ver="2.6.22.16" rel="0.1" epoch="0" />
  <arch>ppc</arch>
      <provides><capability kind="atom" >kernel-kdump == 2.6.22.16-0.1</capability>
</provides>
    <freshens><capability kind="package" >kernel-kdump</capability>
</freshens>
    <requires><capability kind="package" >kernel-kdump &gt;= 2.6.22.16-0.1</capability>
</requires>


  <vendor></vendor>
  <size>53077609</size>
  <archive-size>0</archive-size>
  <install-only>false</install-only>
  <build-time>1201111170</build-time>
  <install-time>1202203402</install-time>
</atom>


<atom>
  <name>kernel-source</name>
  <version ver="2.6.22.16" rel="0.1" epoch="0" />
  <arch>ppc</arch>
      <provides><capability kind="atom" >kernel-source == 2.6.22.16-0.1</capability>
</provides>
    <freshens><capability kind="package" >kernel-source</capability>
</freshens>
    <requires><capability kind="package" >kernel-source &gt;= 2.6.22.16-0.1</capability>
</requires>


  <vendor></vendor>
  <size>254703014</size>
  <archive-size>0</archive-size>
  <install-only>false</install-only>
  <build-time>1201110223</build-time>
  <install-time>1202203402</install-time>
</atom>


<atom>
  <name>kernel-source</name>
  <version ver="2.6.22.16" rel="0.1" epoch="0" />
  <arch>x86_64</arch>
      <provides><capability kind="atom" >kernel-source == 2.6.22.16-0.1</capability>
</provides>
    <freshens><capability kind="package" >kernel-source</capability>
</freshens>
    <requires><capability kind="package" >kernel-source &gt;= 2.6.22.16-0.1</capability>
</requires>


  <vendor></vendor>
  <size>254799956</size>
  <archive-size>0</archive-size>
  <install-only>false</install-only>
  <build-time>1201110655</build-time>
  <install-time>1202203402</install-time>
</atom>


<atom>
  <name>kernel-source</name>
  <version ver="2.6.22.16" rel="0.1" epoch="0" />
  <arch>i586</arch>
      <provides><capability kind="atom" >kernel-source == 2.6.22.16-0.1</capability>
</provides>
    <freshens><capability kind="package" >kernel-source</capability>
</freshens>
    <requires><capability kind="package" >kernel-source &gt;= 2.6.22.16-0.1</capability>
</requires>


  <vendor></vendor>
  <size>255307147</size>
  <archive-size>0</archive-size>
  <install-only>false</install-only>
  <build-time>1201110264</build-time>
  <install-time>1202203403</install-time>
</atom>


<atom>
  <name>kernel-bigsmp</name>
  <version ver="2.6.22.16" rel="0.1" epoch="0" />
  <arch>i586</arch>
      <provides><capability kind="atom" >kernel-bigsmp == 2.6.22.16-0.1</capability>
</provides>
    <freshens><capability kind="package" >kernel-bigsmp</capability>
</freshens>
    <requires><capability kind="package" >kernel-bigsmp &gt;= 2.6.22.16-0.1</capability>
</requires>


  <vendor></vendor>
  <size>90331033</size>
  <archive-size>0</archive-size>
  <install-only>false</install-only>
  <build-time>1201112697</build-time>
  <install-time>1202203403</install-time>
</atom>


<atom>
  <name>kernel-default</name>
  <version ver="2.6.22.16" rel="0.1" epoch="0" />
  <arch>i586</arch>
      <provides><capability kind="atom" >kernel-default == 2.6.22.16-0.1</capability>
</provides>
    <freshens><capability kind="package" >kernel-default</capability>
</freshens>
    <requires><capability kind="package" >kernel-default &gt;= 2.6.22.16-0.1</capability>
</requires>


  <vendor></vendor>
  <size>65598803</size>
  <archive-size>0</archive-size>
  <install-only>false</install-only>
  <build-time>1201113817</build-time>
  <install-time>1202203403</install-time>
</atom>


<atom>
  <name>kernel-default</name>
  <version ver="2.6.22.16" rel="0.1" epoch="0" />
  <arch>ppc</arch>
      <provides><capability kind="atom" >kernel-default == 2.6.22.16-0.1</capability>
</provides>
    <freshens><capability kind="package" >kernel-default</capability>
</freshens>
    <requires><capability kind="package" >kernel-default &gt;= 2.6.22.16-0.1</capability>
</requires>


  <vendor></vendor>
  <size>42172618</size>
  <archive-size>0</archive-size>
  <install-only>false</install-only>
  <build-time>1201111066</build-time>
  <install-time>1202203403</install-time>
</atom>


<atom>
  <name>kernel-default</name>
  <version ver="2.6.22.16" rel="0.1" epoch="0" />
  <arch>x86_64</arch>
      <provides><capability kind="atom" >kernel-default == 2.6.22.16-0.1</capability>
</provides>
    <freshens><capability kind="package" >kernel-default</capability>
</freshens>
    <requires><capability kind="package" >kernel-default &gt;= 2.6.22.16-0.1</capability>
</requires>


  <vendor></vendor>
  <size>96408319</size>
  <archive-size>0</archive-size>
  <install-only>false</install-only>
  <build-time>1201112868</build-time>
  <install-time>1202203403</install-time>
</atom>


<atom>
  <name>kernel-debug</name>
  <version ver="2.6.22.16" rel="0.1" epoch="0" />
  <arch>x86_64</arch>
      <provides><capability kind="atom" >kernel-debug == 2.6.22.16-0.1</capability>
</provides>
    <freshens><capability kind="package" >kernel-debug</capability>
</freshens>
    <requires><capability kind="package" >kernel-debug &gt;= 2.6.22.16-0.1</capability>
</requires>


  <vendor></vendor>
  <size>97780425</size>
  <archive-size>0</archive-size>
  <install-only>false</install-only>
  <build-time>1201113355</build-time>
  <install-time>1202203403</install-time>
</atom>


<atom>
  <name>kernel-debug</name>
  <version ver="2.6.22.16" rel="0.1" epoch="0" />
  <arch>i586</arch>
      <provides><capability kind="atom" >kernel-debug == 2.6.22.16-0.1</capability>
</provides>
    <freshens><capability kind="package" >kernel-debug</capability>
</freshens>
    <requires><capability kind="package" >kernel-debug &gt;= 2.6.22.16-0.1</capability>
</requires>


  <vendor></vendor>
  <size>91162025</size>
  <archive-size>0</archive-size>
  <install-only>false</install-only>
  <build-time>1201113328</build-time>
  <install-time>1202203403</install-time>
</atom>


<atom>
  <name>kernel-syms</name>
  <version ver="2.6.22.16" rel="0.1" epoch="0" />
  <arch>ppc</arch>
      <provides><capability kind="atom" >kernel-syms == 2.6.22.16-0.1</capability>
</provides>
    <freshens><capability kind="package" >kernel-syms</capability>
</freshens>
    <requires><capability kind="package" >kernel-syms &gt;= 2.6.22.16-0.1</capability>
</requires>


  <vendor></vendor>
  <size>1508182</size>
  <archive-size>0</archive-size>
  <install-only>false</install-only>
  <build-time>1201112512</build-time>
  <install-time>1202203403</install-time>
</atom>


<atom>
  <name>kernel-syms</name>
  <version ver="2.6.22.16" rel="0.1" epoch="0" />
  <arch>x86_64</arch>
      <provides><capability kind="atom" >kernel-syms == 2.6.22.16-0.1</capability>
</provides>
    <freshens><capability kind="package" >kernel-syms</capability>
</freshens>
    <requires><capability kind="package" >kernel-syms &gt;= 2.6.22.16-0.1</capability>
</requires>


  <vendor></vendor>
  <size>2589042</size>
  <archive-size>0</archive-size>
  <install-only>false</install-only>
  <build-time>1201113962</build-time>
  <install-time>1202203403</install-time>
</atom>


<atom>
  <name>kernel-syms</name>
  <version ver="2.6.22.16" rel="0.1" epoch="0" />
  <arch>i586</arch>
      <provides><capability kind="atom" >kernel-syms == 2.6.22.16-0.1</capability>
</provides>
    <freshens><capability kind="package" >kernel-syms</capability>
</freshens>
    <requires><capability kind="package" >kernel-syms &gt;= 2.6.22.16-0.1</capability>
</requires>


  <vendor></vendor>
  <size>4391580</size>
  <archive-size>0</archive-size>
  <install-only>false</install-only>
  <build-time>1201114492</build-time>
  <install-time>1202203403</install-time>
</atom>


<atom>
  <name>kernel-xen</name>
  <version ver="2.6.22.16" rel="0.1" epoch="0" />
  <arch>i586</arch>
      <provides><capability kind="atom" >kernel-xen == 2.6.22.16-0.1</capability>
</provides>
    <freshens><capability kind="package" >kernel-xen</capability>
</freshens>
    <requires><capability kind="package" >kernel-xen &gt;= 2.6.22.16-0.1</capability>
</requires>


  <vendor></vendor>
  <size>61319120</size>
  <archive-size>0</archive-size>
  <install-only>false</install-only>
  <build-time>1201111512</build-time>
  <install-time>1202203403</install-time>
</atom>


<atom>
  <name>kernel-xen</name>
  <version ver="2.6.22.16" rel="0.1" epoch="0" />
  <arch>x86_64</arch>
      <provides><capability kind="atom" >kernel-xen == 2.6.22.16-0.1</capability>
</provides>
    <freshens><capability kind="package" >kernel-xen</capability>
</freshens>
    <requires><capability kind="package" >kernel-xen &gt;= 2.6.22.16-0.1</capability>
</requires>


  <vendor></vendor>
  <size>74902423</size>
  <archive-size>0</archive-size>
  <install-only>false</install-only>
  <build-time>1201112921</build-time>
  <install-time>1202203403</install-time>
</atom>


<atom>
  <name>kernel-rt</name>
  <version ver="2.6.22.16" rel="0.1" epoch="0" />
  <arch>x86_64</arch>
      <provides><capability kind="atom" >kernel-rt == 2.6.22.16-0.1</capability>
</provides>
    <freshens><capability kind="package" >kernel-rt</capability>
</freshens>
    <requires><capability kind="package" >kernel-rt &gt;= 2.6.22.16-0.1</capability>
</requires>


  <vendor></vendor>
  <size>97816813</size>
  <archive-size>0</archive-size>
  <install-only>false</install-only>
  <build-time>1201113842</build-time>
  <install-time>1202203403</install-time>
</atom>


<atom>
  <name>kernel-rt</name>
  <version ver="2.6.22.16" rel="0.1" epoch="0" />
  <arch>i586</arch>
      <provides><capability kind="atom" >kernel-rt == 2.6.22.16-0.1</capability>
</provides>
    <freshens><capability kind="package" >kernel-rt</capability>
</freshens>
    <requires><capability kind="package" >kernel-rt &gt;= 2.6.22.16-0.1</capability>
</requires>


  <vendor></vendor>
  <size>66062128</size>
  <archive-size>0</archive-size>
  <install-only>false</install-only>
  <build-time>1201114012</build-time>
  <install-time>1202203403</install-time>
</atom>


<atom>
  <name>kernel-rt_debug</name>
  <version ver="2.6.22.16" rel="0.1" epoch="0" />
  <arch>i586</arch>
      <provides><capability kind="atom" >kernel-rt_debug == 2.6.22.16-0.1</capability>
</provides>
    <freshens><capability kind="package" >kernel-rt_debug</capability>
</freshens>
    <requires><capability kind="package" >kernel-rt_debug &gt;= 2.6.22.16-0.1</capability>
</requires>


  <vendor></vendor>
  <size>96268638</size>
  <archive-size>0</archive-size>
  <install-only>false</install-only>
  <build-time>1201113737</build-time>
  <install-time>1202203403</install-time>
</atom>


<atom>
  <name>kernel-rt_debug</name>
  <version ver="2.6.22.16" rel="0.1" epoch="0" />
  <arch>x86_64</arch>
      <provides><capability kind="atom" >kernel-rt_debug == 2.6.22.16-0.1</capability>
</provides>
    <freshens><capability kind="package" >kernel-rt_debug</capability>
</freshens>
    <requires><capability kind="package" >kernel-rt_debug &gt;= 2.6.22.16-0.1</capability>
</requires>


  <vendor></vendor>
  <size>106757674</size>
  <archive-size>0</archive-size>
  <install-only>false</install-only>
  <build-time>1201114146</build-time>
  <install-time>1202203403</install-time>
</atom>


<atom>
  <name>kernel-ppc64</name>
  <version ver="2.6.22.16" rel="0.1" epoch="0" />
  <arch>ppc</arch>
      <provides><capability kind="atom" >kernel-ppc64 == 2.6.22.16-0.1</capability>
</provides>
    <freshens><capability kind="package" >kernel-ppc64</capability>
</freshens>
    <requires><capability kind="package" >kernel-ppc64 &gt;= 2.6.22.16-0.1</capability>
</requires>


  <vendor></vendor>
  <size>67965052</size>
  <archive-size>0</archive-size>
  <install-only>false</install-only>
  <build-time>1201111702</build-time>
  <install-time>1202203403</install-time>
</atom>


  </atoms>
</patch>

