<?xml version="1.0" encoding="UTF-8"?>
<oval_definitions
	xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
	xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
	xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
	xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
	xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
  <generator>
      <oval:product_name>Marcus OVAL Generator</oval:product_name>
      <oval:schema_version>5.5</oval:schema_version>
      <oval:timestamp>2014-10-29T05:01:05</oval:timestamp>
  </generator>
  <definitions>
<definition id="oval:org.opensuse.security:def:20070045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0045</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2007-0045" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0045" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in Adobe Acrobat Reader Plugin before 8.0.0, and possibly the plugin distributed with Adobe Reader 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2, for Mozilla Firefox, Microsoft Internet Explorer 6 SP1, Google Chrome, Opera 8.5.4 build 770, and Opera 9.10.8679 on Windows allow remote attackers to inject arbitrary JavaScript and conduct other attacks via a .pdf URL with a javascript: or res: URI with (1) FDF, (2) XML, and (3) XFDF AJAX parameters, or (4) an arbitrarily named name=URI anchor identifier, aka "Universal XSS (UXSS)."
	</description>
 </metadata>
<!-- f61699bdb8f8860c2fc03044d0d06d75 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0048</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2007-0048" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0048" source="CVE"/>
	<description>
	Adobe Acrobat Reader Plugin before 8.0.0, and possibly the plugin distributed with Adobe Reader 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2, when used with Internet Explorer, Google Chrome, or Opera, allows remote attackers to cause a denial of service (memory consumption) via a long sequence of # (hash) characters appended to a PDF URL, related to a "cross-site scripting issue."
	</description>
 </metadata>
<!-- f61699bdb8f8860c2fc03044d0d06d75 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1391</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2008-1391" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1391" source="CVE"/>
	<description>
	Multiple integer overflows in libc in NetBSD 4.x, FreeBSD 6.x and 7.x, and probably other BSD and Apple Mac OS platforms allow context-dependent attackers to execute arbitrary code via large values of certain integer fields in the format argument to (1) the strfmon function in lib/libc/stdlib/strfmon.c, related to the GET_NUMBER macro; and (2) the printf function, related to left_prec and right_prec.
	</description>
 </metadata>
<!-- 941485948dd603aa49360dbfdc7b2534 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064035" comment="glibc-devel less than 2.9-13.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064037" comment="glibc-i18ndata less than 2.9-13.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064040" comment="glibc-locale less than 2.9-13.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064043" comment="glibc less than 2.9-13.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064044" comment="nscd less than 2.9-13.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4546</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2008-4546" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4546" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows remote web servers to cause a denial of service (NULL pointer dereference and browser crash) by returning a different response when an HTTP request is sent a second time, as demonstrated by two responses that provide SWF files with different SWF version numbers.
	</description>
 </metadata>
<!-- ff2b259231f589e341c6c7f7140ebeb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0791</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-0791" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0791" source="CVE"/>
	<description>
	Multiple integer overflows in Xpdf 2.x and 3.x and Poppler 0.x, as used in the pdftops filter in CUPS 1.1.17, 1.1.22, and 1.3.7, GPdf, and kdegraphics KPDF, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file that triggers a heap-based buffer overflow, possibly related to (1) Decrypt.cxx, (2) FoFiTrueType.cxx, (3) gmem.c, (4) JBIG2Stream.cxx, and (5) PSOutputDev.cxx in pdftops/. NOTE: the JBIG2Stream.cxx vector may overlap CVE-2009-1179.
	</description>
 </metadata>
<!-- 48e5ca2e1b9b4d0b6f9923866d06734f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059412" comment="libpoppler-glib4 less than 0.11.2-1.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059413" comment="libpoppler4 less than 0.10.1-1.34.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059414" comment="libpoppler5 less than 0.11.2-1.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1185</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-1185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1185" source="CVE"/>
	<description>
	udev before 1.4.1 does not verify whether a NETLINK message originates from kernel space, which allows local users to gain privileges by sending a NETLINK message from user space.
	</description>
 </metadata>
<!-- 92dbb4d0ace1d1cd55c64d0c761455e0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058663" comment="libudev0 less than 137-1.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058664" comment="libvolume_id1 less than 137-1.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058665" comment="udev less than 137-1.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1563</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-1563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1563" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2009-0689.  Reason: This candidate is a duplicate of CVE-2009-0689.  Certain codebase relationships were not originally clear.  Notes: All CVE users should reference CVE-2009-0689 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 38f715ad96dbd30217b8c386b58d582c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056544" comment="MozillaFirefox-translations less than 3.5.4-1.1.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056545" comment="MozillaFirefox less than 3.5.4-1.1.5"/>
		</criteria>
	</criteria>
	<!-- 5ea2b34f48496b195c33aa61366830f5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056067" comment="mozilla-nspr less than 4.8.2-1.1.1"/>
	</criteria>
	<!-- b8682848527babb0d352fda06d474453 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056546" comment="mozilla-xulrunner190 less than 1.9.0.15-0.1.5"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1570</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-1570" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1570" source="CVE"/>
	<description>
	Integer overflow in the ReadImage function in plug-ins/file-bmp/bmp-read.c in GIMP 2.6.7 might allow remote attackers to execute arbitrary code via a BMP file with crafted width and height values that trigger a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 02b905d36c215a8ba0fc82a5f081a627 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059839" comment="gimp-branding-upstream less than 2.6.2-3.28.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059682" comment="gimp-lang less than 2.6.2-3.28.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059684" comment="gimp less than 2.6.2-3.28.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1571</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-1571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1571" source="CVE"/>
	<description>
	Use-after-free vulnerability in the HTML parser in Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, Thunderbird before 3.0.2, and SeaMonkey before 2.0.3 allows remote attackers to execute arbitrary code via unspecified method calls that attempt to access freed objects in low-memory situations.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 38878f0ca112bd08bb23db39873f2385 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058362" comment="mozilla-xulrunner190 less than 1.9.0.18-0.1.1"/>
	</criteria>
	<!-- bbaf689c7f86415f438417c24e8be10f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058351" comment="MozillaFirefox-translations less than 3.5.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058352" comment="MozillaFirefox less than 3.5.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058355" comment="mozilla-xulrunner191-translations less than 1.9.1.8-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058357" comment="mozilla-xulrunner191 less than 1.9.1.8-1.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2564</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-2564" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2564" source="CVE"/>
	<description>
	NOS Microsystems getPlus Download Manager, as used in Adobe Reader 1.6.2.36 and possibly other versions, Corel getPlus Download Manager before 1.5.0.48, and possibly other products, installs NOS\bin\getPlus_HelperSvc.exe with insecure permissions (Everyone:Full Control), which allows local users to gain SYSTEM privileges by replacing getPlus_HelperSvc.exe with a Trojan horse program, as demonstrated by use of getPlus Download Manager within Adobe Reader. NOTE: within Adobe Reader, the scope of this issue is limited because the program is deleted and the associated service is not automatically launched after a successful installation and reboot.
	</description>
 </metadata>
<!-- f61699bdb8f8860c2fc03044d0d06d75 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2624</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-2624" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2624" source="CVE"/>
	<description>
	The huft_build function in inflate.c in gzip before 1.3.13 creates a hufts (aka huffman) table that is too small, which allows remote attackers to cause a denial of service (application crash or infinite loop) or possibly execute arbitrary code via a crafted archive.  NOTE: this issue is caused by a CVE-2006-4334 regression.
	</description>
 </metadata>
<!-- 828062d9c095c4c47403e458060b9921 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057426" comment="gzip less than 1.3.12-69.19.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2625</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-2625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2625" source="CVE"/>
	<description>
	XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.
	</description>
 </metadata>
<!-- 2bf805d7b7621017c503f3bc95724eb2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060327" comment="libpython2_6-1_0 less than 2.6.0-8.8.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060331" comment="python-base less than 2.6.0-8.8.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060429" comment="python-devel less than 2.6.0-8.8.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060336" comment="python-tk less than 2.6.0-8.9.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060338" comment="python-xml less than 2.6.0-8.8.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060339" comment="python less than 2.6.0-8.9.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2663</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-2663" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2663" source="CVE"/>
	<description>
	libvorbis before r16182, as used in Mozilla Firefox 3.5.x before 3.5.2 and other products, allows context-dependent attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted .ogg file.
	</description>
 </metadata>
<!-- 4ba7c58faad630017107a0bb094d59f4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061093" comment="libvorbis less than 1.2.0-79.13.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2979</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-2979" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2979" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.2, 8.x before 8.1.7, and possibly 7.x through 7.1.4 do not properly perform XMP-XML entity expansion, which allows remote attackers to cause a denial of service via a crafted document.
	</description>
 </metadata>
<!-- f61699bdb8f8860c2fc03044d0d06d75 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2980</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-2980" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2980" source="CVE"/>
	<description>
	Integer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allows attackers to cause a denial of service or possibly execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- f61699bdb8f8860c2fc03044d0d06d75 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2981</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-2981" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2981" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 do not properly validate input, which might allow attackers to bypass intended Trust Manager restrictions via unspecified vectors.
	</description>
 </metadata>
<!-- f61699bdb8f8860c2fc03044d0d06d75 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2982</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-2982" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2982" source="CVE"/>
	<description>
	An unspecified certificate in Adobe Reader and Acrobat 9.x before 9.2, 8.x before 8.1.7, and possibly 7.x through 7.1.4 might allow remote attackers to conduct a "social engineering attack" via unknown vectors.
	</description>
 </metadata>
<!-- f61699bdb8f8860c2fc03044d0d06d75 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2983</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-2983" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2983" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.2, 8.x before 8.1.7, and possibly 7.x through 7.1.4 allow attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- f61699bdb8f8860c2fc03044d0d06d75 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2985</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-2985" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2985" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allow attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2009-2996.
	</description>
 </metadata>
<!-- f61699bdb8f8860c2fc03044d0d06d75 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2986</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-2986" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2986" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 might allow attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- f61699bdb8f8860c2fc03044d0d06d75 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2988</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-2988" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2988" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 do not properly validate input, which allows attackers to cause a denial of service via unspecified vectors.
	</description>
 </metadata>
<!-- f61699bdb8f8860c2fc03044d0d06d75 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2990</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-2990" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2990" source="CVE"/>
	<description>
	Array index error in Adobe Reader and Acrobat 9.x before 9.2, 8.x before 8.1.7, and possibly 7.x through 7.1.4 might allow attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- f61699bdb8f8860c2fc03044d0d06d75 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2991</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-2991" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2991" source="CVE"/>
	<description>
	Unspecified vulnerability in the Mozilla plug-in in Adobe Reader and Acrobat 8.x before 8.1.7, and possibly 7.x before 7.1.4 and 9.x before 9.2, might allow remote attackers to execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- f61699bdb8f8860c2fc03044d0d06d75 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2992</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-2992" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2992" source="CVE"/>
	<description>
	An unspecified ActiveX control in Adobe Reader and Acrobat 9.x before 9.2, 8.x before 8.1.7, and possibly 7.x through 7.1.4 does not properly validate input, which allows attackers to cause a denial of service via unknown vectors.
	</description>
 </metadata>
<!-- f61699bdb8f8860c2fc03044d0d06d75 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2993</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-2993" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2993" source="CVE"/>
	<description>
	The JavaScript for Acrobat API in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 does not properly implement the (1) Privileged Context and (2) Safe Path restrictions for unspecified JavaScript methods, which allows remote attackers to create arbitrary files, and possibly execute arbitrary code, via the cPath parameter in a crafted PDF file.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- f61699bdb8f8860c2fc03044d0d06d75 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2994</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-2994" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2994" source="CVE"/>
	<description>
	Buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 might allow attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- f61699bdb8f8860c2fc03044d0d06d75 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2996</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-2996" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2996" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allow attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2009-2985.
	</description>
 </metadata>
<!-- f61699bdb8f8860c2fc03044d0d06d75 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2997</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-2997" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2997" source="CVE"/>
	<description>
	Heap-based buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 might allow attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- f61699bdb8f8860c2fc03044d0d06d75 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2998</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-2998" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2998" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 do not properly validate input, which might allow attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2009-3458.
	</description>
 </metadata>
<!-- f61699bdb8f8860c2fc03044d0d06d75 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3245</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3245" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3245" source="CVE"/>
	<description>
	OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors.
	</description>
 </metadata>
<!-- f79a2d79216b52fb3be0ee2aca2fc09e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059250" comment="libopenssl0_9_8 less than 0.9.8h-30.22.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059252" comment="openssl less than 0.9.8h-30.22.21.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3274</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3274" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3274" source="CVE"/>
	<description>
	Mozilla Firefox 3.6a1, 3.5.3, 3.5.2, and earlier 3.5.x versions, and 3.0.14 and earlier 2.x and 3.x versions, on Linux uses a predictable /tmp pathname for files selected from the Downloads window, which allows local users to replace an arbitrary downloaded file by placing a file in a /tmp location before the download occurs, related to the Download Manager component. NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 38f715ad96dbd30217b8c386b58d582c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056544" comment="MozillaFirefox-translations less than 3.5.4-1.1.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056545" comment="MozillaFirefox less than 3.5.4-1.1.5"/>
		</criteria>
	</criteria>
	<!-- b8682848527babb0d352fda06d474453 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056546" comment="mozilla-xulrunner190 less than 1.9.0.15-0.1.5"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3297</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3297" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3297" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2010-0787, CVE-2010-0788, CVE-2010-0789.  Reason: this candidate was intended for one issue in Samba, but it was used for multiple distinct issues, including one in FUSE and one in ncpfs.  Notes: All CVE users should consult CVE-2010-0787 (Samba), CVE-2010-0788 (ncpfs), and CVE-2010-0789 (FUSE) to determine which ID is appropriate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
<!-- e1208ee0b3e4f54aee1385fee0c50f46 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060019" comment="fuse less than 2.7.2-61.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060020" comment="libfuse2 less than 2.7.2-61.18.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3370</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3370" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3370" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.15, and 3.5.x before 3.5.4, allows remote attackers to read form history by forging mouse and keyboard events that leverage the auto-fill feature to populate form fields, in an attacker-readable form, with history entries.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 38f715ad96dbd30217b8c386b58d582c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056544" comment="MozillaFirefox-translations less than 3.5.4-1.1.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056545" comment="MozillaFirefox less than 3.5.4-1.1.5"/>
		</criteria>
	</criteria>
	<!-- b8682848527babb0d352fda06d474453 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056546" comment="mozilla-xulrunner190 less than 1.9.0.15-0.1.5"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3371</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3371" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3371" source="CVE"/>
	<description>
	Use-after-free vulnerability in Mozilla Firefox 3.5.x before 3.5.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code by creating JavaScript web-workers recursively.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 38f715ad96dbd30217b8c386b58d582c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056544" comment="MozillaFirefox-translations less than 3.5.4-1.1.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056545" comment="MozillaFirefox less than 3.5.4-1.1.5"/>
		</criteria>
	</criteria>
	<!-- b8682848527babb0d352fda06d474453 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056546" comment="mozilla-xulrunner190 less than 1.9.0.15-0.1.5"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3372</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3372" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3372" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.15 and 3.5.x before 3.5.4, and SeaMonkey before 2.0, allows remote attackers to execute arbitrary code via a crafted regular expression in a Proxy Auto-configuration (PAC) file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 38f715ad96dbd30217b8c386b58d582c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056544" comment="MozillaFirefox-translations less than 3.5.4-1.1.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056545" comment="MozillaFirefox less than 3.5.4-1.1.5"/>
		</criteria>
	</criteria>
	<!-- b8682848527babb0d352fda06d474453 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056546" comment="mozilla-xulrunner190 less than 1.9.0.15-0.1.5"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3373</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3373" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3373" source="CVE"/>
	<description>
	Heap-based buffer overflow in the GIF image parser in Mozilla Firefox before 3.0.15 and 3.5.x before 3.5.4, and SeaMonkey before 2.0, allows remote attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 38f715ad96dbd30217b8c386b58d582c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056544" comment="MozillaFirefox-translations less than 3.5.4-1.1.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056545" comment="MozillaFirefox less than 3.5.4-1.1.5"/>
		</criteria>
	</criteria>
	<!-- b8682848527babb0d352fda06d474453 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056546" comment="mozilla-xulrunner190 less than 1.9.0.15-0.1.5"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3374</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3374" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3374" source="CVE"/>
	<description>
	The XPCVariant::VariantDataToJS function in the XPCOM implementation in Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4 does not enforce intended restrictions on interaction between chrome privileged code and objects obtained from remote web sites, which allows remote attackers to execute arbitrary JavaScript with chrome privileges via unspecified method calls, related to "doubly-wrapped objects."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 38f715ad96dbd30217b8c386b58d582c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056544" comment="MozillaFirefox-translations less than 3.5.4-1.1.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056545" comment="MozillaFirefox less than 3.5.4-1.1.5"/>
		</criteria>
	</criteria>
	<!-- b8682848527babb0d352fda06d474453 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056546" comment="mozilla-xulrunner190 less than 1.9.0.15-0.1.5"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3375</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3375" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3375" source="CVE"/>
	<description>
	content/html/document/src/nsHTMLDocument.cpp in Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4 allows user-assisted remote attackers to bypass the Same Origin Policy and read an arbitrary content selection via the document.getSelection function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 38f715ad96dbd30217b8c386b58d582c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056544" comment="MozillaFirefox-translations less than 3.5.4-1.1.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056545" comment="MozillaFirefox less than 3.5.4-1.1.5"/>
		</criteria>
	</criteria>
	<!-- b8682848527babb0d352fda06d474453 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056546" comment="mozilla-xulrunner190 less than 1.9.0.15-0.1.5"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3376</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3376" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3376" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.15 and 3.5.x before 3.5.4, and SeaMonkey before 2.0, does not properly handle a right-to-left override (aka RLO or U+202E) Unicode character in a download filename, which allows remote attackers to spoof file extensions via a crafted filename, as demonstrated by displaying a non-executable extension for an executable file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 38f715ad96dbd30217b8c386b58d582c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056544" comment="MozillaFirefox-translations less than 3.5.4-1.1.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056545" comment="MozillaFirefox less than 3.5.4-1.1.5"/>
		</criteria>
	</criteria>
	<!-- b8682848527babb0d352fda06d474453 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056546" comment="mozilla-xulrunner190 less than 1.9.0.15-0.1.5"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3377</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3377" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in liboggz before cf5feeaab69b05e24, as used in Mozilla Firefox 3.5.x before 3.5.4, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 38f715ad96dbd30217b8c386b58d582c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056544" comment="MozillaFirefox-translations less than 3.5.4-1.1.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056545" comment="MozillaFirefox less than 3.5.4-1.1.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3378</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3378" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3378" source="CVE"/>
	<description>
	The oggplay_data_handle_theora_frame function in media/liboggplay/src/liboggplay/oggplay_data.c in liboggplay, as used in Mozilla Firefox 3.5.x before 3.5.4, attempts to reuse an earlier frame data structure upon encountering a decoding error for the first frame, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via a crafted .ogg video file.
	</description>
 </metadata>
<!-- 38f715ad96dbd30217b8c386b58d582c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056544" comment="MozillaFirefox-translations less than 3.5.4-1.1.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056545" comment="MozillaFirefox less than 3.5.4-1.1.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3379</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3379" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3379" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in libvorbis, as used in Mozilla Firefox 3.5.x before 3.5.4, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.  NOTE: this might overlap CVE-2009-2663.
	</description>
 </metadata>
<!-- 38f715ad96dbd30217b8c386b58d582c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056544" comment="MozillaFirefox-translations less than 3.5.4-1.1.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056545" comment="MozillaFirefox less than 3.5.4-1.1.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3380</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3380" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3380" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 38f715ad96dbd30217b8c386b58d582c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056544" comment="MozillaFirefox-translations less than 3.5.4-1.1.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056545" comment="MozillaFirefox less than 3.5.4-1.1.5"/>
		</criteria>
	</criteria>
	<!-- b8682848527babb0d352fda06d474453 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056546" comment="mozilla-xulrunner190 less than 1.9.0.15-0.1.5"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3381</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3381" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3381" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 38f715ad96dbd30217b8c386b58d582c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056544" comment="MozillaFirefox-translations less than 3.5.4-1.1.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056545" comment="MozillaFirefox less than 3.5.4-1.1.5"/>
		</criteria>
	</criteria>
	<!-- b8682848527babb0d352fda06d474453 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056546" comment="mozilla-xulrunner190 less than 1.9.0.15-0.1.5"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3382</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3382" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3382" source="CVE"/>
	<description>
	layout/base/nsCSSFrameConstructor.cpp in the browser engine in Mozilla Firefox 3.0.x before 3.0.15 does not properly handle first-letter frames, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 38f715ad96dbd30217b8c386b58d582c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056544" comment="MozillaFirefox-translations less than 3.5.4-1.1.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056545" comment="MozillaFirefox less than 3.5.4-1.1.5"/>
		</criteria>
	</criteria>
	<!-- b8682848527babb0d352fda06d474453 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056546" comment="mozilla-xulrunner190 less than 1.9.0.15-0.1.5"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3383</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3383" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3383" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox 3.5.x before 3.5.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 38f715ad96dbd30217b8c386b58d582c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056544" comment="MozillaFirefox-translations less than 3.5.4-1.1.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056545" comment="MozillaFirefox less than 3.5.4-1.1.5"/>
		</criteria>
	</criteria>
	<!-- b8682848527babb0d352fda06d474453 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056546" comment="mozilla-xulrunner190 less than 1.9.0.15-0.1.5"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3388</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3388" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3388" source="CVE"/>
	<description>
	liboggplay in Mozilla Firefox 3.5.x before 3.5.6 and SeaMonkey before 2.0.1 might allow context-dependent attackers to cause a denial of service (application crash) or execute arbitrary code via unspecified vectors, related to "memory safety issues."
	</description>
 </metadata>
<!-- 8fa945ac74bac1ab3f1dafec4ebf8552 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056886" comment="MozillaFirefox-translations less than 3.5.6-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056887" comment="MozillaFirefox less than 3.5.6-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056890" comment="mozilla-xulrunner191-translations less than 1.9.1.6-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056892" comment="mozilla-xulrunner191 less than 1.9.1.6-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3389</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3389" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3389" source="CVE"/>
	<description>
	Integer overflow in libtheora in Xiph.Org Theora before 1.1, as used in Mozilla Firefox 3.5 before 3.5.6 and SeaMonkey before 2.0.1, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a video with large dimensions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 166333aafc37e966c14ca313e064604b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059266" comment="libtheora0 less than 1.0.beta2-6.1.1"/>
	</criteria>
	<!-- 8fa945ac74bac1ab3f1dafec4ebf8552 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056886" comment="MozillaFirefox-translations less than 3.5.6-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056887" comment="MozillaFirefox less than 3.5.6-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056890" comment="mozilla-xulrunner191-translations less than 1.9.1.6-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056892" comment="mozilla-xulrunner191 less than 1.9.1.6-1.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3431</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3431" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3431" source="CVE"/>
	<description>
	Stack consumption vulnerability in Adobe Reader and Acrobat 9.1.3, 9.1.2, 9.1.1, and earlier 9.x versions; 8.1.6 and earlier 8.x versions; and possibly 7.1.4 and earlier 7.x versions allows remote attackers to cause a denial of service (application crash) via a PDF file with a large number of [ (open square bracket) characters in the argument to the alert method. NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- f61699bdb8f8860c2fc03044d0d06d75 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3458</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3458" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 do not properly validate input, which might allow attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2009-2998.
	</description>
 </metadata>
<!-- f61699bdb8f8860c2fc03044d0d06d75 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3459</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3459" source="CVE"/>
	<description>
	Heap-based buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allows remote attackers to execute arbitrary code via a crafted PDF file that triggers memory corruption, as exploited in the wild in October 2009. NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- f61699bdb8f8860c2fc03044d0d06d75 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3462</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3462" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3462" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 on Unix, when Debug mode is enabled, allow attackers to execute arbitrary code via unspecified vectors, related to a "format bug."
	</description>
 </metadata>
<!-- f61699bdb8f8860c2fc03044d0d06d75 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055727" comment="acroread less than 8.1.7-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3547</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
		<platform>SUSE Linux Enterprise 11 Moblin 2.0 for Samsung</platform>
	</affected>
	<reference ref_id="CVE-2009-3547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3547" source="CVE"/>
	<description>
	Multiple race conditions in fs/pipe.c in the Linux kernel before 2.6.32-rc6 allow local users to cause a denial of service (NULL pointer dereference and system crash) or gain privileges by attempting to open an anonymous pipe via a /proc/*/fd/ pathname.
	</description>
 </metadata>
<!-- e31c09fcfa22a0e461b7ff08c916f549 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059489" comment="kernel-default-base less than 2.6.30.10-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059490" comment="kernel-default-extra less than 2.6.30.10-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059491" comment="kernel-default less than 2.6.30.10-0.1.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20-samsung is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059538" comment="samsung-atheros-kmp-default less than 001_2.6.30.10_0.1-0.1.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3553</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3553" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3553" source="CVE"/>
	<description>
	Use-after-free vulnerability in the abstract file-descriptor handling interface in the cupsdDoSelect function in scheduler/select.c in the scheduler in cupsd in CUPS 1.3.7 and 1.3.10 allows remote attackers to cause a denial of service (daemon crash or hang) via a client disconnection during listing of a large number of print jobs, related to improperly maintaining a reference count.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b02f431a416bb35ff2050cda8d0dfc97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059827" comment="cups-client less than 1.3.9-8.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059828" comment="cups-libs less than 1.3.9-8.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059829" comment="cups less than 1.3.9-8.35.1"/>
		</criteria>
	</criteria>
	<!-- c29b67566461e8f02f2ecf9bb8c86800 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059084" comment="cups-client less than 1.3.9-8.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059085" comment="cups-libs less than 1.3.9-8.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059086" comment="cups less than 1.3.9-8.33.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3555</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555" source="CVE"/>
	<description>
	The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4ce70591574c803658a0a92c20de4b63 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056256" comment="compat-openssl097g less than 0.9.7g-146.16.1"/>
	</criteria>
	<!-- 59e94b754d1196ca0394a3c196e11465 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059417" comment="libfreebl3 less than 3.12.6-3.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059421" comment="mozilla-nss less than 3.12.6-3.1.1"/>
		</criteria>
	</criteria>
	<!-- 5da82c909246893c2a98c691f453f073 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
		</criteria>
	</criteria>
	<!-- 7b9d9b0dd5ed590f2715f8868f4732dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056250" comment="libopenssl0_9_8 less than 0.9.8h-30.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056252" comment="openssl less than 0.9.8h-30.15.1"/>
		</criteria>
	</criteria>
	<!-- 967e63d7b4d343bbaee8eb52744d027e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060388" comment="MozillaFirefox-translations less than 3.5.9-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060389" comment="MozillaFirefox less than 3.5.9-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060390" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060391" comment="mozilla-xulrunner191 less than 1.9.1.9-1.1.3"/>
		</criteria>
	</criteria>
	<!-- f79a2d79216b52fb3be0ee2aca2fc09e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059250" comment="libopenssl0_9_8 less than 0.9.8h-30.22.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059252" comment="openssl less than 0.9.8h-30.22.21.1"/>
		</criteria>
	</criteria>
	<!-- f8248d477df844609e0c3494130b2824 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065171" comment="gnutls less than 2.4.1-24.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065189" comment="libgnutls-extra26 less than 2.4.1-24.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065174" comment="libgnutls26 less than 2.4.1-24.32.1"/>
		</criteria>
	</criteria>
	<!-- fc0765457ba828c2c540af38e7849649 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059481" comment="mozilla-xulrunner190 less than 1.9.0.19-0.1.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3560</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3560" source="CVE"/>
	<description>
	The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.
	</description>
 </metadata>
<!-- 2bf805d7b7621017c503f3bc95724eb2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060327" comment="libpython2_6-1_0 less than 2.6.0-8.8.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060331" comment="python-base less than 2.6.0-8.8.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060429" comment="python-devel less than 2.6.0-8.8.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060336" comment="python-tk less than 2.6.0-8.9.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060338" comment="python-xml less than 2.6.0-8.8.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060339" comment="python less than 2.6.0-8.9.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3563</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3563" source="CVE"/>
	<description>
	ntp_request.c in ntpd in NTP before 4.2.4p8, and 4.2.5, allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by using MODE_PRIVATE to send a spoofed (1) request or (2) response packet that triggers a continuous exchange of MODE_PRIVATE error responses between two NTP daemons.
	</description>
 </metadata>
<!-- 4f9c38eff31b5a253ae2f706612ab22c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057190" comment="ntp less than 4.2.4p6-1.18.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3607</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3607" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3607" source="CVE"/>
	<description>
	Integer overflow in the create_surface_from_thumbnail_data function in glib/poppler-page.cc in Poppler 0.x allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 48e5ca2e1b9b4d0b6f9923866d06734f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059412" comment="libpoppler-glib4 less than 0.11.2-1.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059413" comment="libpoppler4 less than 0.10.1-1.34.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059414" comment="libpoppler5 less than 0.11.2-1.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3608</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3608" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3608" source="CVE"/>
	<description>
	Integer overflow in the ObjectStream::ObjectStream function in XRef.cc in Xpdf 3.x before 3.02pl4 and Poppler before 0.12.1, as used in GPdf, kdegraphics KPDF, CUPS pdftops, and teTeX, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 48e5ca2e1b9b4d0b6f9923866d06734f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059412" comment="libpoppler-glib4 less than 0.11.2-1.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059413" comment="libpoppler4 less than 0.10.1-1.34.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059414" comment="libpoppler5 less than 0.11.2-1.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3624</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
		<platform>SUSE Linux Enterprise 11 Moblin 2.0 for Samsung</platform>
	</affected>
	<reference ref_id="CVE-2009-3624" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3624" source="CVE"/>
	<description>
	The get_instantiation_keyring function in security/keys/keyctl.c in the KEYS subsystem in the Linux kernel before 2.6.32-rc5 does not properly maintain the reference count of a keyring, which allows local users to gain privileges or cause a denial of service (OOPS) via vectors involving calls to this function without specifying a keyring by ID, as demonstrated by a series of keyctl request2 and keyctl list commands.
	</description>
 </metadata>
<!-- e31c09fcfa22a0e461b7ff08c916f549 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059489" comment="kernel-default-base less than 2.6.30.10-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059490" comment="kernel-default-extra less than 2.6.30.10-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059491" comment="kernel-default less than 2.6.30.10-0.1.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20-samsung is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059538" comment="samsung-atheros-kmp-default less than 001_2.6.30.10_0.1-0.1.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3720</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3720" source="CVE"/>
	<description>
	The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2bf805d7b7621017c503f3bc95724eb2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060327" comment="libpython2_6-1_0 less than 2.6.0-8.8.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060331" comment="python-base less than 2.6.0-8.8.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060429" comment="python-devel less than 2.6.0-8.8.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060336" comment="python-tk less than 2.6.0-8.9.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060338" comment="python-xml less than 2.6.0-8.8.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060339" comment="python less than 2.6.0-8.9.1.1"/>
		</criteria>
	</criteria>
	<!-- 6baadff8dcbb3b48054d9cfe396e05f2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056327" comment="expat less than 2.0.1-88.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056330" comment="libexpat1 less than 2.0.1-88.22.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3736</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3736" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3736" source="CVE"/>
	<description>
	ltdl.c in libltdl in GNU Libtool 1.5.x, and 2.2.6 before 2.2.6b, as used in Ham Radio Control Libraries, Q, and possibly other products, attempts to open a .la file in the current working directory, which allows local users to gain privileges via a Trojan horse file.
	</description>
 </metadata>
<!-- 36aff6518839e7aac5846cc7fea82024 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057091" comment="libltdl7 less than 2.2.6-2.131.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057094" comment="libtool less than 2.2.6-2.131.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3793</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3793" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3793" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory consumption) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- ff2b259231f589e341c6c7f7140ebeb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3794</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3794" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3794" source="CVE"/>
	<description>
	Heap-based buffer overflow in Adobe Flash Player before 10.0.42.34 and Adobe AIR before 1.5.3 allows remote attackers to execute arbitrary code via crafted dimensions of JPEG data in an SWF file.
	</description>
 </metadata>
<!-- d3973606782793641029b999a11c061c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056910" comment="flash-player less than 10.0.42.34-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3796</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3796" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3796" source="CVE"/>
	<description>
	Adobe Flash Player before 10.0.42.34 and Adobe AIR before 1.5.3 might allow attackers to execute arbitrary code via unspecified vectors, related to a "data injection vulnerability."
	</description>
 </metadata>
<!-- d3973606782793641029b999a11c061c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056910" comment="flash-player less than 10.0.42.34-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3797</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3797" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3797" source="CVE"/>
	<description>
	Adobe Flash Player 10.x before 10.0.42.34 and Adobe AIR before 1.5.3 might allow attackers to execute arbitrary code via unspecified vectors that trigger memory corruption.
	</description>
 </metadata>
<!-- d3973606782793641029b999a11c061c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056910" comment="flash-player less than 10.0.42.34-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3798</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3798" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3798" source="CVE"/>
	<description>
	Adobe Flash Player before 10.0.42.34 and Adobe AIR before 1.5.3 might allow attackers to execute arbitrary code via unspecified vectors that trigger memory corruption.
	</description>
 </metadata>
<!-- d3973606782793641029b999a11c061c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056910" comment="flash-player less than 10.0.42.34-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3799</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3799" source="CVE"/>
	<description>
	Integer overflow in the Verifier::parseExceptionHandlers function in Adobe Flash Player before 10.0.42.34 and Adobe AIR before 1.5.3 allows remote attackers to execute arbitrary code via an SWF file with a large exception_count value that triggers memory corruption, related to "generation of ActionScript exception handlers."
	</description>
 </metadata>
<!-- d3973606782793641029b999a11c061c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056910" comment="flash-player less than 10.0.42.34-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3800</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3800" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Adobe Flash Player before 10.0.42.34 and Adobe AIR before 1.5.3 allow attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- d3973606782793641029b999a11c061c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056910" comment="flash-player less than 10.0.42.34-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3864</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3864" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3864" source="CVE"/>
	<description>
	The Java Update functionality in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22 and JDK and JRE 6 before Update 17, when a non-English version of Windows is used, does not retrieve available new JRE versions, which allows remote attackers to leverage vulnerabilities in older releases of this software, aka Bug Id 6869694.
	</description>
 </metadata>
<!-- 8cabd8b1492691adba459d54ece899f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056295" comment="java-1_6_0-sun-plugin less than 1.6.0.u17-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056297" comment="java-1_6_0-sun less than 1.6.0.u17-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3865</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3865" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3865" source="CVE"/>
	<description>
	The launch method in the Deployment Toolkit plugin in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 6 before Update 17 allows remote attackers to execute arbitrary commands via a crafted web page, aka Bug Id 6869752.
	</description>
 </metadata>
<!-- 8cabd8b1492691adba459d54ece899f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056295" comment="java-1_6_0-sun-plugin less than 1.6.0.u17-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056297" comment="java-1_6_0-sun less than 1.6.0.u17-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3866</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3866" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3866" source="CVE"/>
	<description>
	The Java Web Start Installer in Sun Java SE in JDK and JRE 6 before Update 17 does not properly use security model permissions when removing installer extensions, which allows remote attackers to execute arbitrary code by modifying a certain JNLP file to have a URL field that points to an unintended trusted application, aka Bug Id 6872824.
	</description>
 </metadata>
<!-- 8cabd8b1492691adba459d54ece899f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056295" comment="java-1_6_0-sun-plugin less than 1.6.0.u17-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056297" comment="java-1_6_0-sun less than 1.6.0.u17-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3867</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3867" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3867" source="CVE"/>
	<description>
	Stack-based buffer overflow in the HsbParser.getSoundBank function in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a long file: URL in an argument, aka Bug Id 6854303.
	</description>
 </metadata>
<!-- 8cabd8b1492691adba459d54ece899f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056295" comment="java-1_6_0-sun-plugin less than 1.6.0.u17-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056297" comment="java-1_6_0-sun less than 1.6.0.u17-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3868</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3868" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3868" source="CVE"/>
	<description>
	Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 does not properly parse color profiles, which allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862970.
	</description>
 </metadata>
<!-- 8cabd8b1492691adba459d54ece899f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056295" comment="java-1_6_0-sun-plugin less than 1.6.0.u17-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056297" comment="java-1_6_0-sun less than 1.6.0.u17-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3869</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3869" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3869" source="CVE"/>
	<description>
	Stack-based buffer overflow in the setDiffICM function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a crafted argument, aka Bug Id 6872357.
	</description>
 </metadata>
<!-- 8cabd8b1492691adba459d54ece899f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056295" comment="java-1_6_0-sun-plugin less than 1.6.0.u17-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056297" comment="java-1_6_0-sun less than 1.6.0.u17-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3871</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3871" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3871" source="CVE"/>
	<description>
	Heap-based buffer overflow in the setBytePixels function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via crafted arguments, aka Bug Id 6872358.
	</description>
 </metadata>
<!-- 8cabd8b1492691adba459d54ece899f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056295" comment="java-1_6_0-sun-plugin less than 1.6.0.u17-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056297" comment="java-1_6_0-sun less than 1.6.0.u17-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3872</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3872" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3872" source="CVE"/>
	<description>
	Unspecified vulnerability in the JPEG JFIF Decoder in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862969.
	</description>
 </metadata>
<!-- 8cabd8b1492691adba459d54ece899f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056295" comment="java-1_6_0-sun-plugin less than 1.6.0.u17-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056297" comment="java-1_6_0-sun less than 1.6.0.u17-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3873</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3873" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3873" source="CVE"/>
	<description>
	The JPEG Image Writer in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, related to a "quantization problem," aka Bug Id 6862968.
	</description>
 </metadata>
<!-- 8cabd8b1492691adba459d54ece899f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056295" comment="java-1_6_0-sun-plugin less than 1.6.0.u17-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056297" comment="java-1_6_0-sun less than 1.6.0.u17-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3874</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3874" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3874" source="CVE"/>
	<description>
	Integer overflow in the JPEGImageReader implementation in the ImageI/O component in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via large subsample dimensions in a JPEG file that triggers a heap-based buffer overflow, aka Bug Id 6874643.
	</description>
 </metadata>
<!-- 8cabd8b1492691adba459d54ece899f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056295" comment="java-1_6_0-sun-plugin less than 1.6.0.u17-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056297" comment="java-1_6_0-sun less than 1.6.0.u17-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3875</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3875" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3875" source="CVE"/>
	<description>
	The MessageDigest.isEqual function in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to spoof HMAC-based digital signatures, and possibly bypass authentication, via unspecified vectors related to "timing attack vulnerabilities," aka Bug Id 6863503.
	</description>
 </metadata>
<!-- 8cabd8b1492691adba459d54ece899f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056295" comment="java-1_6_0-sun-plugin less than 1.6.0.u17-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056297" comment="java-1_6_0-sun less than 1.6.0.u17-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3876</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3876" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3876" source="CVE"/>
	<description>
	Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted DER encoded data, which is not properly decoded by the ASN.1 DER input stream parser, aka Bug Id 6864911.
	</description>
 </metadata>
<!-- 8cabd8b1492691adba459d54ece899f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056295" comment="java-1_6_0-sun-plugin less than 1.6.0.u17-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056297" comment="java-1_6_0-sun less than 1.6.0.u17-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3877</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3877" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3877" source="CVE"/>
	<description>
	Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted HTTP headers, which are not properly parsed by the ASN.1 DER input stream parser, aka Bug Id 6864911.
	</description>
 </metadata>
<!-- 8cabd8b1492691adba459d54ece899f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056295" comment="java-1_6_0-sun-plugin less than 1.6.0.u17-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056297" comment="java-1_6_0-sun less than 1.6.0.u17-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3909</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3909" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3909" source="CVE"/>
	<description>
	Integer overflow in the read_channel_data function in plug-ins/file-psd/psd-load.c in GIMP 2.6.7 might allow remote attackers to execute arbitrary code via a crafted PSD file that triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 02b905d36c215a8ba0fc82a5f081a627 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059839" comment="gimp-branding-upstream less than 2.6.2-3.28.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059682" comment="gimp-lang less than 2.6.2-3.28.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059684" comment="gimp less than 2.6.2-3.28.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3938</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3938" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3938" source="CVE"/>
	<description>
	Buffer overflow in the ABWOutputDev::endWord function in poppler/ABWOutputDev.cc in Poppler (aka libpoppler) 0.10.6, 0.12.0, and possibly other versions, as used by the Abiword pdftoabw utility, allows user-assisted remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted PDF file.
	</description>
 </metadata>
<!-- 48e5ca2e1b9b4d0b6f9923866d06734f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059412" comment="libpoppler-glib4 less than 0.11.2-1.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059413" comment="libpoppler4 less than 0.10.1-1.34.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059414" comment="libpoppler5 less than 0.11.2-1.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3951</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3951" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3951" source="CVE"/>
	<description>
	Unspecified vulnerability in the Flash Player ActiveX control in Adobe Flash Player before 10.0.42.34 and Adobe AIR before 1.5.3 on Windows allows remote attackers to obtain the names of local files via unknown vectors.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4820.
	</description>
 </metadata>
<!-- d3973606782793641029b999a11c061c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056910" comment="flash-player less than 10.0.42.34-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3953</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3953" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3953" source="CVE"/>
	<description>
	The U3D implementation in Adobe Reader and Acrobat 9.x before 9.3, 8.x before 8.2 on Windows and Mac OS X, and 7.x before 7.1.4 allows remote attackers to execute arbitrary code via malformed U3D data in a PDF document, related to a CLODProgressiveMeshDeclaration "array boundary issue," a different vulnerability than CVE-2009-2994.
	</description>
 </metadata>
<!-- b6c393b7824be70f6fe978da077b8735 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057440" comment="acroread less than 9.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3954</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3954" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3954" source="CVE"/>
	<description>
	The 3D implementation in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, might allow attackers to execute arbitrary code via unspecified vectors, related to a "DLL-loading vulnerability."
	</description>
 </metadata>
<!-- b6c393b7824be70f6fe978da077b8735 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057440" comment="acroread less than 9.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3955</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3955" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3955" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted JPC_MS_RGN marker in the Jp2c stream of a JpxDecode encoded data stream, which triggers an integer sign extension that bypasses a sanity check, leading to memory corruption.
	</description>
 </metadata>
<!-- b6c393b7824be70f6fe978da077b8735 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057440" comment="acroread less than 9.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3956</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3956" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3956" source="CVE"/>
	<description>
	The default configuration of Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, does not enable the Enhanced Security feature, which has unspecified impact and attack vectors, related to a "script injection vulnerability," as demonstrated by Acrobat Forms Data Format (FDF) behavior that allows cross-site scripting (XSS) by user-assisted remote attackers.
	</description>
 </metadata>
<!-- b6c393b7824be70f6fe978da077b8735 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057440" comment="acroread less than 9.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3957</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3957" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3957" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, might allow attackers to cause a denial of service (NULL pointer dereference) via unspecified vectors.
	</description>
 </metadata>
<!-- b6c393b7824be70f6fe978da077b8735 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057440" comment="acroread less than 9.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3958</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3958" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3958" source="CVE"/>
	<description>
	Multiple stack-based buffer overflows in the NOS Microsystems getPlus Helper ActiveX control before 1.6.2.49 in gp.ocx in the Download Manager in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, might allow remote attackers to execute arbitrary code via unspecified initialization parameters.
	</description>
 </metadata>
<!-- b6c393b7824be70f6fe978da077b8735 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057440" comment="acroread less than 9.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3959</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3959" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3959" source="CVE"/>
	<description>
	Integer overflow in the U3D implementation in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a malformed PDF document.
	</description>
 </metadata>
<!-- b6c393b7824be70f6fe978da077b8735 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057440" comment="acroread less than 9.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3979</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3979" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3979" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8fa945ac74bac1ab3f1dafec4ebf8552 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056886" comment="MozillaFirefox-translations less than 3.5.6-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056887" comment="MozillaFirefox less than 3.5.6-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056890" comment="mozilla-xulrunner191-translations less than 1.9.1.6-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056892" comment="mozilla-xulrunner191 less than 1.9.1.6-1.1.1"/>
		</criteria>
	</criteria>
	<!-- eeb33fc58ff5e205aac13507f83c30b2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056897" comment="mozilla-xulrunner190 less than 1.9.0.16-0.1.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3980</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3980" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3980" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 8fa945ac74bac1ab3f1dafec4ebf8552 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056886" comment="MozillaFirefox-translations less than 3.5.6-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056887" comment="MozillaFirefox less than 3.5.6-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056890" comment="mozilla-xulrunner191-translations less than 1.9.1.6-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056892" comment="mozilla-xulrunner191 less than 1.9.1.6-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3981</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3981" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3981" source="CVE"/>
	<description>
	Unspecified vulnerability in the browser engine in Mozilla Firefox before 3.0.16, SeaMonkey before 2.0.1, and Thunderbird allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- eeb33fc58ff5e205aac13507f83c30b2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056897" comment="mozilla-xulrunner190 less than 1.9.0.16-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3982</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3982" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3982" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 8fa945ac74bac1ab3f1dafec4ebf8552 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056886" comment="MozillaFirefox-translations less than 3.5.6-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056887" comment="MozillaFirefox less than 3.5.6-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056890" comment="mozilla-xulrunner191-translations less than 1.9.1.6-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056892" comment="mozilla-xulrunner191 less than 1.9.1.6-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3983</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3983" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3983" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to send authenticated requests to arbitrary applications by replaying the NTLM credentials of a browser user.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8fa945ac74bac1ab3f1dafec4ebf8552 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056886" comment="MozillaFirefox-translations less than 3.5.6-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056887" comment="MozillaFirefox less than 3.5.6-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056890" comment="mozilla-xulrunner191-translations less than 1.9.1.6-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056892" comment="mozilla-xulrunner191 less than 1.9.1.6-1.1.1"/>
		</criteria>
	</criteria>
	<!-- eeb33fc58ff5e205aac13507f83c30b2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056897" comment="mozilla-xulrunner190 less than 1.9.0.16-0.1.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3984</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3984" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3984" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to spoof an SSL indicator for an http URL or a file URL by setting document.location to an https URL corresponding to a site that responds with a No Content (aka 204) status code and an empty body.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8fa945ac74bac1ab3f1dafec4ebf8552 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056886" comment="MozillaFirefox-translations less than 3.5.6-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056887" comment="MozillaFirefox less than 3.5.6-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056890" comment="mozilla-xulrunner191-translations less than 1.9.1.6-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056892" comment="mozilla-xulrunner191 less than 1.9.1.6-1.1.1"/>
		</criteria>
	</criteria>
	<!-- eeb33fc58ff5e205aac13507f83c30b2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056897" comment="mozilla-xulrunner190 less than 1.9.0.16-0.1.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3985</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3985" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3985" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to associate spoofed content with an invalid URL by setting document.location to this URL, and then writing arbitrary web script or HTML to the associated blank document, a related issue to CVE-2009-2654.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8fa945ac74bac1ab3f1dafec4ebf8552 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056886" comment="MozillaFirefox-translations less than 3.5.6-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056887" comment="MozillaFirefox less than 3.5.6-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056890" comment="mozilla-xulrunner191-translations less than 1.9.1.6-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056892" comment="mozilla-xulrunner191 less than 1.9.1.6-1.1.1"/>
		</criteria>
	</criteria>
	<!-- eeb33fc58ff5e205aac13507f83c30b2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056897" comment="mozilla-xulrunner190 less than 1.9.0.16-0.1.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3986</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3986" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3986" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to execute arbitrary JavaScript with chrome privileges by leveraging a reference to a chrome window from a content window, related to the window.opener property.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8fa945ac74bac1ab3f1dafec4ebf8552 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056886" comment="MozillaFirefox-translations less than 3.5.6-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056887" comment="MozillaFirefox less than 3.5.6-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056890" comment="mozilla-xulrunner191-translations less than 1.9.1.6-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056892" comment="mozilla-xulrunner191 less than 1.9.1.6-1.1.1"/>
		</criteria>
	</criteria>
	<!-- eeb33fc58ff5e205aac13507f83c30b2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056897" comment="mozilla-xulrunner190 less than 1.9.0.16-0.1.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3988</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-3988" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3988" source="CVE"/>
	<description>
	Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, and SeaMonkey before 2.0.3, does not properly restrict read access to object properties in showModalDialog, which allows remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via crafted dialogArguments values.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 38878f0ca112bd08bb23db39873f2385 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058362" comment="mozilla-xulrunner190 less than 1.9.0.18-0.1.1"/>
	</criteria>
	<!-- bbaf689c7f86415f438417c24e8be10f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058351" comment="MozillaFirefox-translations less than 3.5.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058352" comment="MozillaFirefox less than 3.5.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058355" comment="mozilla-xulrunner191-translations less than 1.9.1.8-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058357" comment="mozilla-xulrunner191 less than 1.9.1.8-1.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4035</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-4035" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4035" source="CVE"/>
	<description>
	The FoFiType1::parse function in fofi/FoFiType1.cc in Xpdf 3.0.0, gpdf 2.8.2, kpdf in kdegraphics 3.3.1, and possibly other libraries and versions, does not check the return value of the getNextLine function, which allows context-dependent attackers to execute arbitrary code via a PDF file with a crafted Type 1 font that can produce a negative value, leading to a signed-to-unsigned integer conversion error and a buffer overflow.
	</description>
 </metadata>
<!-- 48e5ca2e1b9b4d0b6f9923866d06734f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059412" comment="libpoppler-glib4 less than 0.11.2-1.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059413" comment="libpoppler4 less than 0.10.1-1.34.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059414" comment="libpoppler5 less than 0.11.2-1.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4141</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-4141" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4141" source="CVE"/>
	<description>
	Use-after-free vulnerability in the fasync_helper function in fs/fcntl.c in the Linux kernel before 2.6.33-rc4-git1 allows local users to gain privileges via vectors that include enabling O_ASYNC (aka FASYNC or FIOASYNC) on a locked file, and then closing this file.
	</description>
 </metadata>
<!-- 7a0ee2d33a0089ed5676f747bc494914 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060317" comment="kernel-default-base less than 2.6.30.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060318" comment="kernel-default-extra less than 2.6.30.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060319" comment="kernel-default less than 2.6.30.10-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4270</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-4270" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4270" source="CVE"/>
	<description>
	Stack-based buffer overflow in the errprintf function in base/gsmisc.c in ghostscript 8.64 through 8.70 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PDF file, as originally reported for debug logging code in gdevcups.c in the CUPS output driver.
	</description>
 </metadata>
<!-- 3390448cc6a00ec004d6e6c8bbe206a4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061860" comment="ghostscript-fonts-other less than 8.62-32.27.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061862" comment="ghostscript-fonts-std less than 8.62-32.27.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061863" comment="ghostscript-library less than 8.62-32.27.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061865" comment="ghostscript-x11 less than 8.62-32.27.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061866" comment="libgimpprint less than 4.2.7-32.27.26.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4274</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-4274" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4274" source="CVE"/>
	<description>
	Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value.
	</description>
 </metadata>
<!-- fc41477aac22f11a5d1b1b7c3e49bfaa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058587" comment="libnetpbm10 less than 10.26.44-101.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058588" comment="netpbm less than 10.26.44-101.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4324</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-4324" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4324" source="CVE"/>
	<description>
	Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted PDF file using ZLib compressed streams, as exploited in the wild in December 2009.
	</description>
 </metadata>
<!-- b6c393b7824be70f6fe978da077b8735 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057440" comment="acroread less than 9.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4410</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
		<platform>SUSE Linux Enterprise 11 Moblin 2.0 for Samsung</platform>
	</affected>
	<reference ref_id="CVE-2009-4410" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4410" source="CVE"/>
	<description>
	The fuse_ioctl_copy_user function in the ioctl handler in fs/fuse/file.c in the Linux kernel 2.6.29-rc1 through 2.6.30.y uses the wrong variable in an argument to the kunmap function, which allows local users to cause a denial of service (panic) via unknown vectors.
	</description>
 </metadata>
<!-- e31c09fcfa22a0e461b7ff08c916f549 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059489" comment="kernel-default-base less than 2.6.30.10-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059490" comment="kernel-default-extra less than 2.6.30.10-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059491" comment="kernel-default less than 2.6.30.10-0.1.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20-samsung is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059538" comment="samsung-atheros-kmp-default less than 001_2.6.30.10_0.1-0.1.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4897</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2009-4897" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4897" source="CVE"/>
	<description>
	Buffer overflow in gs/psi/iscan.c in Ghostscript 8.64 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDF document containing a long name.
	</description>
 </metadata>
<!-- 3390448cc6a00ec004d6e6c8bbe206a4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061860" comment="ghostscript-fonts-other less than 8.62-32.27.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061862" comment="ghostscript-fonts-std less than 8.62-32.27.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061863" comment="ghostscript-library less than 8.62-32.27.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061865" comment="ghostscript-x11 less than 8.62-32.27.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061866" comment="libgimpprint less than 4.2.7-32.27.26.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0001</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0001" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0001" source="CVE"/>
	<description>
	Integer underflow in the unlzw function in unlzw.c in gzip before 1.4 on 64-bit platforms, as used in ncompress and probably others, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted archive that uses LZW compression, leading to an array index error.
	</description>
 </metadata>
<!-- 828062d9c095c4c47403e458060b9921 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057426" comment="gzip less than 1.3.12-69.19.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0003</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
		<platform>SUSE Linux Enterprise 11 Moblin 2.0 for Samsung</platform>
	</affected>
	<reference ref_id="CVE-2010-0003" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0003" source="CVE"/>
	<description>
	The print_fatal_signal function in kernel/signal.c in the Linux kernel before 2.6.32.4 on the i386 platform, when print-fatal-signals is enabled, allows local users to discover the contents of arbitrary memory locations by jumping to an address and then reading a log file, and might allow local users to cause a denial of service (system slowdown or crash) by jumping to an address.
	</description>
 </metadata>
<!-- e31c09fcfa22a0e461b7ff08c916f549 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059489" comment="kernel-default-base less than 2.6.30.10-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059490" comment="kernel-default-extra less than 2.6.30.10-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059491" comment="kernel-default less than 2.6.30.10-0.1.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20-samsung is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059538" comment="samsung-atheros-kmp-default less than 001_2.6.30.10_0.1-0.1.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0007</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
		<platform>SUSE Linux Enterprise 11 Moblin 2.0 for Samsung</platform>
	</affected>
	<reference ref_id="CVE-2010-0007" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0007" source="CVE"/>
	<description>
	net/bridge/netfilter/ebtables.c in the ebtables module in the netfilter framework in the Linux kernel before 2.6.33-rc4 does not require the CAP_NET_ADMIN capability for setting or modifying rules, which allows local users to bypass intended access restrictions and configure arbitrary network-traffic filtering via a modified ebtables application.
	</description>
 </metadata>
<!-- e31c09fcfa22a0e461b7ff08c916f549 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059489" comment="kernel-default-base less than 2.6.30.10-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059490" comment="kernel-default-extra less than 2.6.30.10-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059491" comment="kernel-default less than 2.6.30.10-0.1.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20-samsung is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059538" comment="samsung-atheros-kmp-default less than 001_2.6.30.10_0.1-0.1.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0013</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0013" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0013" source="CVE"/>
	<description>
	Directory traversal vulnerability in slp.c in the MSN protocol plugin in libpurple in Pidgin 2.6.4 and Adium 1.3.8 allows remote attackers to read arbitrary files via a .. (dot dot) in an application/x-msnmsgrp2p MSN emoticon (aka custom smiley) request, a related issue to CVE-2004-0122.  NOTE: it could be argued that this is resultant from a vulnerability in which an emoticon download request is processed even without a preceding text/x-mms-emoticon message that announced availability of the emoticon.
	</description>
 </metadata>
<!-- 0f7b9918b676b852a59ba533b2929b24 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058565" comment="libpurple-lang less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058568" comment="libpurple less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058570" comment="pidgin less than 2.6.6-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0015</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0015" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0015" source="CVE"/>
	<description>
	nis/nss_nis/nis-pwd.c in the GNU C Library (aka glibc or libc6) 2.7 and Embedded GLIBC (EGLIBC) 2.10.2 adds information from the passwd.adjunct.byname map to entries in the passwd map, which allows remote attackers to obtain the encrypted passwords of NIS accounts by calling the getpwnam function.
	</description>
 </metadata>
<!-- 941485948dd603aa49360dbfdc7b2534 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064035" comment="glibc-devel less than 2.9-13.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064037" comment="glibc-i18ndata less than 2.9-13.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064040" comment="glibc-locale less than 2.9-13.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064043" comment="glibc less than 2.9-13.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064044" comment="nscd less than 2.9-13.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0159</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0159" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0159" source="CVE"/>
	<description>
	The browser engine in Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, Thunderbird before 3.0.2, and SeaMonkey before 2.0.3 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the nsBlockFrame::StealFrame function in layout/generic/nsBlockFrame.cpp, and unspecified other vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 38878f0ca112bd08bb23db39873f2385 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058362" comment="mozilla-xulrunner190 less than 1.9.0.18-0.1.1"/>
	</criteria>
	<!-- bbaf689c7f86415f438417c24e8be10f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058351" comment="MozillaFirefox-translations less than 3.5.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058352" comment="MozillaFirefox less than 3.5.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058355" comment="mozilla-xulrunner191-translations less than 1.9.1.8-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058357" comment="mozilla-xulrunner191 less than 1.9.1.8-1.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0160</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0160" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0160" source="CVE"/>
	<description>
	The Web Worker functionality in Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, and SeaMonkey before 2.0.3, does not properly handle array data types for posted messages, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 38878f0ca112bd08bb23db39873f2385 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058362" comment="mozilla-xulrunner190 less than 1.9.0.18-0.1.1"/>
	</criteria>
	<!-- bbaf689c7f86415f438417c24e8be10f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058351" comment="MozillaFirefox-translations less than 3.5.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058352" comment="MozillaFirefox less than 3.5.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058355" comment="mozilla-xulrunner191-translations less than 1.9.1.8-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058357" comment="mozilla-xulrunner191 less than 1.9.1.8-1.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0162</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0162" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0162" source="CVE"/>
	<description>
	Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, and SeaMonkey before 2.0.3, does not properly support the application/octet-stream content type as a protection mechanism against execution of web script in certain circumstances involving SVG and the EMBED element, which allows remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via an embedded SVG document.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 38878f0ca112bd08bb23db39873f2385 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058362" comment="mozilla-xulrunner190 less than 1.9.0.18-0.1.1"/>
	</criteria>
	<!-- bbaf689c7f86415f438417c24e8be10f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058351" comment="MozillaFirefox-translations less than 3.5.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058352" comment="MozillaFirefox less than 3.5.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058355" comment="mozilla-xulrunner191-translations less than 1.9.1.8-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058357" comment="mozilla-xulrunner191 less than 1.9.1.8-1.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0173</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0173" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0173" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.5.9 and 3.6.x before 3.6.2, Thunderbird before 3.0.4, and SeaMonkey before 2.0.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 967e63d7b4d343bbaee8eb52744d027e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060388" comment="MozillaFirefox-translations less than 3.5.9-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060389" comment="MozillaFirefox less than 3.5.9-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060390" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060391" comment="mozilla-xulrunner191 less than 1.9.1.9-1.1.3"/>
		</criteria>
	</criteria>
	<!-- fc0765457ba828c2c540af38e7849649 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059481" comment="mozilla-xulrunner190 less than 1.9.0.19-0.1.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0174</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0174" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2; Thunderbird before 3.0.4; and SeaMonkey before 2.0.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 967e63d7b4d343bbaee8eb52744d027e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060388" comment="MozillaFirefox-translations less than 3.5.9-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060389" comment="MozillaFirefox less than 3.5.9-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060390" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060391" comment="mozilla-xulrunner191 less than 1.9.1.9-1.1.3"/>
		</criteria>
	</criteria>
	<!-- fc0765457ba828c2c540af38e7849649 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059481" comment="mozilla-xulrunner190 less than 1.9.0.19-0.1.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0175</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0175" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0175" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsTreeSelection implementation in Mozilla Firefox before 3.0.19 and 3.5.x before 3.5.9, Thunderbird before 3.0.4, and SeaMonkey before 2.0.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors that trigger a call to the handler for the select event for XUL tree items.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 967e63d7b4d343bbaee8eb52744d027e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060388" comment="MozillaFirefox-translations less than 3.5.9-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060389" comment="MozillaFirefox less than 3.5.9-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060390" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060391" comment="mozilla-xulrunner191 less than 1.9.1.9-1.1.3"/>
		</criteria>
	</criteria>
	<!-- fc0765457ba828c2c540af38e7849649 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059481" comment="mozilla-xulrunner190 less than 1.9.0.19-0.1.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0176</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0176" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0176" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2; Thunderbird before 3.0.4; and SeaMonkey before 2.0.4 do not properly manage reference counts for option elements in a XUL tree optgroup, which might allow remote attackers to execute arbitrary code via unspecified vectors that trigger access to deleted elements, related to a "dangling pointer vulnerability."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 967e63d7b4d343bbaee8eb52744d027e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060388" comment="MozillaFirefox-translations less than 3.5.9-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060389" comment="MozillaFirefox less than 3.5.9-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060390" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060391" comment="mozilla-xulrunner191 less than 1.9.1.9-1.1.3"/>
		</criteria>
	</criteria>
	<!-- fc0765457ba828c2c540af38e7849649 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059481" comment="mozilla-xulrunner190 less than 1.9.0.19-0.1.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0177</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0177" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2, and SeaMonkey before 2.0.4, frees the contents of the window.navigator.plugins array while a reference to an array element is still active, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors, related to a "dangling pointer vulnerability."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 967e63d7b4d343bbaee8eb52744d027e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060388" comment="MozillaFirefox-translations less than 3.5.9-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060389" comment="MozillaFirefox less than 3.5.9-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060390" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060391" comment="mozilla-xulrunner191 less than 1.9.1.9-1.1.3"/>
		</criteria>
	</criteria>
	<!-- fc0765457ba828c2c540af38e7849649 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059481" comment="mozilla-xulrunner190 less than 1.9.0.19-0.1.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0178</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0178" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0178" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2, and SeaMonkey before 2.0.4, does not prevent applets from interpreting mouse clicks as drag-and-drop actions, which allows remote attackers to execute arbitrary JavaScript with Chrome privileges by loading a chrome: URL and then loading a javascript: URL.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 967e63d7b4d343bbaee8eb52744d027e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060388" comment="MozillaFirefox-translations less than 3.5.9-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060389" comment="MozillaFirefox less than 3.5.9-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060390" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060391" comment="mozilla-xulrunner191 less than 1.9.1.9-1.1.3"/>
		</criteria>
	</criteria>
	<!-- fc0765457ba828c2c540af38e7849649 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059481" comment="mozilla-xulrunner190 less than 1.9.0.19-0.1.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0179</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0179" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.19 and 3.5.x before 3.5.8, and SeaMonkey before 2.0.3, when the XMLHttpRequestSpy module in the Firebug add-on is used, does not properly handle interaction between the XMLHttpRequestSpy object and chrome privileged objects, which allows remote attackers to execute arbitrary JavaScript via a crafted HTTP response.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 967e63d7b4d343bbaee8eb52744d027e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060388" comment="MozillaFirefox-translations less than 3.5.9-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060389" comment="MozillaFirefox less than 3.5.9-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060390" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060391" comment="mozilla-xulrunner191 less than 1.9.1.9-1.1.3"/>
		</criteria>
	</criteria>
	<!-- fc0765457ba828c2c540af38e7849649 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059481" comment="mozilla-xulrunner190 less than 1.9.0.19-0.1.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0181</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0181" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0181" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.9 and 3.6.x before 3.6.2, and SeaMonkey before 2.0.4, executes a mail application in situations where an IMG element has a SRC attribute that is a redirect to a mailto: URL, which allows remote attackers to cause a denial of service (excessive application launches) via an HTML document with many images.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 967e63d7b4d343bbaee8eb52744d027e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060388" comment="MozillaFirefox-translations less than 3.5.9-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060389" comment="MozillaFirefox less than 3.5.9-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060390" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060391" comment="mozilla-xulrunner191 less than 1.9.1.9-1.1.3"/>
		</criteria>
	</criteria>
	<!-- fc0765457ba828c2c540af38e7849649 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059481" comment="mozilla-xulrunner190 less than 1.9.0.19-0.1.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0182</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0182" source="CVE"/>
	<description>
	The XMLDocument::load function in Mozilla Firefox before 3.5.9 and 3.6.x before 3.6.2, Thunderbird before 3.0.4, and SeaMonkey before 2.0.4 does not perform the expected nsIContentPolicy checks during loading of content by XML documents, which allows attackers to bypass intended access restrictions via crafted content.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 967e63d7b4d343bbaee8eb52744d027e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060388" comment="MozillaFirefox-translations less than 3.5.9-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060389" comment="MozillaFirefox less than 3.5.9-0.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060390" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.1.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060391" comment="mozilla-xulrunner191 less than 1.9.1.9-1.1.3"/>
		</criteria>
	</criteria>
	<!-- fc0765457ba828c2c540af38e7849649 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059481" comment="mozilla-xulrunner190 less than 1.9.0.19-0.1.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0186</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0186" source="CVE"/>
	<description>
	Cross-domain vulnerability in Adobe Flash Player before 10.0.45.2, Adobe AIR before 1.5.3.9130, and Adobe Reader and Acrobat 8.x before 8.2.1 and 9.x before 9.3.1 allows remote attackers to bypass intended sandbox restrictions and make cross-domain requests via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1c514b18c3221bf83a2e2b1ea5fbb25c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057994" comment="flash-player less than 10.0.45.2-0.1.1"/>
	</criteria>
	<!-- 6c17a25a07706fe512088868fc355c33 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058548" comment="acroread less than 9.3.1-0.1.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0187</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0187" source="CVE"/>
	<description>
	Adobe Flash Player before 10.0.45.2 and Adobe AIR before 1.5.3.9130 allow remote attackers to cause a denial of service (application crash) via a modified SWF file.
	</description>
 </metadata>
<!-- 1c514b18c3221bf83a2e2b1ea5fbb25c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057994" comment="flash-player less than 10.0.45.2-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0188</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0188" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 8.x before 8.2.1 and 9.x before 9.3.1 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 6c17a25a07706fe512088868fc355c33 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058548" comment="acroread less than 9.3.1-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0190</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0190" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0190" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
	</description>
 </metadata>
<!-- c2c1eae9cd8e1651c429898f9e749c71 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0191</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0191" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allow attackers to execute arbitrary code via unspecified vectors, related to a "prefix protocol handler vulnerability."
	</description>
 </metadata>
<!-- c2c1eae9cd8e1651c429898f9e749c71 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0192</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0192" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0192" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows attackers to cause a denial of service or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2010-0193 and CVE-2010-0196.
	</description>
 </metadata>
<!-- c2c1eae9cd8e1651c429898f9e749c71 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0193</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0193" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0193" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows attackers to cause a denial of service or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2010-0192 and CVE-2010-0196.
	</description>
 </metadata>
<!-- c2c1eae9cd8e1651c429898f9e749c71 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0194</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0194" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0194" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allow attackers to cause a denial of service (memory corruption) or execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-0197, CVE-2010-0201, and CVE-2010-0204.
	</description>
 </metadata>
<!-- c2c1eae9cd8e1651c429898f9e749c71 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0195</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0195" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0195" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, do not properly handle fonts, which allows attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- c2c1eae9cd8e1651c429898f9e749c71 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0196</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0196" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows attackers to cause a denial of service or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2010-0192 and CVE-2010-0193.
	</description>
 </metadata>
<!-- c2c1eae9cd8e1651c429898f9e749c71 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0197</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0197" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0197" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allow attackers to cause a denial of service (memory corruption) or execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-0194, CVE-2010-0201, and CVE-2010-0204.
	</description>
 </metadata>
<!-- c2c1eae9cd8e1651c429898f9e749c71 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0198</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0198" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0198" source="CVE"/>
	<description>
	Buffer overflow in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-0199, CVE-2010-0202, and CVE-2010-0203.
	</description>
 </metadata>
<!-- c2c1eae9cd8e1651c429898f9e749c71 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0199</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0199" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0199" source="CVE"/>
	<description>
	Buffer overflow in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-0198, CVE-2010-0202, and CVE-2010-0203.
	</description>
 </metadata>
<!-- c2c1eae9cd8e1651c429898f9e749c71 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0201</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0201" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0201" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allow attackers to cause a denial of service (memory corruption) or execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-0194, CVE-2010-0197, and CVE-2010-0204.
	</description>
 </metadata>
<!-- c2c1eae9cd8e1651c429898f9e749c71 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0202</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0202" source="CVE"/>
	<description>
	Buffer overflow in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-0198, CVE-2010-0199, and CVE-2010-0203.
	</description>
 </metadata>
<!-- c2c1eae9cd8e1651c429898f9e749c71 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0203</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0203" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0203" source="CVE"/>
	<description>
	Buffer overflow in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-0198, CVE-2010-0199, and CVE-2010-0202.
	</description>
 </metadata>
<!-- c2c1eae9cd8e1651c429898f9e749c71 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0204</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0204" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0204" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allow attackers to cause a denial of service (memory corruption) or execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-0194, CVE-2010-0197, and CVE-2010-0201.
	</description>
 </metadata>
<!-- c2c1eae9cd8e1651c429898f9e749c71 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0205</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0205" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0205" source="CVE"/>
	<description>
	The png_decompress_chunk function in pngrutil.c in libpng 1.0.x before 1.0.53, 1.2.x before 1.2.43, and 1.4.x before 1.4.1 does not properly handle compressed ancillary-chunk data that has a disproportionately large uncompressed representation, which allows remote attackers to cause a denial of service (memory and CPU consumption, and application hang) via a crafted PNG file, as demonstrated by use of the deflate compression method on data composed of many occurrences of the same character, related to a "decompression bomb" attack.
	</description>
 </metadata>
<!-- 3048f05e26227c46c409b535db877e26 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060275" comment="libpng12-0 less than 1.2.39-1.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0209</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0209" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0209" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.280 and 10.x before 10.1.82.76, and Adobe AIR before 2.0.3, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2213, CVE-2010-2214, and CVE-2010-2216.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 46d098cd785a4681e350feaa94db5739 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061978" comment="flash-player less than 10.1.82.76-0.1.1"/>
	</criteria>
	<!-- ff131746c2523fc154dbc928397c7bc6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062207" comment="acroread less than 9.3.4-0.6.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0220</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0220" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0220" source="CVE"/>
	<description>
	The nsObserverList::FillObserverArray function in xpcom/ds/nsObserverList.cpp in Mozilla Firefox before 3.5.7 allows remote attackers to cause a denial of service (application crash) via a crafted web site that triggers memory consumption and an accompanying Low Memory alert dialog, and also triggers attempted removal of an observer from an empty observers array.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 77419c0cd60fac7cfc4337f7cf5333f9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057542" comment="MozillaFirefox-translations less than 3.5.7-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057543" comment="MozillaFirefox less than 3.5.7-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057546" comment="mozilla-xulrunner191-translations less than 1.9.1.7-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057548" comment="mozilla-xulrunner191 less than 1.9.1.7-1.1.1"/>
		</criteria>
	</criteria>
	<!-- d926b913c14cd4eac4ae89a8e4602ba6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057541" comment="mozilla-xulrunner190 less than 1.9.0.17-0.1.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0277</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0277" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0277" source="CVE"/>
	<description>
	slp.c in the MSN protocol plugin in libpurple in Pidgin before 2.6.6, including 2.6.4, and Adium 1.3.8 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed MSNSLP INVITE request in an SLP message, a different issue than CVE-2010-0013.
	</description>
 </metadata>
<!-- 0f7b9918b676b852a59ba533b2929b24 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058565" comment="libpurple-lang less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058568" comment="libpurple less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058570" comment="pidgin less than 2.6.6-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0296</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0296" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0296" source="CVE"/>
	<description>
	The encode_name macro in misc/mntent_r.c in the GNU C Library (aka glibc or libc6) 2.11.1 and earlier, as used by ncpmount and mount.cifs, does not properly handle newline characters in mountpoint names, which allows local users to cause a denial of service (mtab corruption), or possibly modify mount options and gain privileges, via a crafted mount request.
	</description>
 </metadata>
<!-- 941485948dd603aa49360dbfdc7b2534 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064035" comment="glibc-devel less than 2.9-13.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064037" comment="glibc-i18ndata less than 2.9-13.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064040" comment="glibc-locale less than 2.9-13.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064043" comment="glibc less than 2.9-13.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064044" comment="nscd less than 2.9-13.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0299</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
		<platform>SUSE Linux Enterprise 11 Moblin 2.0 for Samsung</platform>
	</affected>
	<reference ref_id="CVE-2010-0299" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0299" source="CVE"/>
	<description>
	openSUSE 11.2 installs the devtmpfs root directory with insecure permissions (1777), which allows local users to gain privileges via unspecified vectors.
	</description>
 </metadata>
<!-- e31c09fcfa22a0e461b7ff08c916f549 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059489" comment="kernel-default-base less than 2.6.30.10-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059490" comment="kernel-default-extra less than 2.6.30.10-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059491" comment="kernel-default less than 2.6.30.10-0.1.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20-samsung is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059538" comment="samsung-atheros-kmp-default less than 001_2.6.30.10_0.1-0.1.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0302</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0302" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0302" source="CVE"/>
	<description>
	Use-after-free vulnerability in the abstract file-descriptor handling interface in the cupsdDoSelect function in scheduler/select.c in the scheduler in cupsd in CUPS before 1.4.4, when kqueue or epoll is used, allows remote attackers to cause a denial of service (daemon crash or hang) via a client disconnection during listing of a large number of print jobs, related to improperly maintaining a reference count. NOTE: some of these details are obtained from third party information. NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-3553.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b02f431a416bb35ff2050cda8d0dfc97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059827" comment="cups-client less than 1.3.9-8.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059828" comment="cups-libs less than 1.3.9-8.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059829" comment="cups less than 1.3.9-8.35.1"/>
		</criteria>
	</criteria>
	<!-- c29b67566461e8f02f2ecf9bb8c86800 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059084" comment="cups-client less than 1.3.9-8.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059085" comment="cups-libs less than 1.3.9-8.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059086" comment="cups less than 1.3.9-8.33.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0393</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0393" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0393" source="CVE"/>
	<description>
	The _cupsGetlang function, as used by lppasswd.c in lppasswd in CUPS 1.2.2, 1.3.7, 1.3.9, and 1.4.1, relies on an environment variable to determine the file that provides localized message strings, which allows local users to gain privileges via a file that contains crafted localization data with format string specifiers.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b02f431a416bb35ff2050cda8d0dfc97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059827" comment="cups-client less than 1.3.9-8.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059828" comment="cups-libs less than 1.3.9-8.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059829" comment="cups less than 1.3.9-8.35.1"/>
		</criteria>
	</criteria>
	<!-- c29b67566461e8f02f2ecf9bb8c86800 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059084" comment="cups-client less than 1.3.9-8.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059085" comment="cups-libs less than 1.3.9-8.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059086" comment="cups less than 1.3.9-8.33.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0395</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0395" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0395" source="CVE"/>
	<description>
	OpenOffice.org 2.x and 3.0 before 3.2.1 allows user-assisted remote attackers to bypass Python macro security restrictions and execute arbitrary Python code via a crafted OpenDocument Text (ODT) file that triggers code execution when the macro directory structure is previewed.
	</description>
 </metadata>
<!-- 4461ed41fc8c7e7cd0a1c9f2db949938 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061649" comment="OpenOffice_org-base-extensions less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061567" comment="OpenOffice_org-base less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061435" comment="OpenOffice_org-branding-SLED less than 3.2.1-1.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061650" comment="OpenOffice_org-calc-extensions less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061570" comment="OpenOffice_org-calc less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061572" comment="OpenOffice_org-components less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061652" comment="OpenOffice_org-draw-extensions less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061573" comment="OpenOffice_org-draw less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061575" comment="OpenOffice_org-filters-optional less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061576" comment="OpenOffice_org-filters less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061577" comment="OpenOffice_org-gnome less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061598" comment="OpenOffice_org-icon-themes less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061656" comment="OpenOffice_org-impress-extensions less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061600" comment="OpenOffice_org-impress less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061607" comment="OpenOffice_org-l10n-de less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061608" comment="OpenOffice_org-l10n-el less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061609" comment="OpenOffice_org-l10n-en-GB less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061610" comment="OpenOffice_org-l10n-es less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061612" comment="OpenOffice_org-l10n-extras less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061613" comment="OpenOffice_org-l10n-fi less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061614" comment="OpenOffice_org-l10n-fr less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061616" comment="OpenOffice_org-l10n-it less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061617" comment="OpenOffice_org-l10n-ja less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061659" comment="OpenOffice_org-l10n-ko less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061619" comment="OpenOffice_org-l10n-nl less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061621" comment="OpenOffice_org-l10n-pl less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061622" comment="OpenOffice_org-l10n-pt-BR less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061623" comment="OpenOffice_org-l10n-pt less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061624" comment="OpenOffice_org-l10n-ru less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061626" comment="OpenOffice_org-l10n-sv less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061628" comment="OpenOffice_org-l10n-zh-CN less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061629" comment="OpenOffice_org-l10n-zh-TW less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061632" comment="OpenOffice_org-libs-core less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061634" comment="OpenOffice_org-libs-extern less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061636" comment="OpenOffice_org-libs-gui less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061638" comment="OpenOffice_org-math less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061644" comment="OpenOffice_org-ure less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061660" comment="OpenOffice_org-writer-extensions less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061646" comment="OpenOffice_org-writer less than 3.2.1.4-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061647" comment="OpenOffice_org less than 3.2.1.4-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0405</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0405" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0405" source="CVE"/>
	<description>
	Integer overflow in the BZ2_decompress function in decompress.c in bzip2 and libbzip2 before 1.0.6 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted compressed file.
	</description>
 </metadata>
<!-- 1fb48b3ceb38bd165e8e7371fb3eecfa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063185" comment="bzip2 less than 1.0.5-34.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063188" comment="libbz2-1 less than 1.0.5-34.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0407</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0407" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0407" source="CVE"/>
	<description>
	Multiple buffer overflows in the MSGFunctionDemarshall function in winscard_svc.c in the PC/SC Smart Card daemon (aka PCSCD) in MUSCLE PCSC-Lite before 1.5.4 allow local users to gain privileges via crafted message data, which is improperly demarshalled.
	</description>
 </metadata>
<!-- 2bb7eee963eed18d5ce34d5e466feecc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063350" comment="pcsc-lite less than 1.4.102-1.31.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0420</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0420" source="CVE"/>
	<description>
	libpurple in Finch in Pidgin before 2.6.6, when an XMPP multi-user chat (MUC) room is used, does not properly parse nicknames containing &lt;br&gt; sequences, which allows remote attackers to cause a denial of service (application crash) via a crafted nickname.
	</description>
 </metadata>
<!-- 0f7b9918b676b852a59ba533b2929b24 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058565" comment="libpurple-lang less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058568" comment="libpurple less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058570" comment="pidgin less than 2.6.6-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0423</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0423" source="CVE"/>
	<description>
	gtkimhtml.c in Pidgin before 2.6.6 allows remote attackers to cause a denial of service (CPU consumption and application hang) by sending many smileys in a (1) IM or (2) chat.
	</description>
 </metadata>
<!-- 0f7b9918b676b852a59ba533b2929b24 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058565" comment="libpurple-lang less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058568" comment="libpurple less than 2.6.6-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058570" comment="pidgin less than 2.6.6-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0424</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0424" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0424" source="CVE"/>
	<description>
	The edit_cmd function in crontab.c in (1) cronie before 1.4.4 and (2) Vixie cron (vixie-cron) allows local users to change the modification times of arbitrary files, and consequently cause a denial of service, via a symlink attack on a temporary file in the /tmp directory.
	</description>
 </metadata>
<!-- 7b18e63928de422028b43039783696c0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058917" comment="cron less than 4.1-194.19.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0426</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0426" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0426" source="CVE"/>
	<description>
	sudo 1.6.x before 1.6.9p21 and 1.7.x before 1.7.2p4, when a pseudo-command is enabled, permits a match between the name of the pseudo-command and the name of an executable file in an arbitrary directory, which allows local users to gain privileges via a crafted executable file, as demonstrated by a file named sudoedit in a user's home directory.
	</description>
 </metadata>
<!-- 5cd30fb3c02b9076a39672e407f0336e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058612" comment="sudo less than 1.6.9p17-21.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0427</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0427" source="CVE"/>
	<description>
	sudo 1.6.x before 1.6.9p21, when the runas_default option is used, does not properly set group memberships, which allows local users to gain privileges via a sudo command.
	</description>
 </metadata>
<!-- 5cd30fb3c02b9076a39672e407f0336e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058612" comment="sudo less than 1.6.9p17-21.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0547</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0547" source="CVE"/>
	<description>
	client/mount.cifs.c in mount.cifs in smbfs in Samba 3.4.5 and earlier does not verify that the (1) device name and (2) mountpoint strings are composed of valid characters, which allows local users to cause a denial of service (mtab corruption) via a crafted string.
	</description>
 </metadata>
<!-- 27ebe0c922b0b2b9272cff3cd24b57d7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060901" comment="cifs-mount less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060905" comment="libsmbclient0 less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060908" comment="libtalloc1 less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060911" comment="libtdb1 less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060914" comment="libwbclient0 less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060918" comment="samba-client less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060924" comment="samba less than 3.2.7-11.20.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0787</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0787" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0787" source="CVE"/>
	<description>
	client/mount.cifs.c in mount.cifs in smbfs in Samba 3.0.22, 3.0.28a, 3.2.3, 3.3.2, 3.4.0, and 3.4.5 allows local users to mount a CIFS share on an arbitrary mountpoint, and gain privileges, via a symlink attack on the mountpoint directory file.
	</description>
 </metadata>
<!-- 27ebe0c922b0b2b9272cff3cd24b57d7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060901" comment="cifs-mount less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060905" comment="libsmbclient0 less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060908" comment="libtalloc1 less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060911" comment="libtdb1 less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060914" comment="libwbclient0 less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060918" comment="samba-client less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060924" comment="samba less than 3.2.7-11.20.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0830</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0830" source="CVE"/>
	<description>
	Integer signedness error in the elf_get_dynamic_info function in elf/dynamic-link.h in ld.so in the GNU C Library (aka glibc or libc6) 2.0.1 through 2.11.1, when the --verify option is used, allows user-assisted remote attackers to execute arbitrary code via a crafted ELF program with a negative value for a certain d_tag structure member in the ELF header.
	</description>
 </metadata>
<!-- 941485948dd603aa49360dbfdc7b2534 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064035" comment="glibc-devel less than 2.9-13.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064037" comment="glibc-i18ndata less than 2.9-13.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064040" comment="glibc-locale less than 2.9-13.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064043" comment="glibc less than 2.9-13.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064044" comment="nscd less than 2.9-13.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0887</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0887" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0887" source="CVE"/>
	<description>
	Unspecified vulnerability in the New Java Plug-in component in Oracle Java SE and Java for Business JDK and JRE 6 Update 18 and 19 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
<!-- 600395ed7a15ac8fe61eff033ca5b95b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059812" comment="java-1_6_0-sun-plugin less than 1.6.0.u20-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059814" comment="java-1_6_0-sun less than 1.6.0.u20-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0926</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-0926" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0926" source="CVE"/>
	<description>
	The default configuration of smbd in Samba before 3.3.11, 3.4.x before 3.4.6, and 3.5.x before 3.5.0rc3, when a writable share exists, allows remote authenticated users to leverage a directory traversal vulnerability, and access arbitrary files, by using the symlink command in smbclient to create a symlink containing .. (dot dot) sequences, related to the combination of the unix extensions and wide links options.
	</description>
 </metadata>
<!-- 27ebe0c922b0b2b9272cff3cd24b57d7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060901" comment="cifs-mount less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060905" comment="libsmbclient0 less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060908" comment="libtalloc1 less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060911" comment="libtdb1 less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060914" comment="libwbclient0 less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060918" comment="samba-client less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060924" comment="samba less than 3.2.7-11.20.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1166</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-1166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1166" source="CVE"/>
	<description>
	The fbComposite function in fbpict.c in the Render extension in the X server in X.Org X11R7.1 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted request, related to an incorrect macro definition.
	</description>
 </metadata>
<!-- d90f97d6f63f9617287b21cb16984455 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064534" comment="xorg-x11-Xvnc less than 7.4-27.28.31.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064535" comment="xorg-x11-server-extra less than 7.4-27.28.31.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064536" comment="xorg-x11-server less than 7.4-27.28.31.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1205</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-1205" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1205" source="CVE"/>
	<description>
	Buffer overflow in pngpread.c in libpng before 1.2.44 and 1.4.x before 1.4.3, as used in progressive applications, might allow remote attackers to execute arbitrary code via a PNG image that triggers an additional data row.
	</description>
 </metadata>
<!-- f1d44e52ed863f9a43344baf83cf06a1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060316" comment="libpng12-0 less than 1.2.39-1.4.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1240</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-1240" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1240" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, do not restrict the contents of one text field in the Launch File warning dialog, which makes it easier for remote attackers to trick users into executing an arbitrary local program that was specified in a PDF document, as demonstrated by a text field that claims that the Open button will enable the user to read an encrypted message.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- f113326c15d8ae9ed3c574d1b80f3231 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061132" comment="acroread less than 9.3.3-0.1.1"/>
	</criteria>
	<!-- ff131746c2523fc154dbc928397c7bc6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062207" comment="acroread less than 9.3.4-0.6.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1241</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-1241" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1241" source="CVE"/>
	<description>
	Heap-based buffer overflow in the custom heap management system in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDF document, aka FG-VD-10-005.
	</description>
 </metadata>
<!-- c2c1eae9cd8e1651c429898f9e749c71 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059801" comment="acroread less than 9.3.2-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1285</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-1285" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1285" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code via unspecified manipulations involving the newclass (0x58) operator and an "invalid pointer vulnerability" that triggers memory corruption, a different vulnerability than CVE-2010-2168 and CVE-2010-2201.
	</description>
 </metadata>
<!-- f113326c15d8ae9ed3c574d1b80f3231 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061132" comment="acroread less than 9.3.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1295</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-1295" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1295" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2202, CVE-2010-2207, CVE-2010-2209, CVE-2010-2210, CVE-2010-2211, and CVE-2010-2212.
	</description>
 </metadata>
<!-- f113326c15d8ae9ed3c574d1b80f3231 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061132" comment="acroread less than 9.3.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1297</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-1297" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1297" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64; Adobe AIR before 2.0.2.12610; and Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted SWF content, related to authplay.dll and the ActionScript Virtual Machine 2 (AVM2) newfunction instruction, as exploited in the wild in June 2010.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- f113326c15d8ae9ed3c574d1b80f3231 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061132" comment="acroread less than 9.3.3-0.1.1"/>
	</criteria>
	<!-- ff2b259231f589e341c6c7f7140ebeb0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1321</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-1321" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1321" source="CVE"/>
	<description>
	The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator's checksum field is missing.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5da82c909246893c2a98c691f453f073 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
		</criteria>
	</criteria>
	<!-- bbbf97ad9b4b27780422024424ecea69 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060716" comment="krb5 less than 1.6.3-133.33.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1323</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-1323" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1323" source="CVE"/>
	<description>
	MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys.
	</description>
 </metadata>
<!-- 8c39e04f2651c635b8532d7a17fb25e1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064613" comment="krb5 less than 1.6.3-133.39.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1324</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-1324" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1324" source="CVE"/>
	<description>
	MIT Kerberos 5 (aka krb5) 1.7.x and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to forge GSS tokens, gain privileges, or have unspecified other impact via (1) an unkeyed checksum, (2) an unkeyed PAC checksum, or (3) a KrbFastArmoredReq checksum based on an RC4 key.
	</description>
 </metadata>
<!-- 8c39e04f2651c635b8532d7a17fb25e1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064613" comment="krb5 less than 1.6.3-133.39.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1628</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-1628" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1628" source="CVE"/>
	<description>
	Ghostscript 8.64, 8.70, and possibly other versions allows context-dependent attackers to execute arbitrary code via a PostScript file containing unlimited recursive procedure invocations, which trigger memory corruption in the stack of the interpreter.
	</description>
 </metadata>
<!-- 3390448cc6a00ec004d6e6c8bbe206a4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061860" comment="ghostscript-fonts-other less than 8.62-32.27.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061862" comment="ghostscript-fonts-std less than 8.62-32.27.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061863" comment="ghostscript-library less than 8.62-32.27.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061865" comment="ghostscript-x11 less than 8.62-32.27.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061866" comment="libgimpprint less than 4.2.7-32.27.26.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1797</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-1797" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1797" source="CVE"/>
	<description>
	Multiple stack-based buffer overflows in the cff_decoder_parse_charstrings function in the CFF Type2 CharStrings interpreter in cff/cffgload.c in FreeType before 2.4.2, as used in Apple iOS before 4.0.2 on the iPhone and iPod touch and before 3.2.2 on the iPad, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted CFF opcodes in embedded fonts in a PDF document, as demonstrated by JailbreakMe. NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 32e278d12a649367b744e41d94159945 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062065" comment="freetype2 less than 2.3.7-25.11.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1869</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-1869" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1869" source="CVE"/>
	<description>
	Stack-based buffer overflow in the parser function in GhostScript 8.70 and 8.64 allows context-dependent attackers to execute arbitrary code via a crafted PostScript file.
	</description>
 </metadata>
<!-- 3390448cc6a00ec004d6e6c8bbe206a4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061860" comment="ghostscript-fonts-other less than 8.62-32.27.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061862" comment="ghostscript-fonts-std less than 8.62-32.27.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061863" comment="ghostscript-library less than 8.62-32.27.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061865" comment="ghostscript-x11 less than 8.62-32.27.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061866" comment="libgimpprint less than 4.2.7-32.27.26.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2055</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2055" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2055" source="CVE"/>
	<description>
	Ghostscript 8.71 and earlier reads initialization files from the current working directory, which allows local users to execute arbitrary PostScript commands via a Trojan horse file, related to improper support for the -P- option to the gs program, as demonstrated using gs_init.ps, a different vulnerability than CVE-2010-4820.
	</description>
 </metadata>
<!-- 3390448cc6a00ec004d6e6c8bbe206a4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061860" comment="ghostscript-fonts-other less than 8.62-32.27.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061862" comment="ghostscript-fonts-std less than 8.62-32.27.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061863" comment="ghostscript-library less than 8.62-32.27.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061865" comment="ghostscript-x11 less than 8.62-32.27.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061866" comment="libgimpprint less than 4.2.7-32.27.26.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2063</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2063" source="CVE"/>
	<description>
	Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x before 3.3.13 allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted field in a packet.
	</description>
 </metadata>
<!-- 27ebe0c922b0b2b9272cff3cd24b57d7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060901" comment="cifs-mount less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060905" comment="libsmbclient0 less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060908" comment="libtalloc1 less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060911" comment="libtdb1 less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060914" comment="libwbclient0 less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060918" comment="samba-client less than 3.2.7-11.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060924" comment="samba less than 3.2.7-11.20.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2160</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2160" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2160" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via an invalid offset in an unspecified undocumented opcode in ActionScript Virtual Machine 2, related to getouterscope, a different vulnerability than CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188.
	</description>
 </metadata>
<!-- ff2b259231f589e341c6c7f7140ebeb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2161</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2161" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2161" source="CVE"/>
	<description>
	Array index error in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified "types of Adobe Flash code."
	</description>
 </metadata>
<!-- ff2b259231f589e341c6c7f7140ebeb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2162</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2162" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2162" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (heap memory corruption) or possibly execute arbitrary code via vectors related to improper length calculation and the (1) STSC, (2) STSZ, and (3) STCO atoms.
	</description>
 </metadata>
<!-- ff2b259231f589e341c6c7f7140ebeb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2163</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2163" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2163" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- ff2b259231f589e341c6c7f7140ebeb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2164</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2164" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2164" source="CVE"/>
	<description>
	Use-after-free vulnerability in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors related to an unspecified "image type within a certain function."
	</description>
 </metadata>
<!-- ff2b259231f589e341c6c7f7140ebeb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2165</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2165" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2165" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188.
	</description>
 </metadata>
<!-- ff2b259231f589e341c6c7f7140ebeb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2166</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2166" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188.
	</description>
 </metadata>
<!-- ff2b259231f589e341c6c7f7140ebeb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2167</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2167" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2167" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors related to malformed (1) GIF or (2) JPEG data.
	</description>
 </metadata>
<!-- ff2b259231f589e341c6c7f7140ebeb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2168</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2168" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2168" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code via a PDF file with crafted Flash content, involving the newfunction (0x44) operator and an "invalid pointer vulnerability" that triggers memory corruption, a different vulnerability than CVE-2010-1285 and CVE-2010-2201.
	</description>
 </metadata>
<!-- f113326c15d8ae9ed3c574d1b80f3231 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061132" comment="acroread less than 9.3.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2169</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2169" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allow attackers to cause a denial of service (pointer memory corruption) or possibly execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- ff2b259231f589e341c6c7f7140ebeb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2170</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2170" source="CVE"/>
	<description>
	Integer overflow in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2181 and CVE-2010-2183.
	</description>
 </metadata>
<!-- ff2b259231f589e341c6c7f7140ebeb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2171</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2171" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2171" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via vectors related to SWF files, decompression of embedded JPEG image data, and the DefineBits and other unspecified tags, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188.
	</description>
 </metadata>
<!-- ff2b259231f589e341c6c7f7140ebeb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2172</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2172" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2172" source="CVE"/>
	<description>
	Adobe Flash Player 9 before 9.0.277.0 on unspecified UNIX platforms allows attackers to cause a denial of service via unknown vectors.
	</description>
 </metadata>
<!-- ff2b259231f589e341c6c7f7140ebeb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2173</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2173" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2173" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors, related to an "invalid pointer vulnerability" and the newclass (0x58) operator, a different vulnerability than CVE-2010-2174.
	</description>
 </metadata>
<!-- ff2b259231f589e341c6c7f7140ebeb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2174</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2174" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors, related to an "invalid pointer vulnerability" and the newfunction (0x44) operator, a different vulnerability than CVE-2010-2173.
	</description>
 </metadata>
<!-- ff2b259231f589e341c6c7f7140ebeb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2175</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2175" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2175" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188.
	</description>
 </metadata>
<!-- ff2b259231f589e341c6c7f7140ebeb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2176</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2176" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2176" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188.
	</description>
 </metadata>
<!-- ff2b259231f589e341c6c7f7140ebeb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2177</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2177" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188.
	</description>
 </metadata>
<!-- ff2b259231f589e341c6c7f7140ebeb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2178</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2178" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2178" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188.
	</description>
 </metadata>
<!-- ff2b259231f589e341c6c7f7140ebeb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2179</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2179" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, when Firefox or Chrome is used, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to URL parsing.
	</description>
 </metadata>
<!-- ff2b259231f589e341c6c7f7140ebeb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2180</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2180" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2182, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188.
	</description>
 </metadata>
<!-- ff2b259231f589e341c6c7f7140ebeb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2181</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2181" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2181" source="CVE"/>
	<description>
	Integer overflow in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2170 and CVE-2010-2183.
	</description>
 </metadata>
<!-- ff2b259231f589e341c6c7f7140ebeb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2182</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2182" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188.
	</description>
 </metadata>
<!-- ff2b259231f589e341c6c7f7140ebeb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2183</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2183" source="CVE"/>
	<description>
	Integer overflow in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2170 and CVE-2010-2181.
	</description>
 </metadata>
<!-- ff2b259231f589e341c6c7f7140ebeb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2184</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2184" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2184" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2187, and CVE-2010-2188.
	</description>
 </metadata>
<!-- ff2b259231f589e341c6c7f7140ebeb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2185</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2185" source="CVE"/>
	<description>
	Buffer overflow in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- ff2b259231f589e341c6c7f7140ebeb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2186</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2186" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- ff2b259231f589e341c6c7f7140ebeb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2187</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2187" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, and CVE-2010-2188.
	</description>
 </metadata>
<!-- ff2b259231f589e341c6c7f7140ebeb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2188</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2188" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code by calling the ActionScript native object 2200 connect method multiple times with different arguments, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, and CVE-2010-2187.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 46d098cd785a4681e350feaa94db5739 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061978" comment="flash-player less than 10.1.82.76-0.1.1"/>
	</criteria>
	<!-- ff131746c2523fc154dbc928397c7bc6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062207" comment="acroread less than 9.3.4-0.6.1"/>
	</criteria>
	<!-- ff2b259231f589e341c6c7f7140ebeb0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2189</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2189" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2189" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, when used in conjunction with VMWare Tools on a VMWare platform, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- ff2b259231f589e341c6c7f7140ebeb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060833" comment="flash-player less than 10.1.53.64-1.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2201</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2201" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2201" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code via a PDF file with crafted Flash content involving the (1) pushstring (0x2C) operator, (2) debugfile (0xF1) operator, and an "invalid pointer vulnerability" that triggers memory corruption, a different vulnerability than CVE-2010-1285 and CVE-2010-2168.
	</description>
 </metadata>
<!-- f113326c15d8ae9ed3c574d1b80f3231 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061132" comment="acroread less than 9.3.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2202</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2202" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-1295, CVE-2010-2207, CVE-2010-2209, CVE-2010-2210, CVE-2010-2211, and CVE-2010-2212.
	</description>
 </metadata>
<!-- f113326c15d8ae9ed3c574d1b80f3231 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061132" comment="acroread less than 9.3.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2203</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2203" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2203" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.3 on UNIX allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
	</description>
 </metadata>
<!-- f113326c15d8ae9ed3c574d1b80f3231 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061132" comment="acroread less than 9.3.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2204</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2204" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2204" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allows attackers to cause a denial of service or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- f113326c15d8ae9ed3c574d1b80f3231 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061132" comment="acroread less than 9.3.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2205</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2205" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2205" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, access uninitialized memory, which allows attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- f113326c15d8ae9ed3c574d1b80f3231 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061132" comment="acroread less than 9.3.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2206</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2206" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2206" source="CVE"/>
	<description>
	Array index error in AcroForm.api in Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted GIF image in a PDF file, which bypasses a size check and triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- f113326c15d8ae9ed3c574d1b80f3231 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061132" comment="acroread less than 9.3.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2207</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2207" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2207" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-1295, CVE-2010-2202, CVE-2010-2209, CVE-2010-2210, CVE-2010-2211, and CVE-2010-2212.
	</description>
 </metadata>
<!-- f113326c15d8ae9ed3c574d1b80f3231 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061132" comment="acroread less than 9.3.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2208</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2208" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2208" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, dereference a heap object after this object's deletion, which allows attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- f113326c15d8ae9ed3c574d1b80f3231 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061132" comment="acroread less than 9.3.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2209</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2209" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2209" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-1295, CVE-2010-2202, CVE-2010-2207, CVE-2010-2210, CVE-2010-2211, and CVE-2010-2212.
	</description>
 </metadata>
<!-- f113326c15d8ae9ed3c574d1b80f3231 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061132" comment="acroread less than 9.3.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2210</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2210" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-1295, CVE-2010-2202, CVE-2010-2207, CVE-2010-2209, CVE-2010-2211, and CVE-2010-2212.
	</description>
 </metadata>
<!-- f113326c15d8ae9ed3c574d1b80f3231 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061132" comment="acroread less than 9.3.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2211</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2211" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2211" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-1295, CVE-2010-2202, CVE-2010-2207, CVE-2010-2209, CVE-2010-2210, and CVE-2010-2212.
	</description>
 </metadata>
<!-- f113326c15d8ae9ed3c574d1b80f3231 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061132" comment="acroread less than 9.3.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2212</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2212" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2212" source="CVE"/>
	<description>
	Buffer overflow in Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a PDF file containing Flash content with a crafted #1023 (3FFh) tag, a different vulnerability than CVE-2010-1295, CVE-2010-2202, CVE-2010-2207, CVE-2010-2209, CVE-2010-2210, and CVE-2010-2211.
	</description>
 </metadata>
<!-- f113326c15d8ae9ed3c574d1b80f3231 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061132" comment="acroread less than 9.3.3-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2213</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2213" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2213" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.280 and 10.x before 10.1.82.76, and Adobe AIR before 2.0.3, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-0209, CVE-2010-2214, and CVE-2010-2216.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 46d098cd785a4681e350feaa94db5739 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061978" comment="flash-player less than 10.1.82.76-0.1.1"/>
	</criteria>
	<!-- ff131746c2523fc154dbc928397c7bc6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062207" comment="acroread less than 9.3.4-0.6.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2214</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2214" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2214" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.280 and 10.x before 10.1.82.76, and Adobe AIR before 2.0.3, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-0209, CVE-2010-2213, and CVE-2010-2216.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 46d098cd785a4681e350feaa94db5739 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061978" comment="flash-player less than 10.1.82.76-0.1.1"/>
	</criteria>
	<!-- ff131746c2523fc154dbc928397c7bc6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062207" comment="acroread less than 9.3.4-0.6.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2215</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2215" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2215" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.280 and 10.x before 10.1.82.76, and Adobe AIR before 2.0.3, allows attackers to trick a user into (1) selecting a link or (2) completing a dialog, related to a "click-jacking" issue.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 46d098cd785a4681e350feaa94db5739 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061978" comment="flash-player less than 10.1.82.76-0.1.1"/>
	</criteria>
	<!-- ff131746c2523fc154dbc928397c7bc6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062207" comment="acroread less than 9.3.4-0.6.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2216</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2216" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2216" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.280 and 10.x before 10.1.82.76, and Adobe AIR before 2.0.3, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-0209, CVE-2010-2213, and CVE-2010-2214.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 46d098cd785a4681e350feaa94db5739 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061978" comment="flash-player less than 10.1.82.76-0.1.1"/>
	</criteria>
	<!-- ff131746c2523fc154dbc928397c7bc6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062207" comment="acroread less than 9.3.4-0.6.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2240</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2240" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2240" source="CVE"/>
	<description>
	The do_anonymous_page function in mm/memory.c in the Linux kernel before 2.6.27.52, 2.6.32.x before 2.6.32.19, 2.6.34.x before 2.6.34.4, and 2.6.35.x before 2.6.35.2 does not properly separate the stack and the heap, which allows context-dependent attackers to execute arbitrary code by writing to the bottom page of a shared memory segment, as demonstrated by a memory-exhaustion attack against the X.Org X server.
	</description>
 </metadata>
<!-- d90f97d6f63f9617287b21cb16984455 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064534" comment="xorg-x11-Xvnc less than 7.4-27.28.31.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064535" comment="xorg-x11-server-extra less than 7.4-27.28.31.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064536" comment="xorg-x11-server less than 7.4-27.28.31.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2249</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2249" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2249" source="CVE"/>
	<description>
	Memory leak in pngrutil.c in libpng before 1.2.44, and 1.4.x before 1.4.3, allows remote attackers to cause a denial of service (memory consumption and application crash) via a PNG image containing malformed Physical Scale (aka sCAL) chunks.
	</description>
 </metadata>
<!-- f1d44e52ed863f9a43344baf83cf06a1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060316" comment="libpng12-0 less than 1.2.39-1.4.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2497</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2497" source="CVE"/>
	<description>
	Integer underflow in glyph handling in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
<!-- 32e278d12a649367b744e41d94159945 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062065" comment="freetype2 less than 2.3.7-25.11.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2498</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2498" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2498" source="CVE"/>
	<description>
	The psh_glyph_find_strong_points function in pshinter/pshalgo.c in FreeType before 2.4.0 does not properly implement hinting masks, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via a crafted font file that triggers an invalid free operation.
	</description>
 </metadata>
<!-- 32e278d12a649367b744e41d94159945 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062065" comment="freetype2 less than 2.3.7-25.11.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2499</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2499" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2499" source="CVE"/>
	<description>
	Buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted LaserWriter PS font file with an embedded PFB fragment.
	</description>
 </metadata>
<!-- 32e278d12a649367b744e41d94159945 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062065" comment="freetype2 less than 2.3.7-25.11.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2500</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2500" source="CVE"/>
	<description>
	Integer overflow in the gray_render_span function in smooth/ftgrays.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
<!-- 32e278d12a649367b744e41d94159945 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062065" comment="freetype2 less than 2.3.7-25.11.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2519</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2519" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2519" source="CVE"/>
	<description>
	Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file.
	</description>
 </metadata>
<!-- 32e278d12a649367b744e41d94159945 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062065" comment="freetype2 less than 2.3.7-25.11.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2520</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2520" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2520" source="CVE"/>
	<description>
	Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
<!-- 32e278d12a649367b744e41d94159945 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062065" comment="freetype2 less than 2.3.7-25.11.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2527</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2527" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2527" source="CVE"/>
	<description>
	Multiple buffer overflows in demo programs in FreeType before 2.4.0 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
<!-- 32e278d12a649367b744e41d94159945 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062065" comment="freetype2 less than 2.3.7-25.11.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2541</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2541" source="CVE"/>
	<description>
	Buffer overflow in ftmulti.c in the ftmulti demo program in FreeType before 2.4.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
<!-- 32e278d12a649367b744e41d94159945 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062065" comment="freetype2 less than 2.3.7-25.11.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2547</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2547" source="CVE"/>
	<description>
	Use-after-free vulnerability in kbx/keybox-blob.c in GPGSM in GnuPG 2.x through 2.0.16 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a certificate with a large number of Subject Alternate Names, which is not properly handled in a realloc operation when importing the certificate or verifying its signature.
	</description>
 </metadata>
<!-- 45f179416077fcbfcb73d9944f487fc9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061951" comment="gpg2-lang less than 2.0.9-25.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061952" comment="gpg2 less than 2.0.9-25.26.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2805</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2805" source="CVE"/>
	<description>
	The FT_Stream_EnterFrame function in base/ftstream.c in FreeType before 2.4.2 does not properly validate certain position values, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
<!-- 32e278d12a649367b744e41d94159945 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062065" comment="freetype2 less than 2.3.7-25.11.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2806</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2806" source="CVE"/>
	<description>
	Array index error in the t42_parse_sfnts function in type42/t42parse.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via negative size values for certain strings in FontType42 font files, leading to a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 32e278d12a649367b744e41d94159945 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062065" comment="freetype2 less than 2.3.7-25.11.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2807</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2807" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2807" source="CVE"/>
	<description>
	FreeType before 2.4.2 uses incorrect integer data types during bounds checking, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
<!-- 32e278d12a649367b744e41d94159945 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062065" comment="freetype2 less than 2.3.7-25.11.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2808</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2808" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2808" source="CVE"/>
	<description>
	Buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Adobe Type 1 Mac Font File (aka LWFN) font.
	</description>
 </metadata>
<!-- 32e278d12a649367b744e41d94159945 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062065" comment="freetype2 less than 2.3.7-25.11.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2862</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2862" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2862" source="CVE"/>
	<description>
	Integer overflow in CoolType.dll in Adobe Reader 8.2.3 and 9.3.3, and Acrobat 9.3.3, allows remote attackers to execute arbitrary code via a TrueType font with a large maxCompositePoints value in a Maximum Profile (maxp) table.
	</description>
 </metadata>
<!-- ff131746c2523fc154dbc928397c7bc6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062207" comment="acroread less than 9.3.4-0.6.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2883</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2883" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2883" source="CVE"/>
	<description>
	Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010. NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 093feac031606e0ea64b24dedf6edab9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2884</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2884" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2884" source="CVE"/>
	<description>
	Adobe Flash Player 10.1.82.76 and earlier on Windows, Mac OS X, Linux, and Solaris and 10.1.92.10 on Android; authplay.dll in Adobe Reader and Acrobat 9.x before 9.4; and authplay.dll in Adobe Reader and Acrobat 8.x before 8.2.5 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as exploited in the wild in September 2010.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 093feac031606e0ea64b24dedf6edab9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
	</criteria>
	<!-- aa67b1de00d917f0a43af55192084015 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062813" comment="flash-player less than 10.1.85.3-0.1.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2887</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2887" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2887" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Adobe Reader and Acrobat 9.x before 9.4 on Linux allow attackers to gain privileges via unknown vectors.
	</description>
 </metadata>
<!-- 093feac031606e0ea64b24dedf6edab9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2889</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2889" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2889" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to execute arbitrary code via a crafted font, a different vulnerability than CVE-2010-3626.
	</description>
 </metadata>
<!-- 093feac031606e0ea64b24dedf6edab9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2890</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2890" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2890" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-3619, CVE-2010-3621, CVE-2010-3622, CVE-2010-3628, CVE-2010-3632, and CVE-2010-3658.
	</description>
 </metadata>
<!-- 093feac031606e0ea64b24dedf6edab9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2935</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2935" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2935" source="CVE"/>
	<description>
	simpress.bin in the Impress module in OpenOffice.org (OOo) 2.x and 3.x before 3.3 does not properly handle integer values associated with dictionary property items, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PowerPoint document that triggers a heap-based buffer overflow, related to an "integer truncation error."
	</description>
 </metadata>
<!-- 9b6904dc9d027115af4a4838601d4aa3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063683" comment="OpenOffice_org-base-extensions less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063619" comment="OpenOffice_org-base less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063684" comment="OpenOffice_org-calc-extensions less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063622" comment="OpenOffice_org-calc less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063624" comment="OpenOffice_org-components less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063685" comment="OpenOffice_org-draw-extensions less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063625" comment="OpenOffice_org-draw less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063627" comment="OpenOffice_org-filters-optional less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063628" comment="OpenOffice_org-filters less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063629" comment="OpenOffice_org-gnome less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063632" comment="OpenOffice_org-icon-themes less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063686" comment="OpenOffice_org-impress-extensions less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063634" comment="OpenOffice_org-impress less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063641" comment="OpenOffice_org-l10n-de less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063642" comment="OpenOffice_org-l10n-el less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063643" comment="OpenOffice_org-l10n-en-GB less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063644" comment="OpenOffice_org-l10n-es less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063646" comment="OpenOffice_org-l10n-extras less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063647" comment="OpenOffice_org-l10n-fi less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063648" comment="OpenOffice_org-l10n-fr less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063650" comment="OpenOffice_org-l10n-it less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063651" comment="OpenOffice_org-l10n-ja less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063689" comment="OpenOffice_org-l10n-ko less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063653" comment="OpenOffice_org-l10n-nl less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063655" comment="OpenOffice_org-l10n-pl less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063656" comment="OpenOffice_org-l10n-pt-BR less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063657" comment="OpenOffice_org-l10n-pt less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063658" comment="OpenOffice_org-l10n-ru less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063660" comment="OpenOffice_org-l10n-sv less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063662" comment="OpenOffice_org-l10n-zh-CN less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063663" comment="OpenOffice_org-l10n-zh-TW less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063666" comment="OpenOffice_org-libs-core less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063668" comment="OpenOffice_org-libs-extern less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063670" comment="OpenOffice_org-libs-gui less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063672" comment="OpenOffice_org-math less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063675" comment="OpenOffice_org-pyuno less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063678" comment="OpenOffice_org-ure less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063690" comment="OpenOffice_org-writer-extensions less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063680" comment="OpenOffice_org-writer less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063681" comment="OpenOffice_org less than 3.2.1.6-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2936</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-2936" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2936" source="CVE"/>
	<description>
	Integer overflow in simpress.bin in the Impress module in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted polygons in a PowerPoint document that triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 9b6904dc9d027115af4a4838601d4aa3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063683" comment="OpenOffice_org-base-extensions less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063619" comment="OpenOffice_org-base less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063684" comment="OpenOffice_org-calc-extensions less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063622" comment="OpenOffice_org-calc less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063624" comment="OpenOffice_org-components less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063685" comment="OpenOffice_org-draw-extensions less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063625" comment="OpenOffice_org-draw less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063627" comment="OpenOffice_org-filters-optional less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063628" comment="OpenOffice_org-filters less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063629" comment="OpenOffice_org-gnome less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063632" comment="OpenOffice_org-icon-themes less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063686" comment="OpenOffice_org-impress-extensions less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063634" comment="OpenOffice_org-impress less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063641" comment="OpenOffice_org-l10n-de less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063642" comment="OpenOffice_org-l10n-el less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063643" comment="OpenOffice_org-l10n-en-GB less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063644" comment="OpenOffice_org-l10n-es less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063646" comment="OpenOffice_org-l10n-extras less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063647" comment="OpenOffice_org-l10n-fi less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063648" comment="OpenOffice_org-l10n-fr less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063650" comment="OpenOffice_org-l10n-it less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063651" comment="OpenOffice_org-l10n-ja less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063689" comment="OpenOffice_org-l10n-ko less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063653" comment="OpenOffice_org-l10n-nl less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063655" comment="OpenOffice_org-l10n-pl less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063656" comment="OpenOffice_org-l10n-pt-BR less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063657" comment="OpenOffice_org-l10n-pt less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063658" comment="OpenOffice_org-l10n-ru less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063660" comment="OpenOffice_org-l10n-sv less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063662" comment="OpenOffice_org-l10n-zh-CN less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063663" comment="OpenOffice_org-l10n-zh-TW less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063666" comment="OpenOffice_org-libs-core less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063668" comment="OpenOffice_org-libs-extern less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063670" comment="OpenOffice_org-libs-gui less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063672" comment="OpenOffice_org-math less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063675" comment="OpenOffice_org-pyuno less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063678" comment="OpenOffice_org-ure less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063690" comment="OpenOffice_org-writer-extensions less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063680" comment="OpenOffice_org-writer less than 3.2.1.6-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063681" comment="OpenOffice_org less than 3.2.1.6-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3053</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3053" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3053" source="CVE"/>
	<description>
	bdf/bdflib.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (application crash) via a crafted BDF font file, related to an attempted modification of a value in a static string.
	</description>
 </metadata>
<!-- 423e0b4a764827a551e401667973c413 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063353" comment="freetype2 less than 2.3.7-25.17.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3054</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3054" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3054" source="CVE"/>
	<description>
	Unspecified vulnerability in FreeType 2.3.9, and other versions before 2.4.2, allows remote attackers to cause a denial of service via vectors involving nested Standard Encoding Accented Character (aka seac) calls, related to psaux.h, cffgload.c, cffgload.h, and t1decode.c.
	</description>
 </metadata>
<!-- 423e0b4a764827a551e401667973c413 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063353" comment="freetype2 less than 2.3.7-25.17.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3069</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3069" source="CVE"/>
	<description>
	Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.
	</description>
 </metadata>
<!-- 2f69fa7588e500e68fb32a405fa0e8f8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062890" comment="cifs-mount less than 3.2.7-11.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062894" comment="libsmbclient0 less than 3.2.7-11.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062897" comment="libtalloc1 less than 3.2.7-11.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062900" comment="libtdb1 less than 3.2.7-11.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062903" comment="libwbclient0 less than 3.2.7-11.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062907" comment="samba-client less than 3.2.7-11.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062913" comment="samba less than 3.2.7-11.21.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3170</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3170" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 recognize a wildcard IP address in the subject's Common Name field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
	</description>
 </metadata>
<!-- ffea2564bca45ea15df449d9bd523589 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064287" comment="libfreebl3 less than 3.12.8-1.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064288" comment="mozilla-nspr less than 4.8.6-1.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064289" comment="mozilla-nss less than 3.12.8-1.2.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3311</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3311" source="CVE"/>
	<description>
	Integer overflow in base/ftstream.c in libXft (aka the X FreeType library) in FreeType before 2.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Compact Font Format (CFF) font file that triggers a heap-based buffer overflow, related to an "input stream position error" issue, a different vulnerability than CVE-2010-1797.
	</description>
 </metadata>
<!-- 423e0b4a764827a551e401667973c413 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063353" comment="freetype2 less than 2.3.7-25.17.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3541</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3541" source="CVE"/>
	<description>
	Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is related to missing validation of request headers in the HttpURLConnection class when they are set by applets, which allows remote attackers to bypass the intended security policy.
	</description>
 </metadata>
<!-- 5da82c909246893c2a98c691f453f073 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3548</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3548" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3548" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Naming and Directory Interface (JNDI) component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this allows remote attackers to determine internal IP addresses or "otherwise-protected internal network names."
	</description>
 </metadata>
<!-- 5da82c909246893c2a98c691f453f073 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3549</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3549" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3549" source="CVE"/>
	<description>
	Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is an HTTP request splitting vulnerability involving the handling of the chunked transfer encoding method by the HttpURLConnection class.
	</description>
 </metadata>
<!-- 5da82c909246893c2a98c691f453f073 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3550</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3550" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3550" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Web Start component in Oracle Java SE and Java for Business 6 Update 21 and 5.0 Update 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
<!-- 5da82c909246893c2a98c691f453f073 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3551</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3551" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3551" source="CVE"/>
	<description>
	Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality via unknown vectors.
	</description>
 </metadata>
<!-- 5da82c909246893c2a98c691f453f073 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3552</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3552" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3552" source="CVE"/>
	<description>
	Unspecified vulnerability in the New Java Plug-in component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
<!-- 5da82c909246893c2a98c691f453f073 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3553</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3553" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3553" source="CVE"/>
	<description>
	Unspecified vulnerability in the Swing component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is related to unsafe reflection involving the UIDefault.ProxyLazyValue class.
	</description>
 </metadata>
<!-- 5da82c909246893c2a98c691f453f073 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3554</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3554" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3554" source="CVE"/>
	<description>
	Unspecified vulnerability in the CORBA component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is related to "permissions granted to certain system objects."
	</description>
 </metadata>
<!-- 5da82c909246893c2a98c691f453f073 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3555</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3555" source="CVE"/>
	<description>
	Unspecified vulnerability in the Deployment component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the January 2011 CPU. Oracle has not commented on claims from a reliable third party coordinator that the ActiveX Plugin does not properly initialize an object field that is used as a window handle, which allows attackers to execute arbitrary code.
	</description>
 </metadata>
<!-- 5da82c909246893c2a98c691f453f073 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3556</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3556" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3556" source="CVE"/>
	<description>
	Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
<!-- 5da82c909246893c2a98c691f453f073 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3557</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3557" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3557" source="CVE"/>
	<description>
	Unspecified vulnerability in the Swing component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is related to the modification of "behavior and state of certain JDK classes" and "mutable static."
	</description>
 </metadata>
<!-- 5da82c909246893c2a98c691f453f073 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3558</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3558" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Web Start component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
<!-- 5da82c909246893c2a98c691f453f073 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3559</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3559" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3559" source="CVE"/>
	<description>
	Unspecified vulnerability in the Sound component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this involves an incorrect sign extension in the HeadspaceSoundbank.nGetName function, which allows attackers to execute arbitrary code via a crafted BANK record that leads to a buffer overflow.
	</description>
 </metadata>
<!-- 5da82c909246893c2a98c691f453f073 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3560</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3560" source="CVE"/>
	<description>
	Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality via unknown vectors.
	</description>
 </metadata>
<!-- 5da82c909246893c2a98c691f453f073 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3561</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3561" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3561" source="CVE"/>
	<description>
	Unspecified vulnerability in the CORBA component in Oracle Java SE and Java for Business 6 Update 21 and 5.0 Update 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this involves the use of the privileged accept method in the ServerSocket class, which does not limit which hosts can connect and allows remote attackers to bypass intended network access restrictions.
	</description>
 </metadata>
<!-- 5da82c909246893c2a98c691f453f073 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3562</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3562" source="CVE"/>
	<description>
	Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is a double free vulnerability in IndexColorModel that allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code.
	</description>
 </metadata>
<!-- 5da82c909246893c2a98c691f453f073 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3563</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3563" source="CVE"/>
	<description>
	Unspecified vulnerability in the Deployment component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is related to "how Web Start retrieves security policies," BasicServiceImpl, and forged policies that bypass sandbox restrictions.
	</description>
 </metadata>
<!-- 5da82c909246893c2a98c691f453f073 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3565</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3565" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3565" source="CVE"/>
	<description>
	Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is an integer overflow that triggers memory corruption via large values in a subsample of a JPEG image, related to JPEGImageWriter.writeImage in the imageio API.
	</description>
 </metadata>
<!-- 5da82c909246893c2a98c691f453f073 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3566</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3566" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3566" source="CVE"/>
	<description>
	Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update and 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is an integer overflow that leads to a buffer overflow via a crafted devs (device information) tag structure in a color profile.
	</description>
 </metadata>
<!-- 5da82c909246893c2a98c691f453f073 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3567</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3567" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3567" source="CVE"/>
	<description>
	Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, and 5.0 Update 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is related to a calculation error in right-to-left text character counts for the ICU OpenType font rendering implementation, which triggers an out-of-bounds memory access.
	</description>
 </metadata>
<!-- 5da82c909246893c2a98c691f453f073 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3568</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3568" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is a race condition related to deserialization.
	</description>
 </metadata>
<!-- 5da82c909246893c2a98c691f453f073 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3569</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3569" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3569" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this allows remote attackers to execute arbitrary code by causing the defaultReadObject method in the Serialization API to set a volatile field multiple times.
	</description>
 </metadata>
<!-- 5da82c909246893c2a98c691f453f073 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3570</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3570" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3570" source="CVE"/>
	<description>
	Unspecified vulnerability in the Deployment Toolkit component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
<!-- 5da82c909246893c2a98c691f453f073 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3571</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3571" source="CVE"/>
	<description>
	Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is an integer overflow in the color profile parser that allows remote attackers to execute arbitrary code via a crafted Tag structure in a color profile.
	</description>
 </metadata>
<!-- 5da82c909246893c2a98c691f453f073 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3572</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3572" source="CVE"/>
	<description>
	Unspecified vulnerability in the Sound component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
<!-- 5da82c909246893c2a98c691f453f073 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3573</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3573" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3573" source="CVE"/>
	<description>
	Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21 and 5.0 Update 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is related to missing validation of request headers in the HttpURLConnection class when they are set by applets, which allows remote attackers to bypass the intended security policy.
	</description>
 </metadata>
<!-- 5da82c909246893c2a98c691f453f073 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3574</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3574" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3574" source="CVE"/>
	<description>
	Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that HttpURLConnection does not properly check for the allowHttpTrace permission, which allows untrusted code to perform HTTP TRACE requests.
	</description>
 </metadata>
<!-- 5da82c909246893c2a98c691f453f073 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3619</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3619" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2890, CVE-2010-3621, CVE-2010-3622, CVE-2010-3628, CVE-2010-3632, and CVE-2010-3658.
	</description>
 </metadata>
<!-- 093feac031606e0ea64b24dedf6edab9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3620</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3620" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3620" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to execute arbitrary code via a crafted image, a different vulnerability than CVE-2010-3629.
	</description>
 </metadata>
<!-- 093feac031606e0ea64b24dedf6edab9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3621</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3621" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3621" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2890, CVE-2010-3619, CVE-2010-3622, CVE-2010-3628, CVE-2010-3632, and CVE-2010-3658.
	</description>
 </metadata>
<!-- 093feac031606e0ea64b24dedf6edab9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3622</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3622" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3622" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2890, CVE-2010-3619, CVE-2010-3621, CVE-2010-3628, CVE-2010-3632, and CVE-2010-3658.
	</description>
 </metadata>
<!-- 093feac031606e0ea64b24dedf6edab9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3623</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3623" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3623" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 8.x before 8.2.5 and 9.x before 9.4 on Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
	</description>
 </metadata>
<!-- 093feac031606e0ea64b24dedf6edab9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3624</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3624" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3624" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 8.x before 8.2.5 and 9.x before 9.4 on Mac OS X allows attackers to execute arbitrary code via a crafted image.
	</description>
 </metadata>
<!-- 093feac031606e0ea64b24dedf6edab9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3625</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3625" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code via unspecified vectors, related to a "prefix protocol handler vulnerability."
	</description>
 </metadata>
<!-- 093feac031606e0ea64b24dedf6edab9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3626</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3626" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3626" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to execute arbitrary code via a crafted font, a different vulnerability than CVE-2010-2889.
	</description>
 </metadata>
<!-- 093feac031606e0ea64b24dedf6edab9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3627</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3627" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3627" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 093feac031606e0ea64b24dedf6edab9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3628</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3628" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3628" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2890, CVE-2010-3619, CVE-2010-3621, CVE-2010-3622, CVE-2010-3632, and CVE-2010-3658.
	</description>
 </metadata>
<!-- 093feac031606e0ea64b24dedf6edab9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3629</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3629" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3629" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to execute arbitrary code via a crafted image, a different vulnerability than CVE-2010-3620.
	</description>
 </metadata>
<!-- 093feac031606e0ea64b24dedf6edab9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3630</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3630" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3630" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to cause a denial of service or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 093feac031606e0ea64b24dedf6edab9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3631</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3631" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3631" source="CVE"/>
	<description>
	Array index error in Adobe Reader and Acrobat 8.x before 8.2.5 and 9.x before 9.4 on Mac OS X allows attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 093feac031606e0ea64b24dedf6edab9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3632</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3632" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3632" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2890, CVE-2010-3619, CVE-2010-3621, CVE-2010-3622, CVE-2010-3628, and CVE-2010-3658.
	</description>
 </metadata>
<!-- 093feac031606e0ea64b24dedf6edab9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3636</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3636" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3636" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, does not properly handle unspecified encodings during the parsing of a cross-domain policy file, which allows remote web servers to bypass intended access restrictions via unknown vectors.
	</description>
 </metadata>
<!-- 5555422bf0e2213331172e8b3b5b799a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3637</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3637" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3637" source="CVE"/>
	<description>
	An unspecified ActiveX control in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 (Flash10h.ocx) on Windows allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted FLV video.
	</description>
 </metadata>
<!-- 5555422bf0e2213331172e8b3b5b799a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3638</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3638" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3638" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Mac OS X, when Safari is used, allows attackers to obtain sensitive information via unknown vectors.
	</description>
 </metadata>
<!-- 5555422bf0e2213331172e8b3b5b799a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3639</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3639" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3639" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to cause a denial of service or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 5555422bf0e2213331172e8b3b5b799a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3640</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3640" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.
	</description>
 </metadata>
<!-- 5555422bf0e2213331172e8b3b5b799a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3641</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3641" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.
	</description>
 </metadata>
<!-- 5555422bf0e2213331172e8b3b5b799a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3642</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3642" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3642" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.
	</description>
 </metadata>
<!-- 5555422bf0e2213331172e8b3b5b799a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3643</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3643" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3643" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.
	</description>
 </metadata>
<!-- 5555422bf0e2213331172e8b3b5b799a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3644</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3644" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3644" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.
	</description>
 </metadata>
<!-- 5555422bf0e2213331172e8b3b5b799a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3645</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3645" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3645" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.
	</description>
 </metadata>
<!-- 5555422bf0e2213331172e8b3b5b799a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3646</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3646" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3646" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.
	</description>
 </metadata>
<!-- 5555422bf0e2213331172e8b3b5b799a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3647</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3647" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3647" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.
	</description>
 </metadata>
<!-- 5555422bf0e2213331172e8b3b5b799a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3648</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3648" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3648" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.
	</description>
 </metadata>
<!-- 5555422bf0e2213331172e8b3b5b799a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3649</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3649" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3649" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3650, and CVE-2010-3652.
	</description>
 </metadata>
<!-- 5555422bf0e2213331172e8b3b5b799a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3650</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3650" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3650" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, and CVE-2010-3652.
	</description>
 </metadata>
<!-- 5555422bf0e2213331172e8b3b5b799a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3651</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3651" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3651" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- 5555422bf0e2213331172e8b3b5b799a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3652</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3652" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3652" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, and CVE-2010-3650.
	</description>
 </metadata>
<!-- 5555422bf0e2213331172e8b3b5b799a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3654</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3654" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris and 10.1.95.1 on Android, and authplay.dll (aka AuthPlayLib.bundle or libauthplay.so.0.0.0) in Adobe Reader and Acrobat 9.x through 9.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via crafted SWF content, as exploited in the wild in October 2010.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5555422bf0e2213331172e8b3b5b799a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
	</criteria>
	<!-- 7221b79d2ad4c3c9e24668ae84a61bb9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064940" comment="acroread less than 9.4.1-0.1.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3656</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3656" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3656" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to cause a denial of service via unknown vectors, a different vulnerability than CVE-2010-3657.
	</description>
 </metadata>
<!-- 093feac031606e0ea64b24dedf6edab9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3657</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3657" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3657" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to cause a denial of service via unknown vectors, a different vulnerability than CVE-2010-3656.
	</description>
 </metadata>
<!-- 093feac031606e0ea64b24dedf6edab9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3658</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3658" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2890, CVE-2010-3619, CVE-2010-3621, CVE-2010-3622, CVE-2010-3628, and CVE-2010-3632.
	</description>
 </metadata>
<!-- 093feac031606e0ea64b24dedf6edab9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3702</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3702" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3702" source="CVE"/>
	<description>
	The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, CUPS, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) via unknown vectors that trigger an uninitialized pointer dereference.
	</description>
 </metadata>
<!-- 22298682fe54097a2b0a476c1c5696e3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065327" comment="xpdf-tools less than 3.02-138.29.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065328" comment="xpdf less than 3.02-138.29.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3703</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3703" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3703" source="CVE"/>
	<description>
	The PostScriptFunction::PostScriptFunction function in poppler/Function.cc in the PDF parser in poppler 0.8.7 and possibly other versions up to 0.15.1, and possibly other products, allows context-dependent attackers to cause a denial of service (crash) via a PDF file that triggers an uninitialized pointer dereference.
	</description>
 </metadata>
<!-- 22298682fe54097a2b0a476c1c5696e3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065327" comment="xpdf-tools less than 3.02-138.29.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065328" comment="xpdf less than 3.02-138.29.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3704</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3704" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3704" source="CVE"/>
	<description>
	The FoFiType1::parse function in fofi/FoFiType1.cc in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PDF file with a crafted PostScript Type1 font that contains a negative array index, which bypasses input validation and triggers memory corruption.
	</description>
 </metadata>
<!-- 22298682fe54097a2b0a476c1c5696e3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065327" comment="xpdf-tools less than 3.02-138.29.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065328" comment="xpdf less than 3.02-138.29.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3847</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3847" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3847" source="CVE"/>
	<description>
	elf/dl-load.c in ld.so in the GNU C Library (aka glibc or libc6) through 2.11.2, and 2.12.x through 2.12.1, does not properly handle a value of $ORIGIN for the LD_AUDIT environment variable, which allows local users to gain privileges via a crafted dynamic shared object (DSO) located in an arbitrary directory.
	</description>
 </metadata>
<!-- 941485948dd603aa49360dbfdc7b2534 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064035" comment="glibc-devel less than 2.9-13.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064037" comment="glibc-i18ndata less than 2.9-13.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064040" comment="glibc-locale less than 2.9-13.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064043" comment="glibc less than 2.9-13.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064044" comment="nscd less than 2.9-13.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3856</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3856" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3856" source="CVE"/>
	<description>
	ld.so in the GNU C Library (aka glibc or libc6) before 2.11.3, and 2.12.x before 2.12.2, does not properly restrict use of the LD_AUDIT environment variable to reference dynamic shared objects (DSOs) as audit objects, which allows local users to gain privileges by leveraging an unsafe DSO located in a trusted library directory, as demonstrated by libpcprofile.so.
	</description>
 </metadata>
<!-- 941485948dd603aa49360dbfdc7b2534 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064035" comment="glibc-devel less than 2.9-13.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064037" comment="glibc-i18ndata less than 2.9-13.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064040" comment="glibc-locale less than 2.9-13.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064043" comment="glibc less than 2.9-13.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064044" comment="nscd less than 2.9-13.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3864</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3864" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3864" source="CVE"/>
	<description>
	Multiple race conditions in ssl/t1_lib.c in OpenSSL 0.9.8f through 0.9.8o, 1.0.0, and 1.0.0a, when multi-threading and internal caching are enabled on a TLS server, might allow remote attackers to execute arbitrary code via client data that triggers a heap-based buffer overflow, related to (1) the TLS server name extension and (2) elliptic curve cryptography.
	</description>
 </metadata>
<!-- eabeff7f7f72a7e70c5c0e842172a682 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064395" comment="libopenssl0_9_8 less than 0.9.8h-30.22.28.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064397" comment="openssl less than 0.9.8h-30.22.28.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3976</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-3976" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3976" source="CVE"/>
	<description>
	Untrusted search path vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the same folder as a file that is processed by Flash Player.
	</description>
 </metadata>
<!-- 5555422bf0e2213331172e8b3b5b799a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064245" comment="flash-player less than 10.1.102.64-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4020</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-4020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4020" source="CVE"/>
	<description>
	MIT Kerberos 5 (aka krb5) 1.8.x through 1.8.3 does not reject RC4 key-derivation checksums, which might allow remote authenticated users to forge a (1) AD-SIGNEDPATH or (2) AD-KDC-ISSUED signature, and possibly gain privileges, by leveraging the small key space that results from certain one-byte stream-cipher operations.
	</description>
 </metadata>
<!-- 8c39e04f2651c635b8532d7a17fb25e1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064613" comment="krb5 less than 1.6.3-133.39.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4021</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-4021" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4021" source="CVE"/>
	<description>
	The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 does not properly restrict the use of TGT credentials for armoring TGS requests, which might allow remote authenticated users to impersonate a client by rewriting an inner request, aka a "KrbFastReq forgery issue."
	</description>
 </metadata>
<!-- 8c39e04f2651c635b8532d7a17fb25e1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064613" comment="krb5 less than 1.6.3-133.39.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4091</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 11 Moblin 2.0</platform>
	</affected>
	<reference ref_id="CVE-2010-4091" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4091" source="CVE"/>
	<description>
	The EScript.api plugin in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.1, and 8.x before 8.2.6 on Windows and Mac OS X allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PDF document that triggers memory corruption, involving the printSeps function. NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 7221b79d2ad4c3c9e24668ae84a61bb9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009055781" comment="sle11-moblin20 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064940" comment="acroread less than 9.4.1-0.1.1"/>
</criteria>
</definition>
 </definitions>
 <tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055781" version="1" comment="moblin-release is ==2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055727" version="1" comment="acroread is &lt;8.1.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064035" version="1" comment="glibc-devel is &lt;2.9-13.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064037" version="1" comment="glibc-i18ndata is &lt;2.9-13.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064040" version="1" comment="glibc-locale is &lt;2.9-13.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064043" version="1" comment="glibc is &lt;2.9-13.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064044" version="1" comment="nscd is &lt;2.9-13.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060833" version="1" comment="flash-player is &lt;10.1.53.64-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059412" version="1" comment="libpoppler-glib4 is &lt;0.11.2-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059413" version="1" comment="libpoppler4 is &lt;0.10.1-1.34.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059414" version="1" comment="libpoppler5 is &lt;0.11.2-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058663" version="1" comment="libudev0 is &lt;137-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058664" version="1" comment="libvolume_id1 is &lt;137-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058665" version="1" comment="udev is &lt;137-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056544" version="1" comment="MozillaFirefox-translations is &lt;3.5.4-1.1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056545" version="1" comment="MozillaFirefox is &lt;3.5.4-1.1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056067" version="1" comment="mozilla-nspr is &lt;4.8.2-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056546" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.15-0.1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059839" version="1" comment="gimp-branding-upstream is &lt;2.6.2-3.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059682" version="1" comment="gimp-lang is &lt;2.6.2-3.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059684" version="1" comment="gimp is &lt;2.6.2-3.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058362" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.18-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058351" version="1" comment="MozillaFirefox-translations is &lt;3.5.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058352" version="1" comment="MozillaFirefox is &lt;3.5.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058355" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058357" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057426" version="1" comment="gzip is &lt;1.3.12-69.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060327" version="1" comment="libpython2_6-1_0 is &lt;2.6.0-8.8.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060331" version="1" comment="python-base is &lt;2.6.0-8.8.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060429" version="1" comment="python-devel is &lt;2.6.0-8.8.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060336" version="1" comment="python-tk is &lt;2.6.0-8.9.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060338" version="1" comment="python-xml is &lt;2.6.0-8.8.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060339" version="1" comment="python is &lt;2.6.0-8.9.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061093" version="1" comment="libvorbis is &lt;1.2.0-79.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059250" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.22.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059252" version="1" comment="openssl is &lt;0.9.8h-30.22.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060019" version="1" comment="fuse is &lt;2.7.2-61.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060020" version="1" comment="libfuse2 is &lt;2.7.2-61.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056886" version="1" comment="MozillaFirefox-translations is &lt;3.5.6-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056887" version="1" comment="MozillaFirefox is &lt;3.5.6-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056890" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.6-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056892" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.6-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059266" version="1" comment="libtheora0 is &lt;1.0.beta2-6.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059489" version="1" comment="kernel-default-base is &lt;2.6.30.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059490" version="1" comment="kernel-default-extra is &lt;2.6.30.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059491" version="1" comment="kernel-default is &lt;2.6.30.10-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059538" version="1" comment="samsung-atheros-kmp-default is &lt;001_2.6.30.10_0.1-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059827" version="1" comment="cups-client is &lt;1.3.9-8.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059828" version="1" comment="cups-libs is &lt;1.3.9-8.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059829" version="1" comment="cups is &lt;1.3.9-8.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059084" version="1" comment="cups-client is &lt;1.3.9-8.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059085" version="1" comment="cups-libs is &lt;1.3.9-8.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059086" version="1" comment="cups is &lt;1.3.9-8.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056256" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059417" version="1" comment="libfreebl3 is &lt;3.12.6-3.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059421" version="1" comment="mozilla-nss is &lt;3.12.6-3.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063828" version="1" comment="java-1_6_0-sun-plugin is &lt;1.6.0.u22-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063830" version="1" comment="java-1_6_0-sun is &lt;1.6.0.u22-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056250" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056252" version="1" comment="openssl is &lt;0.9.8h-30.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060388" version="1" comment="MozillaFirefox-translations is &lt;3.5.9-0.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060389" version="1" comment="MozillaFirefox is &lt;3.5.9-0.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060390" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.9-1.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060391" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.9-1.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065171" version="1" comment="gnutls is &lt;2.4.1-24.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065189" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065174" version="1" comment="libgnutls26 is &lt;2.4.1-24.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059481" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.19-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057190" version="1" comment="ntp is &lt;4.2.4p6-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056327" version="1" comment="expat is &lt;2.0.1-88.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056330" version="1" comment="libexpat1 is &lt;2.0.1-88.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057091" version="1" comment="libltdl7 is &lt;2.2.6-2.131.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057094" version="1" comment="libtool is &lt;2.2.6-2.131.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056910" version="1" comment="flash-player is &lt;10.0.42.34-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056295" version="1" comment="java-1_6_0-sun-plugin is &lt;1.6.0.u17-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056297" version="1" comment="java-1_6_0-sun is &lt;1.6.0.u17-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057440" version="1" comment="acroread is &lt;9.3-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056897" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.16-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060317" version="1" comment="kernel-default-base is &lt;2.6.30.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060318" version="1" comment="kernel-default-extra is &lt;2.6.30.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060319" version="1" comment="kernel-default is &lt;2.6.30.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061860" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.27.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061862" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.27.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061863" version="1" comment="ghostscript-library is &lt;8.62-32.27.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061865" version="1" comment="ghostscript-x11 is &lt;8.62-32.27.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061866" version="1" comment="libgimpprint is &lt;4.2.7-32.27.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058587" version="1" comment="libnetpbm10 is &lt;10.26.44-101.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058588" version="1" comment="netpbm is &lt;10.26.44-101.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058565" version="1" comment="libpurple-lang is &lt;2.6.6-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058568" version="1" comment="libpurple is &lt;2.6.6-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058570" version="1" comment="pidgin is &lt;2.6.6-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057994" version="1" comment="flash-player is &lt;10.0.45.2-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058548" version="1" comment="acroread is &lt;9.3.1-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059801" version="1" comment="acroread is &lt;9.3.2-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060275" version="1" comment="libpng12-0 is &lt;1.2.39-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061978" version="1" comment="flash-player is &lt;10.1.82.76-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062207" version="1" comment="acroread is &lt;9.3.4-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057542" version="1" comment="MozillaFirefox-translations is &lt;3.5.7-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057543" version="1" comment="MozillaFirefox is &lt;3.5.7-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057546" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.7-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057548" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.7-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057541" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.17-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061649" version="1" comment="OpenOffice_org-base-extensions is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061567" version="1" comment="OpenOffice_org-base is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061435" version="1" comment="OpenOffice_org-branding-SLED is &lt;3.2.1-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061650" version="1" comment="OpenOffice_org-calc-extensions is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061570" version="1" comment="OpenOffice_org-calc is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061572" version="1" comment="OpenOffice_org-components is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061652" version="1" comment="OpenOffice_org-draw-extensions is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061573" version="1" comment="OpenOffice_org-draw is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061575" version="1" comment="OpenOffice_org-filters-optional is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061576" version="1" comment="OpenOffice_org-filters is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061577" version="1" comment="OpenOffice_org-gnome is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061598" version="1" comment="OpenOffice_org-icon-themes is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061656" version="1" comment="OpenOffice_org-impress-extensions is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061600" version="1" comment="OpenOffice_org-impress is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061607" version="1" comment="OpenOffice_org-l10n-de is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061608" version="1" comment="OpenOffice_org-l10n-el is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061609" version="1" comment="OpenOffice_org-l10n-en-GB is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061610" version="1" comment="OpenOffice_org-l10n-es is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061612" version="1" comment="OpenOffice_org-l10n-extras is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061613" version="1" comment="OpenOffice_org-l10n-fi is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061614" version="1" comment="OpenOffice_org-l10n-fr is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061616" version="1" comment="OpenOffice_org-l10n-it is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061617" version="1" comment="OpenOffice_org-l10n-ja is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061659" version="1" comment="OpenOffice_org-l10n-ko is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061619" version="1" comment="OpenOffice_org-l10n-nl is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061621" version="1" comment="OpenOffice_org-l10n-pl is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061622" version="1" comment="OpenOffice_org-l10n-pt-BR is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061623" version="1" comment="OpenOffice_org-l10n-pt is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061624" version="1" comment="OpenOffice_org-l10n-ru is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061626" version="1" comment="OpenOffice_org-l10n-sv is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061628" version="1" comment="OpenOffice_org-l10n-zh-CN is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061629" version="1" comment="OpenOffice_org-l10n-zh-TW is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061632" version="1" comment="OpenOffice_org-libs-core is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061634" version="1" comment="OpenOffice_org-libs-extern is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061636" version="1" comment="OpenOffice_org-libs-gui is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061638" version="1" comment="OpenOffice_org-math is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061644" version="1" comment="OpenOffice_org-ure is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061660" version="1" comment="OpenOffice_org-writer-extensions is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061646" version="1" comment="OpenOffice_org-writer is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061647" version="1" comment="OpenOffice_org is &lt;3.2.1.4-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063185" version="1" comment="bzip2 is &lt;1.0.5-34.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063188" version="1" comment="libbz2-1 is &lt;1.0.5-34.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063350" version="1" comment="pcsc-lite is &lt;1.4.102-1.31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058917" version="1" comment="cron is &lt;4.1-194.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058612" version="1" comment="sudo is &lt;1.6.9p17-21.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060901" version="1" comment="cifs-mount is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060905" version="1" comment="libsmbclient0 is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060908" version="1" comment="libtalloc1 is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060911" version="1" comment="libtdb1 is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060914" version="1" comment="libwbclient0 is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060918" version="1" comment="samba-client is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060924" version="1" comment="samba is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059812" version="1" comment="java-1_6_0-sun-plugin is &lt;1.6.0.u20-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059814" version="1" comment="java-1_6_0-sun is &lt;1.6.0.u20-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064534" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.28.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064535" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.28.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064536" version="1" comment="xorg-x11-server is &lt;7.4-27.28.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060316" version="1" comment="libpng12-0 is &lt;1.2.39-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061132" version="1" comment="acroread is &lt;9.3.3-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060716" version="1" comment="krb5 is &lt;1.6.3-133.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064613" version="1" comment="krb5 is &lt;1.6.3-133.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062065" version="1" comment="freetype2 is &lt;2.3.7-25.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061951" version="1" comment="gpg2-lang is &lt;2.0.9-25.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061952" version="1" comment="gpg2 is &lt;2.0.9-25.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063368" version="1" comment="acroread is &lt;9.4-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062813" version="1" comment="flash-player is &lt;10.1.85.3-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063683" version="1" comment="OpenOffice_org-base-extensions is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063619" version="1" comment="OpenOffice_org-base is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063684" version="1" comment="OpenOffice_org-calc-extensions is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063622" version="1" comment="OpenOffice_org-calc is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063624" version="1" comment="OpenOffice_org-components is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063685" version="1" comment="OpenOffice_org-draw-extensions is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063625" version="1" comment="OpenOffice_org-draw is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063627" version="1" comment="OpenOffice_org-filters-optional is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063628" version="1" comment="OpenOffice_org-filters is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063629" version="1" comment="OpenOffice_org-gnome is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063632" version="1" comment="OpenOffice_org-icon-themes is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063686" version="1" comment="OpenOffice_org-impress-extensions is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063634" version="1" comment="OpenOffice_org-impress is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063641" version="1" comment="OpenOffice_org-l10n-de is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063642" version="1" comment="OpenOffice_org-l10n-el is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063643" version="1" comment="OpenOffice_org-l10n-en-GB is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063644" version="1" comment="OpenOffice_org-l10n-es is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063646" version="1" comment="OpenOffice_org-l10n-extras is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063647" version="1" comment="OpenOffice_org-l10n-fi is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063648" version="1" comment="OpenOffice_org-l10n-fr is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063650" version="1" comment="OpenOffice_org-l10n-it is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063651" version="1" comment="OpenOffice_org-l10n-ja is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063689" version="1" comment="OpenOffice_org-l10n-ko is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063653" version="1" comment="OpenOffice_org-l10n-nl is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063655" version="1" comment="OpenOffice_org-l10n-pl is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063656" version="1" comment="OpenOffice_org-l10n-pt-BR is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063657" version="1" comment="OpenOffice_org-l10n-pt is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063658" version="1" comment="OpenOffice_org-l10n-ru is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063660" version="1" comment="OpenOffice_org-l10n-sv is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063662" version="1" comment="OpenOffice_org-l10n-zh-CN is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063663" version="1" comment="OpenOffice_org-l10n-zh-TW is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063666" version="1" comment="OpenOffice_org-libs-core is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063668" version="1" comment="OpenOffice_org-libs-extern is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063670" version="1" comment="OpenOffice_org-libs-gui is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063672" version="1" comment="OpenOffice_org-math is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063675" version="1" comment="OpenOffice_org-pyuno is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063678" version="1" comment="OpenOffice_org-ure is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063690" version="1" comment="OpenOffice_org-writer-extensions is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063680" version="1" comment="OpenOffice_org-writer is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063681" version="1" comment="OpenOffice_org is &lt;3.2.1.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063353" version="1" comment="freetype2 is &lt;2.3.7-25.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062890" version="1" comment="cifs-mount is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062894" version="1" comment="libsmbclient0 is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062897" version="1" comment="libtalloc1 is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062900" version="1" comment="libtdb1 is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062903" version="1" comment="libwbclient0 is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062907" version="1" comment="samba-client is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062913" version="1" comment="samba is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064287" version="1" comment="libfreebl3 is &lt;3.12.8-1.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064288" version="1" comment="mozilla-nspr is &lt;4.8.6-1.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064289" version="1" comment="mozilla-nss is &lt;3.12.8-1.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064245" version="1" comment="flash-player is &lt;10.1.102.64-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064940" version="1" comment="acroread is &lt;9.4.1-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065327" version="1" comment="xpdf-tools is &lt;3.02-138.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065328" version="1" comment="xpdf is &lt;3.02-138.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064395" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.22.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064397" version="1" comment="openssl is &lt;0.9.8h-30.22.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038728"/>
	</rpminfo_test>
 </tests>
 <objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moblin-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-i18ndata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nscd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flash-player</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvolume_id1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_6-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfuse2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtheora0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samsung-atheros-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-openssl097g</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-sun-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-sun</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-extra26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>expat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libltdl7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-std</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-library</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netpbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-base-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-branding-SLED</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-calc-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-calc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-components</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-draw-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-draw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-filters-optional</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-icon-themes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-impress-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-impress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-l10n-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-l10n-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-l10n-en-GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-l10n-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-l10n-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-l10n-fi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-l10n-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-l10n-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-l10n-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-l10n-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-l10n-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-l10n-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-l10n-pt-BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-l10n-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-l10n-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-l10n-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-l10n-zh-CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-l10n-zh-TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-libs-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-libs-extern</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-libs-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-ure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-writer-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-writer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-lite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cifs-mount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-pyuno</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xpdf-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xpdf</name>
	</rpminfo_object>
 </objects>
 <states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">2</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.7-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9-13.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.1.53.64-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.2-1.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.1-1.34.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:137-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.4-1.1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.2-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.15-0.1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-3.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.18-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.8-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.8-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.12-69.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.8.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.9.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.22.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.2-61.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.6-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.6-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.beta2-6.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.30.10-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:001_2.6.30.10_0.1-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.6-3.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.u22-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.9-0.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.9-1.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.19-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4p6-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.6-2.131.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.42.34-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.u17-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.16-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.30.10-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.62-32.27.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.27.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.26.44-101.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.6-0.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.45.2-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.1-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.2-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.39-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.1.82.76-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.4-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.7-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.7-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.17-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1.4-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1-1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-34.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.102-1.31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1-194.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.9p17-21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.7-11.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.u20-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.28.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.39-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.3-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.1.85.3-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1.6-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.7-11.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.8-1.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-1.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.1.102.64-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.1-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.02-138.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.22.28.1</evr>
  </rpminfo_state>
 </states>
</oval_definitions>
