<?xml version="1.0" encoding="UTF-8"?>
<oval_definitions
	xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
	xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
	xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
	xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
	xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
  <generator>
      <oval:product_name>Marcus OVAL Generator</oval:product_name>
      <oval:schema_version>5.5</oval:schema_version>
      <oval:timestamp>2012-08-16T04:04:35</oval:timestamp>
  </generator>
  <definitions>
<definition id="oval:org.opensuse.security:def:20011267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2001-1267</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2001-1267" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1267" source="CVE"/>
	<description>
	Unknown.
	</description>
 </metadata>
<!-- 2506227b7bd914b11632b5701384104a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030401" comment="tar less than 1.13.25-325.10"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20020399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2002-0399</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2002-0399" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0399" source="CVE"/>
	<description>
	Directory traversal vulnerability in GNU tar 1.13.19 through 1.13.25, and possibly later versions, allows attackers to overwrite arbitrary files during archive extraction via a (1) "/.." or (2) "./.." string, which removes the leading slash but leaves the "..", a variant of CVE-2001-1267.ISC BIND 9 before 9.2.1 allows remote attackers to cause a denial of service (shutdown) via a malformed DNS packet that triggers an error condition that is not properly handled when the rdataset parameter to the dns_message_findtype() function in message.c is not NULL, aka DoS_findtype.SMB dissector in Ethereal 0.9.3 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via malformed packets that cause Ethereal to dereference a NULL pointer.Buffer overflow in X11 dissector in Ethereal 0.9.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code while Ethereal is parsing keysyms.DNS dissector in Ethereal before 0.9.3 allows remote attackers to cause a denial of service (CPU consumption) via a malformed packet that causes Ethereal to enter an infinite loop.Vulnerability in GIOP dissector in Ethereal before 0.9.3 allows remote attackers to cause a denial of service (memory consumption).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2506227b7bd914b11632b5701384104a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030401" comment="tar less than 1.13.25-325.10"/>
	</criteria>
	<!-- cffcc0146fa6ba2fd6d7036a5d1643b8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030402" comment="tar less than 1.13.25-325.6"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20030020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2003-0020</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2003-0020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0020" source="CVE"/>
	<description>
	Unknown.
	</description>
 </metadata>
<!-- 26c3e83f9771093dfc1fecccbe79c9fe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030403" comment="libapr0 less than 2.0.59-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20030190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2003-0190</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2003-0190" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0190" source="CVE"/>
	<description>
	OpenSSH-portable (OpenSSH) 3.6.1p1 and earlier with PAM support enabled immediately sends an error message when a user does not exist, which allows remote attackers to determine valid usernames via a timing attack.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4af044adfe942bf6b49a0bdd3e5e5952 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030404" comment="openssh less than 3.8p1-37.17"/>
	</criteria>
	<!-- 752421e658dda743b9500849b697497d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030404" comment="openssh less than 3.8p1-37.17"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20030856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2003-0856</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2003-0856" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0856" source="CVE"/>
	<description>
	iproute 2.4.7 and earlier allows local users to cause a denial of service via spoofed messages as other users to the kernel netlink interface.
	</description>
 </metadata>
<!-- 9874b4d93537973f551c3a967fce6726 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030405" comment="iproute2 less than 2.4.7-866.8"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0110</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0110" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0110" source="CVE"/>
	<description>
	Buffer overflow in the (1) nanohttp or (2) nanoftp modules in XMLSoft Libxml 2 (Libxml2) 2.6.0 through 2.6.5 allow remote attackers to execute arbitrary code via a long URL.gdk-pixbuf before 0.20 allows attackers to cause a denial of service (crash) via a malformed bitmap (BMP) file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 969e1829d7e212fea47d4cf82da0bb2d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030406" comment="libxml2-devel less than 2.6.7-28.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030407" comment="libxml2 less than 2.6.7-28.7"/>
		</criteria>
	</criteria>
	<!-- a9e2b82d8b69745daaaae4de8270acf0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030408" comment="libxml2-python less than 2.6.7-46.7"/>
	</criteria>
	<!-- ebcaf61f6debd12131a1753d095345dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030409" comment="libxml-devel less than 1.8.17-366.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030410" comment="libxml less than 1.8.17-366.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0452</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0452" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0452" source="CVE"/>
	<description>
	Race condition in the rmtree function in the File::Path module in Perl 5.6.1 and 5.8.4 sets read/write permissions for the world, which allows local users to delete arbitrary files and directories, and possibly read files and directories, via a symlink attack.
	</description>
 </metadata>
<!-- 7e6cf48cf7a796f79176269c2c18b8df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030411" comment="perl less than 5.8.3-32.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0494</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2004-0494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0494" source="CVE"/>
	<description>
	Multiple extfs backend scripts for GNOME virtual file system (VFS) before 1.0.1 may allow remote attackers to perform certain unauthorized actions via a gnome-vfs URI.
	</description>
 </metadata>
<!-- a9b2b8c3a049831dfe42a9cc69112c52 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030412" comment="gnome-vfs2-32bit less than 9-200504132212"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030413" comment="gnome-vfs2-doc less than 2.6.1-6.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030414" comment="gnome-vfs2 less than 2.6.1-6.23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0687</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0687" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0687" source="CVE"/>
	<description>
	Multiple stack-based buffer overflows in (1) xpmParseColors in parse.c, (2) ParseAndPutPixels in create.c, and (3) ParsePixels in parse.c for libXpm before 6.8.1 allow remote attackers to execute arbitrary code via a malformed XPM image file.
	</description>
 </metadata>
<!-- 5fc836c604fb00d163180bddb1be43c2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030415" comment="XFree86-libs less than 4.3.99.902-43.35.3"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0688</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0688" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0688" source="CVE"/>
	<description>
	Multiple integer overflows in (1) the xpmParseColors function in parse.c, (2) XpmCreateImageFromXpmImage, (3) CreateXImage, (4) ParsePixels, and (5) ParseAndPutPixels for libXpm before 6.8.1 may allow remote attackers to execute arbitrary code via a malformed XPM image file.
	</description>
 </metadata>
<!-- 5fc836c604fb00d163180bddb1be43c2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030415" comment="XFree86-libs less than 4.3.99.902-43.35.3"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0803</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0803" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0803" source="CVE"/>
	<description>
	Multiple vulnerabilities in the RLE (run length encoding) decoders for libtiff 3.6.1 and earlier, related to buffer overflows and integer overflows, allow remote attackers to execute arbitrary code via TIFF files.
	</description>
 </metadata>
<!-- b041aa0ff3776ef001f5ef9590ac9bd6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030416" comment="kdegraphics3-fax less than 3.2.1-67.12"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0804</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0804" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0804" source="CVE"/>
	<description>
	Vulnerability in tif_dirread.c for libtiff allows remote attackers to cause a denial of service (application crash) via a TIFF image that causes a divide-by-zero error when the number of row bytes is zero, a different vulnerability than CVE-2005-2452.
	</description>
 </metadata>
<!-- b041aa0ff3776ef001f5ef9590ac9bd6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030416" comment="kdegraphics3-fax less than 3.2.1-67.12"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0814</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2004-0814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0814" source="CVE"/>
	<description>
	Multiple race conditions in the terminal layer in Linux 2.4.x, and 2.6.x before 2.6.9, allow (1) local users to obtain portions of kernel data via a TIOCSETD ioctl call to a terminal interface that is being accessed by another thread, or (2) remote attackers to cause a denial of service (panic) by switching from console to PPP line discipline, then quickly sending data that is received during the switch.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2558830537429cdedb543926fd6344a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- 54a1f3c286aab229c33a01a912db9ffa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030421" comment="kernel-bigsmp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0827</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0827" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0827" source="CVE"/>
	<description>
	Multiple buffer overflows in the ImageMagick graphics library 5.x before 5.4.4, and 6.x before 6.0.6.2, allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via malformed (1) AVI, (2) BMP, or (3) DIB files.
	</description>
 </metadata>
<!-- 87559c17d06f8b2f7ecf4a7d0f3cca7c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030422" comment="ImageMagick-devel less than 5.5.7-225.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030423" comment="ImageMagick less than 5.5.7-225.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0835</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2004-0835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0835" source="CVE"/>
	<description>
	MySQL 3.x before 3.23.59, 4.x before 4.0.19, 4.1.x before 4.1.2, and 5.x before 5.0.1, checks the CREATE/INSERT rights of the original table instead of the target table in an ALTER TABLE RENAME operation, which could allow attackers to conduct unauthorized activities.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 83b0f5c39630e68ca3757f1fa7fb1b42 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030424" comment="mysql-Max less than 4.0.18-32.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030425" comment="mysql less than 4.0.18-32.13"/>
		</criteria>
	</criteria>
	<!-- ee202c526340ebd20b6cac08d230869d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030426" comment="mysql less than 4.0.18-32.10"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0836</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2004-0836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0836" source="CVE"/>
	<description>
	Buffer overflow in the mysql_real_connect function in MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows remote DNS servers to cause a denial of service and possibly execute arbitrary code via a DNS response with a large address length (h_length).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 83b0f5c39630e68ca3757f1fa7fb1b42 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030424" comment="mysql-Max less than 4.0.18-32.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030425" comment="mysql less than 4.0.18-32.13"/>
		</criteria>
	</criteria>
	<!-- ee202c526340ebd20b6cac08d230869d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030426" comment="mysql less than 4.0.18-32.10"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0837</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2004-0837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0837" source="CVE"/>
	<description>
	MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows attackers to cause a denial of service (crash or hang) via multiple threads that simultaneously alter MERGE table UNIONs.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 83b0f5c39630e68ca3757f1fa7fb1b42 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030424" comment="mysql-Max less than 4.0.18-32.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030425" comment="mysql less than 4.0.18-32.13"/>
		</criteria>
	</criteria>
	<!-- ee202c526340ebd20b6cac08d230869d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030426" comment="mysql less than 4.0.18-32.10"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0883</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0883" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0883" source="CVE"/>
	<description>
	Multiple vulnerabilities in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 allow remote samba servers to cause a denial of service (crash) or gain sensitive information from kernel memory via a samba server (1) returning more data than requested to the smb_proc_read function, (2) returning a data offset from outside the samba packet to the smb_proc_readX function, (3) sending a certain TRANS2 fragmented packet to the smb_receive_trans2 function, (4) sending a samba packet with a certain header size to the smb_proc_readX_data function, or (5) sending a certain packet based offset for the data in a packet to the smb_receive_trans2 function.
	</description>
 </metadata>
<!-- 813fdf370053f0b3c6c44d3451a5152e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030427" comment="kernel-bigsmp less than 2.6.5-7.111.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030428" comment="kernel-default less than 2.6.5-7.111.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030429" comment="kernel-smp less than 2.6.5-7.111.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0885</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0885" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0885" source="CVE"/>
	<description>
	The mod_ssl module in Apache 2.0.35 through 2.0.52, when using the "SSLCipherSuite" directive in directory or location context, allows remote clients to bypass intended restrictions by using any cipher suite that is allowed by the virtual host configuration.
	</description>
 </metadata>
<!-- 91ec22b46babba982fa9b8cd69030968 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030432" comment="libapr0 less than 2.0.49-27.18.3"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0886</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0886" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0886" source="CVE"/>
	<description>
	Multiple integer overflows in libtiff 3.6.1 and earlier allow remote attackers to cause a denial of service (crash or memory corruption) via TIFF images that lead to incorrect malloc calls.
	</description>
 </metadata>
<!-- b041aa0ff3776ef001f5ef9590ac9bd6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030416" comment="kdegraphics3-fax less than 3.2.1-67.12"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0888</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0888" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0888" source="CVE"/>
	<description>
	Multiple integer overflows in xpdf 2.0 and 3.0, and other packages that use xpdf code such as CUPS, gpdf, and kdegraphics, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0889.
	</description>
 </metadata>
<!-- 449241e1570f77459eb9ce4fa0daee03 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030433" comment="cups-client less than 1.1.20-108.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030434" comment="cups-devel less than 1.1.20-108.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030435" comment="cups-libs less than 1.1.20-108.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030436" comment="cups less than 1.1.20-108.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0889</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0889" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0889" source="CVE"/>
	<description>
	Multiple integer overflows in xpdf 3.0, and other packages that use xpdf code such as CUPS, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0888.
	</description>
 </metadata>
<!-- 449241e1570f77459eb9ce4fa0daee03 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030433" comment="cups-client less than 1.1.20-108.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030434" comment="cups-devel less than 1.1.20-108.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030435" comment="cups-libs less than 1.1.20-108.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030436" comment="cups less than 1.1.20-108.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0930</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0930" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0930" source="CVE"/>
	<description>
	The ms_fnmatch function in Samba 3.0.4 and 3.0.7 and possibly other versions allows remote authenticated users to cause a denial of service (CPU consumption) via a SAMBA request that contains multiple * (wildcard) characters.
	</description>
 </metadata>
<!-- f3fc34278c281e2c79bce793e847b018 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030437" comment="samba less than 3.0.4-1.34.3"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0942</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0942" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0942" source="CVE"/>
	<description>
	Apache webserver 2.0.52 and earlier allows remote attackers to cause a denial of service (CPU consumption) via an HTTP GET request with a MIME header containing multiple lines with a large number of space characters.
	</description>
 </metadata>
<!-- 91ec22b46babba982fa9b8cd69030968 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030432" comment="libapr0 less than 2.0.49-27.18.3"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0947</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0947" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0947" source="CVE"/>
	<description>
	Buffer overflow in unarj before 2.63a-r2 allows remote attackers to execute arbitrary code via an arj archive that contains long filenames.
	</description>
 </metadata>
<!-- a5f90882910c626aab4a025ec490d1ae -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030438" comment="unarj less than 2.65-131.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0949</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0949" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0949" source="CVE"/>
	<description>
	The smb_recv_trans2 function call in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 does not properly handle the re-assembly of fragmented packets correctly, which could allow remote samba servers to (1) read arbitrary kernel information or (2) raise a counter value to an arbitrary number by sending the first part of the fragmented packet multiple times.
	</description>
 </metadata>
<!-- 813fdf370053f0b3c6c44d3451a5152e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030427" comment="kernel-bigsmp less than 2.6.5-7.111.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030428" comment="kernel-default less than 2.6.5-7.111.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030429" comment="kernel-smp less than 2.6.5-7.111.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0956</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2004-0956" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0956" source="CVE"/>
	<description>
	MySQL before 4.0.20 allows remote attackers to cause a denial of service (application crash) via a MATCH AGAINST query with an opening double quote but no closing double quote.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 83b0f5c39630e68ca3757f1fa7fb1b42 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030424" comment="mysql-Max less than 4.0.18-32.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030425" comment="mysql less than 4.0.18-32.13"/>
		</criteria>
	</criteria>
	<!-- ee202c526340ebd20b6cac08d230869d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030426" comment="mysql less than 4.0.18-32.10"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0957</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2004-0957" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0957" source="CVE"/>
	<description>
	Unknown vulnerability in MySQL 3.23.58 and earlier, when a local user has privileges for a database whose name includes a "_" (underscore), grants privileges to other databases that have similar names, which can allow the user to conduct unauthorized activities.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 83b0f5c39630e68ca3757f1fa7fb1b42 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030424" comment="mysql-Max less than 4.0.18-32.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030425" comment="mysql less than 4.0.18-32.13"/>
		</criteria>
	</criteria>
	<!-- ee202c526340ebd20b6cac08d230869d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030426" comment="mysql less than 4.0.18-32.10"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0981</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0981" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0981" source="CVE"/>
	<description>
	Buffer overflow in the EXIF parsing routine in ImageMagick before 6.1.0 allows remote attackers to execute arbitrary code via a certain image file.
	</description>
 </metadata>
<!-- 87559c17d06f8b2f7ecf4a7d0f3cca7c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030422" comment="ImageMagick-devel less than 5.5.7-225.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030423" comment="ImageMagick less than 5.5.7-225.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0983</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0983" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0983" source="CVE"/>
	<description>
	The CGI module in Ruby 1.6 before 1.6.8, and 1.8 before 1.8.2, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certain HTTP request.
	</description>
 </metadata>
<!-- c28d786afb20c82c552cde5011cce640 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030439" comment="ruby less than 1.8.1-42.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0986</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0986" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0986" source="CVE"/>
	<description>
	Iptables before 1.2.11, under certain conditions, does not properly load the required modules at system startup, which causes the firewall rules to fail to load and protect the system from remote attackers.
	</description>
 </metadata>
<!-- 5a98e6d9bc406ec2258d085933625560 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030440" comment="iptables less than 1.2.9-95.10"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0989</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0989" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0989" source="CVE"/>
	<description>
	Multiple buffer overflows in libXML 2.6.12 and 2.6.13 (libxml2), and possibly other versions, may allow remote attackers to execute arbitrary code via (1) a long FTP URL that is not properly handled by the xmlNanoFTPScanURL function, (2) a long proxy URL containing FTP data that is not properly handled by the xmlNanoFTPScanProxy function, and other overflows related to manipulation of DNS length values, including (3) xmlNanoFTPConnect, (4) xmlNanoHTTPConnectHost, and (5) xmlNanoHTTPConnectHost.
	</description>
 </metadata>
<!-- ebcaf61f6debd12131a1753d095345dd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030409" comment="libxml-devel less than 1.8.17-366.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030410" comment="libxml less than 1.8.17-366.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1004</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1004" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1004" source="CVE"/>
	<description>
	Multiple format string vulnerabilities in Midnight Commander (mc) 4.5.55 and earlier allow remote attackers to have an unknown impact.
	</description>
 </metadata>
<!-- e702fc9f046fac6627f47fbba14635c5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030441" comment="mc less than 4.6.0-324.10"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1005</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1005" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1005" source="CVE"/>
	<description>
	Multiple buffer overflows in Midnight Commander (mc) 4.5.55 and earlier allow remote attackers to have an unknown impact.
	</description>
 </metadata>
<!-- e702fc9f046fac6627f47fbba14635c5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030441" comment="mc less than 4.6.0-324.10"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1010</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1010" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1010" source="CVE"/>
	<description>
	Buffer overflow in Info-Zip 2.3 and possibly earlier versions, when using recursive folder compression, allows remote attackers to execute arbitrary code via a ZIP file containing a long pathname.
	</description>
 </metadata>
<!-- dfed4f3cf36d0008c8f4f5905228183c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030442" comment="zip less than 2.3-732.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1016</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1016" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1016" source="CVE"/>
	<description>
	The scm_send function in the scm layer for Linux kernel 2.4.x up to 2.4.28, and 2.6.x up to 2.6.9, allows local users to cause a denial of service (system hang) via crafted auxiliary messages that are passed to the sendmsg function, which causes a deadlock condition.
	</description>
 </metadata>
<!-- cacc34d1f090391afbadbdbceedcb110 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030443" comment="kernel-bigsmp less than 2.6.5-7.111.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030444" comment="kernel-default less than 2.6.5-7.111.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030445" comment="kernel-smp less than 2.6.5-7.111.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030446" comment="kernel-source less than 2.6.5-7.111.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030447" comment="kernel-syms less than 2.6.5-7.111.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1025</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1025" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1025" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in imlib 1.9.14 and earlier, which is used by gkrellm and several window managers, allow remote attackers to cause a denial of service (application crash) and execute arbitrary code via certain image files.
	</description>
 </metadata>
<!-- c86d1e9fa933ec51c76978e754b49b51 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030448" comment="imlib-devel less than 1.9.14-180.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030449" comment="imlib less than 1.9.14-180.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1026</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1026" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1026" source="CVE"/>
	<description>
	Multiple integer overflows in the image handler for imlib 1.9.14 and earlier, which is used by gkrellm and several window managers, allow remote attackers to cause a denial of service (application crash) and execute arbitrary code via certain image files.
	</description>
 </metadata>
<!-- c86d1e9fa933ec51c76978e754b49b51 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030448" comment="imlib-devel less than 1.9.14-180.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030449" comment="imlib less than 1.9.14-180.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1029</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1029" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1029" source="CVE"/>
	<description>
	The Sun Java Plugin capability in Java 2 Runtime Environment (JRE) 1.4.2_01, 1.4.2_04, and possibly earlier versions, does not properly restrict access between Javascript and Java applets during data transfer, which allows remote attackers to load unsafe classes and execute arbitrary code by using the reflection API to access private Java packages.
	</description>
 </metadata>
<!-- 782bc79c0ff0ddb58008cb48b00673f8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030450" comment="java2-jre less than 1.4.2-129.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030451" comment="java2 less than 1.4.2-129.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1068</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1068" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1068" source="CVE"/>
	<description>
	A "missing serialization" error in the unix_dgram_recvmsg function in Linux 2.4.27 and earlier, and 2.6.x up to 2.6.9, allows local users to gain privileges via a race condition.
	</description>
 </metadata>
<!-- cacc34d1f090391afbadbdbceedcb110 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030443" comment="kernel-bigsmp less than 2.6.5-7.111.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030444" comment="kernel-default less than 2.6.5-7.111.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030445" comment="kernel-smp less than 2.6.5-7.111.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030446" comment="kernel-source less than 2.6.5-7.111.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030447" comment="kernel-syms less than 2.6.5-7.111.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1070</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1070" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1070" source="CVE"/>
	<description>
	The load_elf_binary function in the binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly check return values from calls to the kernel_read function, which may allow local users to modify sensitive memory in a setuid program and execute arbitrary code.
	</description>
 </metadata>
<!-- 813fdf370053f0b3c6c44d3451a5152e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030427" comment="kernel-bigsmp less than 2.6.5-7.111.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030428" comment="kernel-default less than 2.6.5-7.111.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030429" comment="kernel-smp less than 2.6.5-7.111.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1071</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1071" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1071" source="CVE"/>
	<description>
	The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly handle a failed call to the mmap function, which causes an incorrect mapped image and may allow local users to execute arbitrary code.
	</description>
 </metadata>
<!-- 813fdf370053f0b3c6c44d3451a5152e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030427" comment="kernel-bigsmp less than 2.6.5-7.111.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030428" comment="kernel-default less than 2.6.5-7.111.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030429" comment="kernel-smp less than 2.6.5-7.111.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1072</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1072" source="CVE"/>
	<description>
	The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, may create an interpreter name string that is not NULL terminated, which could cause strings longer than PATH_MAX to be used, leading to buffer overflows that allow local users to cause a denial of service (hang) and possibly execute arbitrary code.
	</description>
 </metadata>
<!-- 813fdf370053f0b3c6c44d3451a5152e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030427" comment="kernel-bigsmp less than 2.6.5-7.111.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030428" comment="kernel-default less than 2.6.5-7.111.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030429" comment="kernel-smp less than 2.6.5-7.111.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1073</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1073" source="CVE"/>
	<description>
	The open_exec function in the execve functionality (exec.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, allows local users to read non-readable ELF binaries by using the interpreter (PT_INTERP) functionality.
	</description>
 </metadata>
<!-- 813fdf370053f0b3c6c44d3451a5152e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030427" comment="kernel-bigsmp less than 2.6.5-7.111.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030428" comment="kernel-default less than 2.6.5-7.111.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030429" comment="kernel-smp less than 2.6.5-7.111.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1074</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1074" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1074" source="CVE"/>
	<description>
	The binfmt functionality in the Linux kernel, when "memory overcommit" is enabled, allows local users to cause a denial of service (kernel oops) via a malformed a.out binary.
	</description>
 </metadata>
<!-- 813fdf370053f0b3c6c44d3451a5152e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030427" comment="kernel-bigsmp less than 2.6.5-7.111.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030428" comment="kernel-default less than 2.6.5-7.111.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030429" comment="kernel-smp less than 2.6.5-7.111.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1125</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1125" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1125" source="CVE"/>
	<description>
	Buffer overflow in the Gfx::doImage function in Gfx.cc for xpdf 3.00, and other products that share code such as tetex-bin and kpdf in KDE 3.2.x to 3.2.3 and 3.3.x to 3.3.2, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted PDF file that causes the boundaries of a maskColors array to be exceeded.
	</description>
 </metadata>
<!-- 3ad799a3724f2f9105c795d872dba922 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030452" comment="cups-client less than 1.1.20-108.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030453" comment="cups-devel less than 1.1.20-108.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030454" comment="cups-libs less than 1.1.20-108.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030455" comment="cups less than 1.1.20-108.22"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1137</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1137" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1137" source="CVE"/>
	<description>
	Multiple vulnerabilities in the IGMP functionality for Linux kernel 2.4.22 to 2.4.28, and 2.6.x to 2.6.9, allow local and remote attackers to cause a denial of service or execute arbitrary code via (1) the ip_mc_source function, which decrements a counter to -1, or (2) the igmp_marksources function, which does not properly validate IGMP message parameters and performs an out-of-bounds read.
	</description>
 </metadata>
<!-- cacc34d1f090391afbadbdbceedcb110 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030443" comment="kernel-bigsmp less than 2.6.5-7.111.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030444" comment="kernel-default less than 2.6.5-7.111.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030445" comment="kernel-smp less than 2.6.5-7.111.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030446" comment="kernel-source less than 2.6.5-7.111.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030447" comment="kernel-syms less than 2.6.5-7.111.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1145</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1145" source="CVE"/>
	<description>
	Multiple vulnerabilities in Konqueror in KDE 3.3.1 and earlier (1) allow access to restricted Java classes via JavaScript and (2) do not properly restrict access to certain Java classes from the Java applet, which allows remote attackers to bypass sandbox restrictions and read or write arbitrary files.
	</description>
 </metadata>
<!-- eccaba5e191d6a572849d18ad0f149ce -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030456" comment="kdelibs3 less than 3.2.1-44.39"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1151</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1151" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1151" source="CVE"/>
	<description>
	Multiple buffer overflows in the (1) sys32_ni_syscall and (2) sys32_vm86_warning functions in sys_ia32.c for Linux 2.6.x may allow local attackers to modify kernel memory and gain privileges.
	</description>
 </metadata>
<!-- cacc34d1f090391afbadbdbceedcb110 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030443" comment="kernel-bigsmp less than 2.6.5-7.111.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030444" comment="kernel-default less than 2.6.5-7.111.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030445" comment="kernel-smp less than 2.6.5-7.111.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030446" comment="kernel-source less than 2.6.5-7.111.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030447" comment="kernel-syms less than 2.6.5-7.111.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1152</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1152" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1152" source="CVE"/>
	<description>
	Buffer overflow in the mailListIsPdf function in Adobe Acrobat Reader 5.09 for Unix allows remote attackers to execute arbitrary code via an e-mail message with a crafted PDF attachment.
	</description>
 </metadata>
<!-- e77160ba6ee3d156fc8dd86250343c9c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030457" comment="acroread less than 5.010-4.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1154</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1154" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1154" source="CVE"/>
	<description>
	Integer overflow in the Samba daemon (smbd) in Samba 2.x and 3.0.x through 3.0.9 allows remote authenticated users to cause a denial of service (application crash) and possibly execute arbitrary code via a Samba request with a large number of security descriptors that triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 1bb1fd92d2c4e26305cb8bfcbdad21dd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030458" comment="libsmbclient-devel less than 3.0.9-2.1.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030459" comment="libsmbclient less than 3.0.9-2.1.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030460" comment="samba-client less than 3.0.9-2.1.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030461" comment="samba-doc less than 3.0.9-2.1.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030462" comment="samba-pdb less than 3.0.9-2.1.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030463" comment="samba-python less than 3.0.9-2.1.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030464" comment="samba-vscan less than 0.3.5-11.7.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030465" comment="samba-winbind less than 3.0.9-2.1.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030466" comment="samba less than 3.0.9-2.1.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1158</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1158" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1158" source="CVE"/>
	<description>
	Konqueror 3.x up to 3.2.2-6, and possibly other versions, allows remote attackers to spoof arbitrary web sites by injecting content from one window into a target window or tab whose name is known but resides in a different domain, as demonstrated using a pop-up window on a trusted web site, aka the "window injection" vulnerability.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- eccaba5e191d6a572849d18ad0f149ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030456" comment="kdelibs3 less than 3.2.1-44.39"/>
	</criteria>
	<!-- f8d3c9b67e958bfd5cbc688fc6ac76b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030467" comment="kdebase3 less than 3.2.1-68.36"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1176</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1176" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1176" source="CVE"/>
	<description>
	Buffer underflow in extfs.c in Midnight Commander (mc) 4.5.55 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code.
	</description>
 </metadata>
<!-- e702fc9f046fac6627f47fbba14635c5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030441" comment="mc less than 4.6.0-324.10"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1177</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2004-1177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1177" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in the driver script in mailman before 2.1.5 allows remote attackers to inject arbitrary web script or HTML via a URL, which is not properly escaped in the resulting error page.
	</description>
 </metadata>
<!-- 02672f09967fbca5a290823e489c26af -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030468" comment="mailman less than 2.1.4-83.16.3"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1182</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1182" source="CVE"/>
	<description>
	hfaxd in HylaFAX before 4.2.1, when installed with a "weak" hosts.hfaxd file, allows remote attackers to authenticate and bypass intended access restrictions via a crafted (1) username or (2) hostname that satisfies a regular expression that is matched against a hosts.hfaxd entry without a password.
	</description>
 </metadata>
<!-- afab9863f2e2029aadbf6bf833f50446 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030469" comment="hylafax less than 4.1.8-24.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1183</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1183" source="CVE"/>
	<description>
	Integer overflow in the tiffdump utility for libtiff 3.7.1 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted TIFF file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 18a037c784e0b7cd1b0d6d2d678e3b55 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030470" comment="libtiff less than 3.6.1-38.14"/>
	</criteria>
	<!-- bb8e62a045c2aac0f526baac5a12c948 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030471" comment="tiff less than 3.6.1-38.14"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1184</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2004-1184" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1184" source="CVE"/>
	<description>
	The EPSF pipe support in enscript 1.6.3 allows remote attackers or local users to execute arbitrary commands via shell metacharacters.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 710731c2084694b924777e34da67a64c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030472" comment="enscript less than 1.6.2-814.6"/>
	</criteria>
	<!-- fae313a6f767fb0e4b284149dd1ccf24 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030472" comment="enscript less than 1.6.2-814.6"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1185</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2004-1185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1185" source="CVE"/>
	<description>
	Enscript 1.6.3 does not sanitize filenames, which allows remote attackers or local users to execute arbitrary commands via crafted filenames.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 710731c2084694b924777e34da67a64c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030472" comment="enscript less than 1.6.2-814.6"/>
	</criteria>
	<!-- fae313a6f767fb0e4b284149dd1ccf24 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030472" comment="enscript less than 1.6.2-814.6"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1186</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2004-1186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1186" source="CVE"/>
	<description>
	Multiple buffer overflows in enscript 1.6.3 allow remote attackers or local users to cause a denial of service (application crash).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 710731c2084694b924777e34da67a64c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030472" comment="enscript less than 1.6.2-814.6"/>
	</criteria>
	<!-- fae313a6f767fb0e4b284149dd1ccf24 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030472" comment="enscript less than 1.6.2-814.6"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1187</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1187" source="CVE"/>
	<description>
	Heap-based buffer overflow in the pnm_get_chunk function for xine 0.99.2, and other packages such as MPlayer that use the same code, allows remote attackers to execute arbitrary code via long PNA_TAG values, a different vulnerability than CVE-2004-1188.
	</description>
 </metadata>
<!-- e1b7caec09d304555ca5c4dd284efd20 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030473" comment="xine-lib less than 0.99.rc3a-106.18"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1188</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1188" source="CVE"/>
	<description>
	The pnm_get_chunk function in xine 0.99.2 and earlier, and other packages such as MPlayer that use the same code, does not properly verify that the chunk size is less than the PREAMBLE_SIZE, which causes a read operation with a negative length that leads to a buffer overflow via (1) RMF_TAG, (2) DATA_TAG, (3) PROP_TAG, (4) MDPR_TAG, and (5) CONT_TAG values, a different vulnerability than CVE-2004-1187.
	</description>
 </metadata>
<!-- e1b7caec09d304555ca5c4dd284efd20 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030473" comment="xine-lib less than 0.99.rc3a-106.18"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1235</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1235" source="CVE"/>
	<description>
	Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor.
	</description>
 </metadata>
<!-- 8494b1da78e4b765909cacbb0215523a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030474" comment="kernel-bigsmp less than 2.6.5-7.111.30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030475" comment="kernel-default less than 2.6.5-7.111.30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030476" comment="kernel-smp less than 2.6.5-7.111.30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030477" comment="kernel-source less than 2.6.5-7.111.30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030478" comment="kernel-syms less than 2.6.5-7.111.30"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1267</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1267" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1267" source="CVE"/>
	<description>
	Buffer overflow in the ParseCommand function in hpgl-input.c in the hpgltops program for CUPS 1.1.22 allows remote attackers to execute arbitrary code via a crafted HPGL file.
	</description>
 </metadata>
<!-- 3ad799a3724f2f9105c795d872dba922 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030452" comment="cups-client less than 1.1.20-108.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030453" comment="cups-devel less than 1.1.20-108.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030454" comment="cups-libs less than 1.1.20-108.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030455" comment="cups less than 1.1.20-108.22"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1268</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1268" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1268" source="CVE"/>
	<description>
	lppasswd in CUPS 1.1.22 ignores write errors when modifying the CUPS passwd file, which allows local users to corrupt the file by filling the associated file system and triggering the write errors.
	</description>
 </metadata>
<!-- 3ad799a3724f2f9105c795d872dba922 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030452" comment="cups-client less than 1.1.20-108.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030453" comment="cups-devel less than 1.1.20-108.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030454" comment="cups-libs less than 1.1.20-108.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030455" comment="cups less than 1.1.20-108.22"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1300</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1300" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1300" source="CVE"/>
	<description>
	Buffer overflow in the open_aiff_file function in demux_aiff.c for xine-lib (libxine) 1-rc7 allows remote attackers to execute arbitrary code via a crafted AIFF file.
	</description>
 </metadata>
<!-- e1b7caec09d304555ca5c4dd284efd20 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030473" comment="xine-lib less than 0.99.rc3a-106.18"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1304</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1304" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1304" source="CVE"/>
	<description>
	Stack-based buffer overflow in the ELF header parsing code in file before 4.12 allows attackers to execute arbitrary code via a crafted ELF file.
	</description>
 </metadata>
<!-- 381e2bac88c1021fd101ecffeded4618 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030479" comment="file less than 4.07-48.8"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1487</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2004-1487" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1487" source="CVE"/>
	<description>
	wget 1.8.x and 1.9.x allows a remote malicious web server to overwrite certain files via a redirection URL containing a ".." that resolves to the IP address of the malicious server, which bypasses wget's filtering for ".." sequences.
	</description>
 </metadata>
<!-- 69ab05af8c65eb68c88d3dcfdde7ce33 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030480" comment="wget less than 1.9.1-45.10.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1488</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2004-1488" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1488" source="CVE"/>
	<description>
	wget 1.8.x and 1.9.x does not filter or quote control characters when displaying HTTP responses to the terminal, which may allow remote malicious web servers to inject terminal escape sequences and execute arbitrary code.
	</description>
 </metadata>
<!-- e7b01249711fe56bb3b36a58d161aeea -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030481" comment="wget less than 1.9.1-45.16"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1772</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1772" source="CVE"/>
	<description>
	Stack-based buffer overflow in shar in GNU sharutils 4.2.1 allows local users to execute arbitrary code via a long -o command line argument.
	</description>
 </metadata>
<!-- c017779e535f590b8aa70d49948724f6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030482" comment="sharutils less than 4.2c-710.10"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20042652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-2652</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2004-2652" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2652" source="CVE"/>
	<description>
	The DecodeTCPOptions function in decode.c in Snort before 2.3.0, when printing TCP/IP options using FAST output or verbose mode, allows remote attackers to cause a denial of service (crash) via packets with invalid TCP/IP options, which trigger a null dereference.
	</description>
 </metadata>
<!-- 5089e6d3510ca8b78864f8a2a44eb7da -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030483" comment="snort less than 2.3.2-0.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0005</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0005" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0005" source="CVE"/>
	<description>
	Heap-based buffer overflow in psd.c for ImageMagick 6.1.0, 6.1.7, and possibly earlier versions allows remote attackers to execute arbitrary code via a .PSD image file with a large number of layers.
	</description>
 </metadata>
<!-- 87559c17d06f8b2f7ecf4a7d0f3cca7c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030422" comment="ImageMagick-devel less than 5.5.7-225.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030423" comment="ImageMagick less than 5.5.7-225.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0013</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0013" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0013" source="CVE"/>
	<description>
	nwclient.c in ncpfs before 2.2.6 does not drop root privileges before executing utilities using the NetWare client functions, which allows local users to gain privileges.
	</description>
 </metadata>
<!-- 011af757e120a14a2fae7dc271470bac -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030484" comment="ncpfs less than 2.2.4-25.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0014</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0014" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0014" source="CVE"/>
	<description>
	Buffer overflow in ncplogin in ncpfs before 2.2.6 allows remote malicious NetWare servers to execute arbitrary code on the NetWare client.
	</description>
 </metadata>
<!-- 011af757e120a14a2fae7dc271470bac -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030484" comment="ncpfs less than 2.2.4-25.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0064</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0064" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0064" source="CVE"/>
	<description>
	Buffer overflow in the Decrypt::makeFileKey2 function in Decrypt.cc for xpdf 3.00 and earlier allows remote attackers to execute arbitrary code via a PDF file with a large /Encrypt /Length keyLength value.
	</description>
 </metadata>
<!-- 3ad799a3724f2f9105c795d872dba922 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030452" comment="cups-client less than 1.1.20-108.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030453" comment="cups-devel less than 1.1.20-108.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030454" comment="cups-libs less than 1.1.20-108.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030455" comment="cups less than 1.1.20-108.22"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0077</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0077" source="CVE"/>
	<description>
	The DBI library (libdbi-perl) for Perl allows local users to overwrite arbitrary files via a symlink attack on a temporary PID file.
	</description>
 </metadata>
<!-- 8aa98d5798533419fb0a3680753d016e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030485" comment="perl-DBI less than 1.41-28.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0085</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0085" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0085" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in ht://dig (htdig) before 3.1.6-r7 allows remote attackers to execute arbitrary web script or HTML via the config parameter, which is not properly sanitized before it is displayed in an error message.
	</description>
 </metadata>
<!-- fa6460ee9d0f0d2825a93384290f3be6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030486" comment="htdig less than 3.1.6-402.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0089</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0089" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0089" source="CVE"/>
	<description>
	The SimpleXMLRPCServer library module in Python 2.2, 2.3 before 2.3.5, and 2.4, when used by XML-RPC servers that use the register_instance method to register an object without a _dispatch method, allows remote attackers to read or modify globals of the associated module, and possibly execute arbitrary code, via dotted attributes.
	</description>
 </metadata>
<!-- 5eeac52472f698f9b7d58fdd1ad968ce -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030487" comment="python less than 2.3.3-88.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0102</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0102" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0102" source="CVE"/>
	<description>
	Integer overflow in camel-lock-helper in Evolution 2.0.2 and earlier allows local users or remote malicious POP3 servers to execute arbitrary code via a length value of -1, which leads to a zero byte memory allocation and a buffer overflow.
	</description>
 </metadata>
<!-- fb4269ad84693e505fb2ee19888151ef -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030488" comment="evolution-pilot less than 2.0.1-1.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030489" comment="evolution less than 2.0.1-1.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0135</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0135" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0135" source="CVE"/>
	<description>
	The unw_unwind_to_user function in unwind.c on Itanium (ia64) architectures in Linux kernel 2.6 allows local users to cause a denial of service (system crash).
	</description>
 </metadata>
<!-- 2558830537429cdedb543926fd6344a8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0136</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0136" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0136" source="CVE"/>
	<description>
	The Linux kernel before 2.6.11 on the Itanium IA64 platform has certain "ptrace corner cases" that allow local users to cause a denial of service (crash) via crafted syscalls, possibly related to MCA/INIT, a different vulnerability than CVE-2005-1761.
	</description>
 </metadata>
<!-- 2558830537429cdedb543926fd6344a8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0155</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0155" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0155" source="CVE"/>
	<description>
	The PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to create arbitrary files via the PERLIO_DEBUG variable.
	</description>
 </metadata>
<!-- 7e6cf48cf7a796f79176269c2c18b8df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030411" comment="perl less than 5.8.3-32.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0156</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0156" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0156" source="CVE"/>
	<description>
	Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree.
	</description>
 </metadata>
<!-- 7e6cf48cf7a796f79176269c2c18b8df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030411" comment="perl less than 5.8.3-32.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0160</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0160" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0160" source="CVE"/>
	<description>
	Multiple buffer overflows in unace 1.2b allow attackers to execute arbitrary code via (1) 2 overflows in ACE archives, (2) a long command line argument, or (3) certain "Ready for next volume" messages.
	</description>
 </metadata>
<!-- a57bec2ad73500fd2a5526eca6b9e9f4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030490" comment="unace less than 1.2b-621.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0161</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0161" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0161" source="CVE"/>
	<description>
	Multiple directory traversal vulnerabilities in unace 1.2b allow attackers to overwrite arbitrary files via an ACE archive containing (1) ../ sequences or (2) absolute pathnames.
	</description>
 </metadata>
<!-- a57bec2ad73500fd2a5526eca6b9e9f4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030490" comment="unace less than 1.2b-621.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0202</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0202" source="CVE"/>
	<description>
	Directory traversal vulnerability in the true_path function in private.py for Mailman 2.1.5 and earlier allows remote attackers to read arbitrary files via ".../....///" sequences, which are not properly cleansed by regular expressions that are intended to remove "../" and "./" sequences.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 98f5b90c27d1ba5c76b51671dbbdb8bf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030491" comment="mailman less than 2.1.4-83.13"/>
	</criteria>
	<!-- f55591f9a204677ce573ccf38ce9c0c1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030492" comment="mailman less than 2.1.4-83.14"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0208</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0208" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0208" source="CVE"/>
	<description>
	The HTML parsing functions in Gaim before 1.1.4 allow remote attackers to cause a denial of service (application crash) via malformed HTML that causes "an invalid memory access," a different vulnerability than CVE-2005-0473.
	</description>
 </metadata>
<!-- ed0637feec1572bbe30dd794972df4ef -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030493" comment="gaim less than 1.0.3-2.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0209</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0209" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0209" source="CVE"/>
	<description>
	Netfilter in Linux kernel 2.6.8.1 allows remote attackers to cause a denial of service (kernel crash) via crafted IP packet fragments.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2558830537429cdedb543926fd6344a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- 54a1f3c286aab229c33a01a912db9ffa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030421" comment="kernel-bigsmp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0210</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0210" source="CVE"/>
	<description>
	Netfilter in the Linux kernel 2.6.8.1 allows local users to cause a denial of service (memory consumption) via certain packet fragments that are reassembled twice, which causes a data structure to be allocated twice.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2558830537429cdedb543926fd6344a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- 54a1f3c286aab229c33a01a912db9ffa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030421" comment="kernel-bigsmp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0227</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0227" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0227" source="CVE"/>
	<description>
	PostgreSQL (pgsql) 7.4.x, 7.2.x, and other versions allows local users to load arbitrary shared libraries and execute code via the LOAD extension.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8522a86bfa9ca66f0b82fb3eb0042bae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030494" comment="postgresql-contrib less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030495" comment="postgresql-devel less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030496" comment="postgresql-docs less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030497" comment="postgresql-libs less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030498" comment="postgresql-pl less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030499" comment="postgresql-server less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030500" comment="postgresql less than 7.4.8-0.6"/>
		</criteria>
	</criteria>
	<!-- e782a2a7e7df8fe7a4f54f1fa8172438 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030501" comment="postgresql-contrib less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030502" comment="postgresql-devel less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030503" comment="postgresql-docs less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030504" comment="postgresql-libs less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030505" comment="postgresql-pl less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030506" comment="postgresql-server less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030507" comment="postgresql less than 7.4.7-0.5"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0231</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0231" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0231" source="CVE"/>
	<description>
	Firefox 1.0 does not invoke the Javascript Security Manager when a user drags a javascript: or data: URL to a tab, which allows remote attackers to bypass the security model, aka "firetabbing."
	</description>
 </metadata>
<!-- a51f0a3982f40ddfe509b210b6288bd7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030508" comment="MozillaFirefox-translations less than 1.0.1-9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030509" comment="MozillaFirefox less than 1.0.1-9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0232</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0232" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0232" source="CVE"/>
	<description>
	Firefox 1.0 allows remote attackers to modify Boolean configuration parameters for the about:config site by using a plugin such as Flash, and the -moz-opacity filter, to display the about:config site then cause the user to double-click at a certain screen position, aka "Fireflashing."
	</description>
 </metadata>
<!-- a51f0a3982f40ddfe509b210b6288bd7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030508" comment="MozillaFirefox-translations less than 1.0.1-9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030509" comment="MozillaFirefox less than 1.0.1-9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0233</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0233" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0233" source="CVE"/>
	<description>
	The International Domain Name (IDN) support in Firefox 1.0, Camino .8.5, and Mozilla before 1.7.6 allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks.
	</description>
 </metadata>
<!-- a51f0a3982f40ddfe509b210b6288bd7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030508" comment="MozillaFirefox-translations less than 1.0.1-9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030509" comment="MozillaFirefox less than 1.0.1-9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0244</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0244" source="CVE"/>
	<description>
	PostgreSQL 8.0.0 and earlier allows local users to bypass the EXECUTE permission check for functions by using the CREATE AGGREGATE command.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8522a86bfa9ca66f0b82fb3eb0042bae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030494" comment="postgresql-contrib less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030495" comment="postgresql-devel less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030496" comment="postgresql-docs less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030497" comment="postgresql-libs less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030498" comment="postgresql-pl less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030499" comment="postgresql-server less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030500" comment="postgresql less than 7.4.8-0.6"/>
		</criteria>
	</criteria>
	<!-- e782a2a7e7df8fe7a4f54f1fa8172438 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030501" comment="postgresql-contrib less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030502" comment="postgresql-devel less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030503" comment="postgresql-docs less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030504" comment="postgresql-libs less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030505" comment="postgresql-pl less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030506" comment="postgresql-server less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030507" comment="postgresql less than 7.4.7-0.5"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0245</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0245" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0245" source="CVE"/>
	<description>
	Buffer overflow in gram.y for PostgreSQL 8.0.0 and earlier may allow attackers to execute arbitrary code via a large number of arguments to a refcursor function (gram.y), which leads to a heap-based buffer overflow, a different vulnerability than CVE-2005-0247.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8522a86bfa9ca66f0b82fb3eb0042bae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030494" comment="postgresql-contrib less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030495" comment="postgresql-devel less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030496" comment="postgresql-docs less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030497" comment="postgresql-libs less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030498" comment="postgresql-pl less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030499" comment="postgresql-server less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030500" comment="postgresql less than 7.4.8-0.6"/>
		</criteria>
	</criteria>
	<!-- e782a2a7e7df8fe7a4f54f1fa8172438 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030501" comment="postgresql-contrib less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030502" comment="postgresql-devel less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030503" comment="postgresql-docs less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030504" comment="postgresql-libs less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030505" comment="postgresql-pl less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030506" comment="postgresql-server less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030507" comment="postgresql less than 7.4.7-0.5"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0246</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0246" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0246" source="CVE"/>
	<description>
	The intagg contrib module for PostgreSQL 8.0.0 and earlier allows attackers to cause a denial of service (crash) via crafted arrays.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8522a86bfa9ca66f0b82fb3eb0042bae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030494" comment="postgresql-contrib less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030495" comment="postgresql-devel less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030496" comment="postgresql-docs less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030497" comment="postgresql-libs less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030498" comment="postgresql-pl less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030499" comment="postgresql-server less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030500" comment="postgresql less than 7.4.8-0.6"/>
		</criteria>
	</criteria>
	<!-- e782a2a7e7df8fe7a4f54f1fa8172438 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030501" comment="postgresql-contrib less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030502" comment="postgresql-devel less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030503" comment="postgresql-docs less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030504" comment="postgresql-libs less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030505" comment="postgresql-pl less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030506" comment="postgresql-server less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030507" comment="postgresql less than 7.4.7-0.5"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0247</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0247" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0247" source="CVE"/>
	<description>
	Multiple buffer overflows in gram.y for PostgreSQL 8.0.1 and earlier may allow attackers to execute arbitrary code via (1) a large number of variables in a SQL statement being handled by the read_sql_construct function, (2) a large number of INTO variables in a SELECT statement being handled by the make_select_stmt function, (3) a large number of arbitrary variables in a SELECT statement being handled by the make_select_stmt function, and (4) a large number of INTO variables in a FETCH statement being handled by the make_fetch_stmt function, a different set of vulnerabilities than CVE-2005-0245.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8522a86bfa9ca66f0b82fb3eb0042bae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030494" comment="postgresql-contrib less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030495" comment="postgresql-devel less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030496" comment="postgresql-docs less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030497" comment="postgresql-libs less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030498" comment="postgresql-pl less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030499" comment="postgresql-server less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030500" comment="postgresql less than 7.4.8-0.6"/>
		</criteria>
	</criteria>
	<!-- e782a2a7e7df8fe7a4f54f1fa8172438 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030501" comment="postgresql-contrib less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030502" comment="postgresql-devel less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030503" comment="postgresql-docs less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030504" comment="postgresql-libs less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030505" comment="postgresql-pl less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030506" comment="postgresql-server less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030507" comment="postgresql less than 7.4.7-0.5"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0255</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0255" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0255" source="CVE"/>
	<description>
	String handling functions in Mozilla 1.7.3, Firefox 1.0, and Thunderbird before 1.0.2, such as the nsTSubstring_CharT::Replace function, do not properly check the return values of other functions that resize the string, which allows remote attackers to cause a denial of service and possibly execute arbitrary code by forcing an out-of-memory state that causes a reallocation to fail and return a pointer to a fixed address, which leads to heap corruption.
	</description>
 </metadata>
<!-- a51f0a3982f40ddfe509b210b6288bd7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030508" comment="MozillaFirefox-translations less than 1.0.1-9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030509" comment="MozillaFirefox less than 1.0.1-9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0366</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0366" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0366" source="CVE"/>
	<description>
	The integrity check feature in OpenPGP, when handling a message that was encrypted using cipher feedback (CFB) mode, allows remote attackers to recover part of the plaintext via a chosen-ciphertext attack when the first 2 bytes of a message block are known, and an oracle or other mechanism is available to determine whether an integrity check failed.
	</description>
 </metadata>
<!-- 91bd5b75ab1218a3ee7853871ac831ce -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030510" comment="gpg less than 1.2.4-68.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0373</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0373" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0373" source="CVE"/>
	<description>
	Buffer overflow in digestmd5.c CVS release 1.170 (also referred to as digestmda5.c), as used in the DIGEST-MD5 SASL plugin for Cyrus-SASL but not in any official releases, allows remote attackers to execute arbitrary code.
	</description>
 </metadata>
<!-- 231841f94b974632df612072f02006f2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030511" comment="cyrus-sasl less than 2.1.18-33.8"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0384</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0384" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0384" source="CVE"/>
	<description>
	Unknown vulnerability in the PPP driver for the Linux kernel 2.6.8.1 allows remote attackers to cause a denial of service (kernel crash) via a pppd client.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2558830537429cdedb543926fd6344a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- 54a1f3c286aab229c33a01a912db9ffa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030421" comment="kernel-bigsmp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0397</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0397" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0397" source="CVE"/>
	<description>
	Format string vulnerability in the SetImageInfo function in image.c for ImageMagick before 6.0.2.5 may allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via format string specifiers in a filename argument to convert, which may be called by other web applications.
	</description>
 </metadata>
<!-- 1490ed18ddb279674a13c8504396e7ca -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030512" comment="ImageMagick-devel less than 5.5.7-225.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030513" comment="ImageMagick less than 5.5.7-225.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0400</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0400" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0400" source="CVE"/>
	<description>
	The ext2_make_empty function call in the Linux kernel before 2.6.11.6 does not properly initialize memory when creating a block for a new directory entry, which allows local users to obtain potentially sensitive information by reading the block.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 012927c610add3677c52ec3a28a1648d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030514" comment="kernel-default less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030515" comment="kernel-smp less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030516" comment="kernel-source less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030517" comment="kernel-syms less than 2.6.5-7.155.29"/>
		</criteria>
	</criteria>
	<!-- d616efaaa3764b063cc5bd3d6d09c89e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030518" comment="kernel-bigsmp less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030514" comment="kernel-default less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030515" comment="kernel-smp less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030516" comment="kernel-source less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030517" comment="kernel-syms less than 2.6.5-7.155.29"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0449</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0449" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0449" source="CVE"/>
	<description>
	The netfilter/iptables module in Linux before 2.6.8.1 allows remote attackers to cause a denial of service (kernel crash) or bypass firewall rules via crafted packets, which are not properly handled by the skb_checksum_help function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2558830537429cdedb543926fd6344a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- 54a1f3c286aab229c33a01a912db9ffa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030421" comment="kernel-bigsmp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0455</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0455" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0455" source="CVE"/>
	<description>
	Stack-based buffer overflow in the CSmil1Parser::testAttributeFailed function in smlparse.cpp for RealNetworks RealPlayer 10.5 (6.0.12.1056 and earlier), 10, 8, and RealOne Player V2 and V1 allows remote attackers to execute arbitrary code via a .SMIL file with a large system-screen-size value.
	</description>
 </metadata>
<!-- bd4aed60b3fec6205fd20cd615124c7e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030519" comment="RealPlayer less than 10.0.3-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0468</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0468" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0468" source="CVE"/>
	<description>
	Heap-based buffer overflow in the env_opt_add function in telnet.c for various BSD-based Telnet clients allows remote attackers to execute arbitrary code via responses that contain a large number of characters that require escaping, which consumers more memory than allocated.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b1e64e238134069ad4b3519f91102157 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030520" comment="telnet less than 1.1-38.6"/>
	</criteria>
	<!-- c3eba5032aa49dac64765a0316cf948a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030521" comment="heimdal-devel less than 0.6.1rc3-55.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030522" comment="heimdal-lib less than 0.6.1rc3-55.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030523" comment="heimdal less than 0.6.1rc3-55.15"/>
		</criteria>
	</criteria>
	<!-- d186f2c228e08c5865db6bb658b39807 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030524" comment="telnet less than 1.1-38.9"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0469</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0469" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0469" source="CVE"/>
	<description>
	Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b1e64e238134069ad4b3519f91102157 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030520" comment="telnet less than 1.1-38.6"/>
	</criteria>
	<!-- c3eba5032aa49dac64765a0316cf948a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030521" comment="heimdal-devel less than 0.6.1rc3-55.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030522" comment="heimdal-lib less than 0.6.1rc3-55.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030523" comment="heimdal less than 0.6.1rc3-55.15"/>
		</criteria>
	</criteria>
	<!-- d186f2c228e08c5865db6bb658b39807 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030524" comment="telnet less than 1.1-38.9"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0472</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0472" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0472" source="CVE"/>
	<description>
	Gaim before 1.1.3 allows remote attackers to cause a denial of service (infinite loop) via malformed SNAC packets from (1) AIM or (2) ICQ.
	</description>
 </metadata>
<!-- ed0637feec1572bbe30dd794972df4ef -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030493" comment="gaim less than 1.0.3-2.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0473</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0473" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0473" source="CVE"/>
	<description>
	The HTML parsing functions in Gaim before 1.1.3 allow remote attackers to cause a denial of service (application crash) via malformed HTML that causes "an invalid memory access," a different vulnerability than CVE-2005-0208.
	</description>
 </metadata>
<!-- ed0637feec1572bbe30dd794972df4ef -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030493" comment="gaim less than 1.0.3-2.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0488</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0488" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0488" source="CVE"/>
	<description>
	Certain BSD-based Telnet clients, including those used on Solaris and SuSE Linux, allow remote malicious Telnet servers to read sensitive environment variables via the NEW-ENVIRON option with a SEND ENV_USERVAR command.
	</description>
 </metadata>
<!-- d186f2c228e08c5865db6bb658b39807 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030524" comment="telnet less than 1.1-38.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0504</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0504" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0504" source="CVE"/>
	<description>
	Buffer overflow in the MoxaDriverIoctl function for the moxa serial driver (moxa.c) in Linux 2.2.x, 2.4.x, and 2.6.x before 2.6.22 allows local users to execute arbitrary code via a certain modified length value.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2558830537429cdedb543926fd6344a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- 54a1f3c286aab229c33a01a912db9ffa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030421" comment="kernel-bigsmp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0529</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0529" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0529" source="CVE"/>
	<description>
	Linux kernel 2.6.10 and 2.6.11rc1-bk6 uses different size types for offset arguments to the proc_file_read and locks_read_proc functions, which leads to a heap-based buffer overflow when a signed comparison causes negative integers to be used in a positive context.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2558830537429cdedb543926fd6344a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- 54a1f3c286aab229c33a01a912db9ffa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030421" comment="kernel-bigsmp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0530</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0530" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0530" source="CVE"/>
	<description>
	Signedness error in the copy_from_read_buf function in n_tty.c for Linux kernel 2.6.10 and 2.6.11rc1 allows local users to read kernel memory via a negative argument.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2558830537429cdedb543926fd6344a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- 54a1f3c286aab229c33a01a912db9ffa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030421" comment="kernel-bigsmp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0532</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0532" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0532" source="CVE"/>
	<description>
	The reiserfs_copy_from_user_to_file_region function in reiserfs/file.c for Linux kernel 2.6.10 and 2.6.11 before 2.6.11-rc4, when running on 64-bit architectures, may allow local users to trigger a buffer overflow as a result of casting discrepancies between size_t and int data types.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2558830537429cdedb543926fd6344a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- 54a1f3c286aab229c33a01a912db9ffa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030421" comment="kernel-bigsmp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0605</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0605" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0605" source="CVE"/>
	<description>
	scan.c for LibXPM may allow attackers to execute arbitrary code via a negative bitmap_unit value that leads to a buffer overflow.
	</description>
 </metadata>
<!-- da039ce086e1ed3aac07762982d8569f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030525" comment="XFree86-libs less than 4.3.99.902-43.42.5"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0611</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0611" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0611" source="CVE"/>
	<description>
	Heap-based buffer overflow in RealNetworks RealPlayer 10.5 (6.0.12.1056 and earlier), 10, 8, and RealOne Player V2 and V1, allows remote attackers to execute arbitrary code via .WAV files.
	</description>
 </metadata>
<!-- bd4aed60b3fec6205fd20cd615124c7e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030519" comment="RealPlayer less than 10.0.3-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0664</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0664" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0664" source="CVE"/>
	<description>
	Buffer overflow in the EXIF library (libexif) 0.6.9 does not properly validate the structure of the EXIF tags, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a JPEG image with a crafted EXIF tag.
	</description>
 </metadata>
<!-- d8cf9a498a682c8218818f0af83739a7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030526" comment="libexif less than 0.5.12-118.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0706</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0706" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0706" source="CVE"/>
	<description>
	Buffer overflow in discdb.c for grip 3.1.2 allows attackers to cause a denial of service (crash) and possibly execute arbitrary code by causing the cddb lookup to return more matches than expected.
	</description>
 </metadata>
<!-- a9b2b8c3a049831dfe42a9cc69112c52 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030412" comment="gnome-vfs2-32bit less than 9-200504132212"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030413" comment="gnome-vfs2-doc less than 2.6.1-6.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030414" comment="gnome-vfs2 less than 2.6.1-6.23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0709</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0709" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0709" source="CVE"/>
	<description>
	MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, allows remote authenticated users with INSERT and DELETE privileges to execute arbitrary code by using CREATE FUNCTION to access libc calls, as demonstrated by using strcat, on_exit, and exit.
	</description>
 </metadata>
<!-- 83b0f5c39630e68ca3757f1fa7fb1b42 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030424" comment="mysql-Max less than 4.0.18-32.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030425" comment="mysql less than 4.0.18-32.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0710</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0710" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0710" source="CVE"/>
	<description>
	MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, allows remote authenticated users with INSERT and DELETE privileges to bypass library path restrictions and execute arbitrary libraries by using INSERT INTO to modify the mysql.func table, which is processed by the udf_init function.
	</description>
 </metadata>
<!-- 83b0f5c39630e68ca3757f1fa7fb1b42 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030424" comment="mysql-Max less than 4.0.18-32.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030425" comment="mysql less than 4.0.18-32.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0711</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0711" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0711" source="CVE"/>
	<description>
	MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, uses predictable file names when creating temporary tables, which allows local users with CREATE TEMPORARY TABLE privileges to overwrite arbitrary files via a symlink attack.
	</description>
 </metadata>
<!-- 83b0f5c39630e68ca3757f1fa7fb1b42 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030424" comment="mysql-Max less than 4.0.18-32.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030425" comment="mysql less than 4.0.18-32.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0749</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0749" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0749" source="CVE"/>
	<description>
	The load_elf_library in the Linux kernel before 2.6.11.6 allows local users to cause a denial of service (kernel crash) via a crafted ELF library or executable, which causes a free of an invalid pointer.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 012927c610add3677c52ec3a28a1648d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030514" comment="kernel-default less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030515" comment="kernel-smp less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030516" comment="kernel-source less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030517" comment="kernel-syms less than 2.6.5-7.155.29"/>
		</criteria>
	</criteria>
	<!-- d616efaaa3764b063cc5bd3d6d09c89e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030518" comment="kernel-bigsmp less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030514" comment="kernel-default less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030515" comment="kernel-smp less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030516" comment="kernel-source less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030517" comment="kernel-syms less than 2.6.5-7.155.29"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0752</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0752" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0752" source="CVE"/>
	<description>
	The Plugin Finder Service (PFS) in Firefox before 1.0.3 allows remote attackers to execute arbitrary code via a javascript: URL in the PLUGINSPAGE attribute of an EMBED tag.
	</description>
 </metadata>
<!-- 76dc0c1abc074e6410c0550425653945 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030527" comment="MozillaFirefox-translations less than 1.0.3-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030528" comment="MozillaFirefox less than 1.0.3-0.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0836</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0836" source="CVE"/>
	<description>
	Argument injection vulnerability in Java Web Start for J2SE 1.4.2 up to 1.4.2_06 allows untrusted applications to gain privileges via the value parameter of a property tag in a JNLP file.
	</description>
 </metadata>
<!-- b5567e88bcedd66fdf6fc0178b4246a5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030529" comment="java2-jre less than 1.4.2-129.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030530" comment="java2 less than 1.4.2-129.14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0941</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0941" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0941" source="CVE"/>
	<description>
	The StgCompObjStream::Load function in OpenOffice.org OpenOffice 1.1.4 and earlier allocates memory based on 16 bit length values, but process memory using 32 bit values, which allows remote attackers to cause a denial of service and possibly execute arbitrary code via a DOC document with certain length values, which leads to a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 06e6754ef4168e45075415036c96260a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030531" comment="OpenOffice_org-cs less than 1.1.3-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030532" comment="OpenOffice_org-da less than 1.1.3-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030533" comment="OpenOffice_org-de less than 1.1.3-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030534" comment="OpenOffice_org-en-help less than 1.1.3-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030535" comment="OpenOffice_org-en less than 1.1.3-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030536" comment="OpenOffice_org-es less than 1.1.3-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030537" comment="OpenOffice_org-fi less than 1.1.3-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030538" comment="OpenOffice_org-fr less than 1.1.3-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030539" comment="OpenOffice_org-gnome less than 1.1.3-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030540" comment="OpenOffice_org-hu less than 1.1.3-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030541" comment="OpenOffice_org-it less than 1.1.3-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030542" comment="OpenOffice_org-ja less than 1.1.3-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030543" comment="OpenOffice_org-kde less than 1.1.3-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030544" comment="OpenOffice_org-pl less than 1.1.3-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030545" comment="OpenOffice_org-pt less than 1.1.3-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030546" comment="OpenOffice_org-ru less than 1.1.3-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030547" comment="OpenOffice_org-sk less than 1.1.3-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030548" comment="OpenOffice_org-sv less than 1.1.3-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030549" comment="OpenOffice_org-zh-CN less than 1.1.3-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030550" comment="OpenOffice_org-zh-TW less than 1.1.3-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030551" comment="OpenOffice_org less than 1.1.3-0.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0965</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0965" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0965" source="CVE"/>
	<description>
	The gaim_markup_strip_html function in Gaim 1.2.0, and possibly earlier versions, allows remote attackers to cause a denial of service (application crash) via a string that contains malformed HTML, which causes an out-of-bounds read.
	</description>
 </metadata>
<!-- ed0637feec1572bbe30dd794972df4ef -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030493" comment="gaim less than 1.0.3-2.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0966</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0966" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0966" source="CVE"/>
	<description>
	The IRC protocol plugin in Gaim 1.2.0, and possibly earlier versions, allows (1) remote attackers to inject arbitrary Gaim markup via irc_msg_kick, irc_msg_mode, irc_msg_part, irc_msg_quit, (2) remote attackers to inject arbitrary Pango markup and pop up empty dialog boxes via irc_msg_invite, or (3) malicious IRC servers to cause a denial of service (application crash) by injecting certain Pango markup into irc_msg_badmode, irc_msg_banned, irc_msg_unknown, irc_msg_nochan functions.
	</description>
 </metadata>
<!-- ed0637feec1572bbe30dd794972df4ef -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030493" comment="gaim less than 1.0.3-2.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0967</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0967" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0967" source="CVE"/>
	<description>
	Gaim 1.2.0 allows remote attackers to cause a denial of service (application crash) via a malformed file transfer request to a Jabber user, which leads to an out-of-bounds read.
	</description>
 </metadata>
<!-- ed0637feec1572bbe30dd794972df4ef -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030493" comment="gaim less than 1.0.3-2.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0989</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-0989" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0989" source="CVE"/>
	<description>
	The find_replen function in jsstr.c in the Javascript engine for Mozilla Suite 1.7.6, Firefox 1.0.1 and 1.0.2, and Netscape 7.2 allows remote attackers to read portions of heap memory in a Javascript string via the lambda replace method.
	</description>
 </metadata>
<!-- 76dc0c1abc074e6410c0550425653945 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030527" comment="MozillaFirefox-translations less than 1.0.3-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030528" comment="MozillaFirefox less than 1.0.3-0.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1041</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-1041" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1041" source="CVE"/>
	<description>
	The fib_seq_start function in fib_hash.c in Linux kernel allows local users to cause a denial of service (system crash) via /proc/net/route.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e2c7f08437e0128f5441c08f313e453 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- c7050141b3702832a32e74185b621254 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030556" comment="kernel-bigsmp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1046</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-1046" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1046" source="CVE"/>
	<description>
	Buffer overflow in the kimgio library for KDE 3.4.0 allows remote attackers to execute arbitrary code via a crafted PCX image file.
	</description>
 </metadata>
<!-- 8b08d6b6387b6b5534e53f6ab4fbae74 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030557" comment="kdelibs3 less than 3.2.1-44.49"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1111</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-1111" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1111" source="CVE"/>
	<description>
	Race condition in cpio 2.6 and earlier allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by cpio after the decompression is complete.
	</description>
 </metadata>
<!-- 538e74e078656d72bf43e00c836ab28a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030558" comment="cpio less than 2.5-324.12"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1151</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-1151" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1151" source="CVE"/>
	<description>
	qpopper 4.0.5 and earlier does not properly drop privileges before processing certain user-supplied files, which allows local users to overwrite or create arbitrary files as root.
	</description>
 </metadata>
<!-- 6c73963608b172bac22ae461783e4f8b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030559" comment="qpopper less than 4.0.5-175.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1152</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-1152" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1152" source="CVE"/>
	<description>
	popauth.c in qpopper 4.0.5 and earlier does not properly set the umask, which may cause qpopper to create files with group or world-writable permissions.
	</description>
 </metadata>
<!-- 6c73963608b172bac22ae461783e4f8b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030559" comment="qpopper less than 4.0.5-175.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1153</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-1153" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1153" source="CVE"/>
	<description>
	Firefox before 1.0.3 and Mozilla Suite before 1.7.7, when blocking a popup, allows remote attackers to execute arbitrary code via a javascript: URL that is executed when the user selects the "Show javascript" option.
	</description>
 </metadata>
<!-- 76dc0c1abc074e6410c0550425653945 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030527" comment="MozillaFirefox-translations less than 1.0.3-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030528" comment="MozillaFirefox less than 1.0.3-0.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1154</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-1154" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1154" source="CVE"/>
	<description>
	Firefox before 1.0.3 and Mozilla Suite before 1.7.7 allows remote attackers to execute arbitrary script in other domains via a setter function for a variable in the target domain, which is executed when the user visits that domain, aka "Cross-site scripting through global scope pollution."
	</description>
 </metadata>
<!-- 76dc0c1abc074e6410c0550425653945 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030527" comment="MozillaFirefox-translations less than 1.0.3-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030528" comment="MozillaFirefox less than 1.0.3-0.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1155</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-1155" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1155" source="CVE"/>
	<description>
	The favicon functionality in Firefox before 1.0.3 and Mozilla Suite before 1.7.7 allows remote attackers to execute arbitrary code via a &lt;LINK rel="icon"&gt; tag with a javascript: URL in the href attribute, aka "Firelinking."
	</description>
 </metadata>
<!-- 76dc0c1abc074e6410c0550425653945 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030527" comment="MozillaFirefox-translations less than 1.0.3-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030528" comment="MozillaFirefox less than 1.0.3-0.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1156</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-1156" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1156" source="CVE"/>
	<description>
	Firefox before 1.0.3, Mozilla Suite before 1.7.7, and Netscape 7.2 allows remote attackers to execute arbitrary script and code via a new search plugin using sidebar.addSearchEngine, aka "Firesearching 1."
	</description>
 </metadata>
<!-- 76dc0c1abc074e6410c0550425653945 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030527" comment="MozillaFirefox-translations less than 1.0.3-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030528" comment="MozillaFirefox less than 1.0.3-0.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1157</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-1157" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1157" source="CVE"/>
	<description>
	Firefox before 1.0.3, Mozilla Suite before 1.7.7, and Netscape 7.2 allows remote attackers to replace existing search plugins with malicious ones using sidebar.addSearchEngine and the same filename as the target engine, which may not be displayed in the GUI, which could then be used to execute malicious script, aka "Firesearching 2."
	</description>
 </metadata>
<!-- 76dc0c1abc074e6410c0550425653945 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030527" comment="MozillaFirefox-translations less than 1.0.3-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030528" comment="MozillaFirefox less than 1.0.3-0.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1158</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-1158" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1158" source="CVE"/>
	<description>
	Multiple "missing security checks" in Firefox before 1.0.3 allow remote attackers to inject arbitrary Javascript into privileged pages using the _search target of the Firefox sidebar.
	</description>
 </metadata>
<!-- 76dc0c1abc074e6410c0550425653945 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030527" comment="MozillaFirefox-translations less than 1.0.3-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030528" comment="MozillaFirefox less than 1.0.3-0.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1159</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-1159" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1159" source="CVE"/>
	<description>
	The native implementations of InstallTrigger and other functions in Firefox before 1.0.3 and Mozilla Suite before 1.7.7 do not properly verify the types of objects being accessed, which causes the Javascript interpreter to continue execution at the wrong memory address, which may allow attackers to cause a denial of service (application crash) and possibly execute arbitrary code by passing objects of the wrong type.
	</description>
 </metadata>
<!-- 76dc0c1abc074e6410c0550425653945 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030527" comment="MozillaFirefox-translations less than 1.0.3-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030528" comment="MozillaFirefox less than 1.0.3-0.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1160</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-1160" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1160" source="CVE"/>
	<description>
	The privileged "chrome" UI code in Firefox before 1.0.3 and Mozilla Suite before 1.7.7 allows remote attackers to gain privileges by overriding certain properties or methods of DOM nodes, as demonstrated using multiple attacks involving the eval function or the Script object.
	</description>
 </metadata>
<!-- 76dc0c1abc074e6410c0550425653945 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030527" comment="MozillaFirefox-translations less than 1.0.3-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030528" comment="MozillaFirefox less than 1.0.3-0.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1195</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-1195" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1195" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in the code used to handle (1) MMS over TCP (MMST) streams or (2) RealMedia RTSP streams in xine-lib before 1.0, and other products that use xine-lib such as MPlayer 1.0pre6 and earlier, allow remote malicious servers to execute arbitrary code.
	</description>
 </metadata>
<!-- 69bc75d9611c9a34ee1477f41f93936b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030560" comment="xine-lib less than 0.99.rc3a-106.21"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1229</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-1229" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1229" source="CVE"/>
	<description>
	Directory traversal vulnerability in cpio 2.6 and earlier allows remote attackers to write to arbitrary directories via a .. (dot dot) in a cpio file.
	</description>
 </metadata>
<!-- 538e74e078656d72bf43e00c836ab28a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030558" comment="cpio less than 2.5-324.12"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1260</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-1260" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1260" source="CVE"/>
	<description>
	bzip2 allows remote attackers to cause a denial of service (hard drive consumption) via a crafted bzip2 file that causes an infinite loop (a.k.a "decompression bomb").
	</description>
 </metadata>
<!-- 62eba860a1c612912f9af711b282c987 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030561" comment="bzip2 less than 1.0.2-346.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1261</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-1261" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1261" source="CVE"/>
	<description>
	Stack-based buffer overflow in the URL parsing function in Gaim before 1.3.0 allows remote attackers to execute arbitrary code via an instant message (IM) with a large URL.
	</description>
 </metadata>
<!-- d6874ef813024726dc994c09520114cc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030562" comment="gaim less than 1.0.3-2.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1262</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-1262" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1262" source="CVE"/>
	<description>
	Gaim 1.2.1 and earlier allows remote attackers to cause a denial of service (application crash) via a malformed MSN message.
	</description>
 </metadata>
<!-- ed0637feec1572bbe30dd794972df4ef -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030493" comment="gaim less than 1.0.3-2.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1263</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-1263" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1263" source="CVE"/>
	<description>
	The elf_core_dump function in binfmt_elf.c for Linux kernel 2.x.x to 2.2.27-rc2, 2.4.x to 2.4.31-pre1, and 2.6.x to 2.6.12-rc4 allows local users to execute arbitrary code via an ELF binary that, in certain conditions involving the create_elf_tables function, causes a negative length argument to pass a signed integer comparison, leading to a buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 012927c610add3677c52ec3a28a1648d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030514" comment="kernel-default less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030515" comment="kernel-smp less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030516" comment="kernel-source less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030517" comment="kernel-syms less than 2.6.5-7.155.29"/>
		</criteria>
	</criteria>
	<!-- d616efaaa3764b063cc5bd3d6d09c89e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030518" comment="kernel-bigsmp less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030514" comment="kernel-default less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030515" comment="kernel-smp less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030516" comment="kernel-source less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030517" comment="kernel-syms less than 2.6.5-7.155.29"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1268</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-1268" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1268" source="CVE"/>
	<description>
	Off-by-one error in the mod_ssl Certificate Revocation List (CRL) verification callback in Apache, when configured to use a CRL, allows remote attackers to cause a denial of service (child process crash) via a CRL that causes a buffer overflow of one null byte.
	</description>
 </metadata>
<!-- 7dde1155c50a2611fa6b1c72b78ea3bb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030563" comment="libapr0 less than 2.0.49-27.29"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1269</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-1269" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1269" source="CVE"/>
	<description>
	Gaim before 1.3.1 allows remote attackers to cause a denial of service (application crash) via a Yahoo! message with non-ASCII characters in a file name.
	</description>
 </metadata>
<!-- ed0637feec1572bbe30dd794972df4ef -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030493" comment="gaim less than 1.0.3-2.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1278</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-1278" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1278" source="CVE"/>
	<description>
	The isis_print function, as called by isoclns_print, in tcpdump 3.9.1 and earlier allows remote attackers to cause a denial of service (infinite loop) via a zero length, as demonstrated using a GRE packet.
	</description>
 </metadata>
<!-- bd6998678d5bd996ff251f8fe2d75bfa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030564" comment="tcpdump less than 3.8.1-49.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051279" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1279</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-1279" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1279" source="CVE"/>
	<description>
	tcpdump 3.8.3 and earlier allows remote attackers to cause a denial of service (infinite loop) via a crafted (1) BGP packet, which is not properly handled by RT_ROUTING_INFO, or (2) LDP packet, which is not properly handled by the ldp_print function.
	</description>
 </metadata>
<!-- bd6998678d5bd996ff251f8fe2d75bfa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030564" comment="tcpdump less than 3.8.1-49.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051280" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1280</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-1280" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1280" source="CVE"/>
	<description>
	The rsvp_print function in tcpdump 3.9.1 and earlier allows remote attackers to cause a denial of service (infinite loop) via a crafted RSVP packet of length 4.
	</description>
 </metadata>
<!-- bd6998678d5bd996ff251f8fe2d75bfa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030564" comment="tcpdump less than 3.8.1-49.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1409</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-1409" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1409" source="CVE"/>
	<description>
	PostgreSQL 7.3.x through 8.0.x gives public EXECUTE access to certain character conversion functions, which allows unprivileged users to call those functions with malicious values, with unknown impact, aka the "Character conversion vulnerability."
	</description>
 </metadata>
<!-- 8522a86bfa9ca66f0b82fb3eb0042bae -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030494" comment="postgresql-contrib less than 7.4.8-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030495" comment="postgresql-devel less than 7.4.8-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030496" comment="postgresql-docs less than 7.4.8-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030497" comment="postgresql-libs less than 7.4.8-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030498" comment="postgresql-pl less than 7.4.8-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030499" comment="postgresql-server less than 7.4.8-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030500" comment="postgresql less than 7.4.8-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1410</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-1410" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1410" source="CVE"/>
	<description>
	The tsearch2 module in PostgreSQL 7.4 through 8.0.x declares the (1) dex_init, (2) snb_en_init, (3) snb_ru_init, (4) spell_init, and (5) syn_init functions as "internal" even when they do not take an internal argument, which allows attackers to cause a denial of service (application crash) and possibly have other impacts via SQL commands that call other functions that accept internal arguments.
	</description>
 </metadata>
<!-- 8522a86bfa9ca66f0b82fb3eb0042bae -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030494" comment="postgresql-contrib less than 7.4.8-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030495" comment="postgresql-devel less than 7.4.8-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030496" comment="postgresql-docs less than 7.4.8-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030497" comment="postgresql-libs less than 7.4.8-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030498" comment="postgresql-pl less than 7.4.8-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030499" comment="postgresql-server less than 7.4.8-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030500" comment="postgresql less than 7.4.8-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1431</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-1431" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1431" source="CVE"/>
	<description>
	The "record packet parsing" in GnuTLS 1.2 before 1.2.3 and 1.0 before 1.0.25 allows remote attackers to cause a denial of service, possibly related to padding bytes in gnutils_cipher.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- f93152df6a15f25149d78610657d2b17 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030565" comment="libredcarpet-python less than 2.4.8-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030566" comment="libredcarpet-tools less than 2.4.8-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030567" comment="libredcarpet less than 2.4.8-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030568" comment="libsoup-32bit less than 9-200508251319"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030569" comment="libsoup-devel-32bit less than 9-200508251319"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030570" comment="libsoup-devel less than 2.2.3-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030571" comment="libsoup less than 2.2.3-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030572" comment="rcd-devel less than 2.4.8-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030573" comment="rcd-modules-devel less than 2.4.8-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030574" comment="rcd-modules less than 2.4.8-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030575" comment="rcd less than 2.4.8-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030576" comment="red-carpet less than 2.4.4-1.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030577" comment="rug less than 2.4.8-0.2"/>
		</criteria>
	</criteria>
	<!-- facaf52555b6fe0ef2cc9af986881d24 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030578" comment="gnutls-devel less than 1.0.8-26.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030579" comment="gnutls less than 1.0.8-26.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1544</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-1544" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1544" source="CVE"/>
	<description>
	Stack-based buffer overflow in libTIFF before 3.7.2 allows remote attackers to execute arbitrary code via a TIFF file with a malformed BitsPerSample tag.
	</description>
 </metadata>
<!-- 48fb8d157fcd5511278ed1129c23ec5f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030580" comment="libtiff less than 3.6.1-38.17"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1625</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-1625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1625" source="CVE"/>
	<description>
	Stack-based buffer overflow in the UnixAppOpenFilePerform function in Adobe Reader 5.0.9 and 5.0.10 for Unix allows remote attackers to execute arbitrary code via a PDF document with a long /Filespec tag.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4e7ef03dbccdffc282ee127ce2ec5ff4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030581" comment="acroread less than 7.0.0-5.4"/>
	</criteria>
	<!-- 6a2a1bded05dadefb3b54a98eb068e7a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030582" comment="atk-32bit less than 9-200508151719"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030583" comment="atk-doc less than 1.6.0-2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030584" comment="atk less than 1.6.0-2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030585" comment="curl-32bit less than 9-200508151719"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030586" comment="glib2-32bit less than 9-200508151719"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030587" comment="glib2 less than 2.4.6-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030588" comment="glibc-locale-32bit less than 9-200508151719"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030589" comment="gtk2-32bit less than 9-200508151719"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030590" comment="gtk2-devel less than 2.4.14-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030591" comment="gtk2-doc less than 2.4.14-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030592" comment="gtk2 less than 2.4.14-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030593" comment="pango-32bit less than 9-200508151719"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030594" comment="pango less than 1.4.1-0.2"/>
		</criteria>
	</criteria>
	<!-- 7c1a0c9c884f08dfefd2f3ca9e85e5d9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030581" comment="acroread less than 7.0.0-5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030595" comment="curl-32bit less than 9-200507130235"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030596" comment="glibc-locale-32bit less than 9-200507130235"/>
		</criteria>
	</criteria>
	<!-- 8440156f365603ca364878d284ec4e4c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030581" comment="acroread less than 7.0.0-5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030597" comment="atk-32bit less than 9-200507191046"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030598" comment="atk-doc less than 1.6.0-2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030599" comment="atk less than 1.6.0-2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030600" comment="curl-32bit less than 9-200507191046"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030601" comment="glib2-32bit less than 9-200507191046"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030602" comment="glib2 less than 2.4.6-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030603" comment="glibc-locale-32bit less than 9-200507191046"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030604" comment="gtk2-32bit less than 9-200507191046"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030605" comment="gtk2 less than 2.4.9-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030606" comment="pango-32bit less than 9-200507191046"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030607" comment="pango less than 1.4.1-0.1"/>
		</criteria>
	</criteria>
	<!-- e4e5a02e16f26b863bdc39c013ca827e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030608" comment="atk-32bit less than 9-200508261636"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030583" comment="atk-doc less than 1.6.0-2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030584" comment="atk less than 1.6.0-2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030609" comment="curl-32bit less than 9-200508261636"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030610" comment="glib2-32bit less than 9-200508261636"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030587" comment="glib2 less than 2.4.6-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030611" comment="glibc-locale-32bit less than 9-200508261636"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030612" comment="gtk2-32bit less than 9-200508261636"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030590" comment="gtk2-devel less than 2.4.14-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030591" comment="gtk2-doc less than 2.4.14-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030592" comment="gtk2 less than 2.4.14-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030613" comment="pango-32bit less than 9-200508261636"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030594" comment="pango less than 1.4.1-0.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1686</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-1686" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1686" source="CVE"/>
	<description>
	Format string vulnerability in gedit 2.10.2 may allow attackers to cause a denial of service (application crash) via a bin file with format string specifiers in the filename.  NOTE: while this issue is triggered on the command line by the gedit user, it has been reported that web browsers and email clients could be configured to provide a file name as an argument to gedit, so there is a valid attack that crosses security boundaries.
	</description>
 </metadata>
<!-- 20b4d6e20cabe54a0978ec88596c0a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030614" comment="gedit less than 2.6.1-2.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1765</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-1765" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1765" source="CVE"/>
	<description>
	syscall in the Linux kernel 2.6.8.1 and 2.6.10 for the AMD64 platform, when running in 32-bit compatibility mode, allows local users to cause a denial of service (kernel hang) via crafted arguments.
	</description>
 </metadata>
<!-- e10ca3709a9019caf2c4ceda142f2980 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030615" comment="kernel-default less than 2.6.5-7.201"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030616" comment="kernel-smp less than 2.6.5-7.201"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1768</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-1768" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1768" source="CVE"/>
	<description>
	Race condition in the ia32 compatibility code for the execve system call in Linux kernel 2.4 before 2.4.31 and 2.6 before 2.6.6 allows local users to cause a denial of service (kernel panic) and possibly execute arbitrary code via a concurrent thread that increments a pointer count after the nargs function has counted the pointers, but before the count is copied from user space to kernel space, which leads to a buffer overflow.
	</description>
 </metadata>
<!-- b3d76bae3ffcf76948bbfbfd5dbe2685 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030619" comment="kernel-default less than 2.6.5-7.193"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030620" comment="kernel-smp less than 2.6.5-7.193"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030621" comment="kernel-source less than 2.6.5-7.193"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030622" comment="kernel-syms less than 2.6.5-7.193"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1848</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-1848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1848" source="CVE"/>
	<description>
	The dhcpcd DHCP client before 1.3.22 allows remote attackers to cause a denial of service (daemon crash) via unknown vectors that cause an out-of-bounds memory read.
	</description>
 </metadata>
<!-- 98183fdd3d8a3a7c07861653644147d2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030623" comment="dhcpcd less than 1.3.22pl4-193.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1849</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-1849" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1849" source="CVE"/>
	<description>
	inftrees.h in zlib 1.2.2 allows remote attackers to cause a denial of service (application crash) via an invalid file that causes a large dynamic tree to be produced.
	</description>
 </metadata>
<!-- 3c0be2ab654cac1e3ab58a80d1e62102 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030624" comment="zlib-devel less than 1.2.1-70.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030625" comment="zlib less than 1.2.1-70.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1852</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-1852" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1852" source="CVE"/>
	<description>
	Multiple integer overflows in libgadu, as used in Kopete in KDE 3.2.3 to 3.4.1, ekg before 1.6rc3, GNU Gadu, CenterICQ, Kadu, and other packages, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an incoming message.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 22f4a8af3319e755b6c5d84dec9f6552 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030626" comment="kdenetwork3-nld-InstantMessenger less than 3.3.0-0.12"/>
	</criteria>
	<!-- 637482df74f39ca2b0e25b1021b0a851 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030627" comment="gaim less than 1.2.0-0.7"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1918</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-1918" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1918" source="CVE"/>
	<description>
	The original patch for a GNU tar directory traversal vulnerability (CVE-2002-0399) in Red Hat Enterprise Linux 3 and 2.1 uses an "incorrect optimization" that allows user-assisted attackers to overwrite arbitrary files via a crafted tar file, probably involving "/../" sequences with a leading "/".
	</description>
 </metadata>
<!-- cffcc0146fa6ba2fd6d7036a5d1643b8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030402" comment="tar less than 1.13.25-325.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1920</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-1920" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1920" source="CVE"/>
	<description>
	The (1) Kate and (2) Kwrite applications in KDE KDE 3.2.x through 3.4.0 do not properly set the same permissions on the backup file as were set on the original file, which could allow local users and possibly remote attackers to obtain sensitive information.
	</description>
 </metadata>
<!-- 882cebd6cc237278167dea9c852551c7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030628" comment="kdelibs3-devel less than 3.2.1-44.55"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030629" comment="kdelibs3 less than 3.2.1-44.55"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1934</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-1934" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1934" source="CVE"/>
	<description>
	Gaim before 1.3.1 allows remote attackers to cause a denial of service (crash) via a malformed MSN message that leads to a memory allocation of a large size, possibly due to an integer signedness error.
	</description>
 </metadata>
<!-- ed0637feec1572bbe30dd794972df4ef -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030493" comment="gaim less than 1.0.3-2.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1974</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-1974" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1974" source="CVE"/>
	<description>
	Unspecified vulnerability in Java 2 Platform, Standard Edition (J2SE) 5.0 and 5.0 Update 1 and J2SE 1.4.2 up to 1.4.2_07, as used in multiple products and platforms including (1) HP-UX and (2) APC PowerChute, allows applications to assign permissions to themselves and gain privileges.
	</description>
 </metadata>
<!-- b5567e88bcedd66fdf6fc0178b4246a5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030529" comment="java2-jre less than 1.4.2-129.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030530" comment="java2 less than 1.4.2-129.14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1992</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-1992" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1992" source="CVE"/>
	<description>
	The XMLRPC server in utils.rb for the ruby library (libruby) 1.8 sets an invalid default value that prevents "security protection" using handlers, which allows remote attackers to execute arbitrary commands.
	</description>
 </metadata>
<!-- 3f8741eeb1c46c850b9afea1439732d4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030630" comment="ruby less than 1.8.1-42.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1993</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-1993" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1993" source="CVE"/>
	<description>
	Race condition in sudo 1.3.1 up to 1.6.8p8, when the ALL pseudo-command is used after a user entry in the sudoers file, allows local users to gain privileges via a symlink attack.
	</description>
 </metadata>
<!-- 67c43cf74d430d2dd1f2caefb768a6cf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030631" comment="sudo less than 1.6.7p5-117.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2040</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2040" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2040" source="CVE"/>
	<description>
	Multiple buffer overflows in the getterminaltype function in telnetd for Heimdal before 0.6.5 may allow remote attackers to execute arbitrary code, a different vulnerability than CVE-2005-0468 and CVE-2005-0469.
	</description>
 </metadata>
<!-- 7a1bd2904b1dafed2c6c5e32debc62d9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030632" comment="heimdal less than 0.6.1rc3-55.18"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2069</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2069" source="CVE"/>
	<description>
	pam_ldap and nss_ldap, when used with OpenLDAP and connecting to a slave using TLS, does not use TLS for the subsequent connection if the client is referred to a master, which may cause a password to be sent in cleartext and allows remote attackers to sniff the password.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5d12991ea3c6ae75260aec8c7091e137 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030633" comment="openldap2-client less than 2.2.24-4.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030634" comment="openldap2-devel less than 2.2.24-4.8"/>
		</criteria>
	</criteria>
	<!-- 9a1cbfa4630090b717a1c1e9d550d07a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030635" comment="pam_ldap less than 169-28.4"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2088</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2088" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2088" source="CVE"/>
	<description>
	The Apache HTTP server before 1.3.34, and 2.0.x before 2.0.55, when acting as an HTTP proxy, allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Apache to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
	</description>
 </metadata>
<!-- 7dde1155c50a2611fa6b1c72b78ea3bb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030563" comment="libapr0 less than 2.0.49-27.29"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2090</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2090" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2090" source="CVE"/>
	<description>
	Jakarta Tomcat 5.0.19 (Coyote/1.1) and Tomcat 4.1.24 (Coyote/1.0) allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Tomcat to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
	</description>
 </metadata>
<!-- 315ff7a101fca9aabbfab11879f31212 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030636" comment="jakarta-tomcat less than 5.0.19-29.11"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2096</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2096" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2096" source="CVE"/>
	<description>
	zlib 1.2 and later versions allows remote attackers to cause a denial of service (crash) via a crafted compressed stream with an incomplete code description of a length greater than 1, which leads to a buffer overflow, as demonstrated using a crafted PNG file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3c0be2ab654cac1e3ab58a80d1e62102 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030624" comment="zlib-devel less than 1.2.1-70.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030625" comment="zlib less than 1.2.1-70.12"/>
		</criteria>
	</criteria>
	<!-- 4456a1446341a2b3b1d097cd08c8dbb6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030637" comment="zlib-devel less than 1.2.1-70.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030638" comment="zlib less than 1.2.1-70.9"/>
		</criteria>
	</criteria>
	<!-- 5e0c398872bb913989b43ea4a15c84ac -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030639" comment="perl-Compress-Zlib less than 1.33-30.4"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2102</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2102" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2102" source="CVE"/>
	<description>
	The AIM/ICQ module in Gaim before 1.5.0 allows remote attackers to cause a denial of service (application crash) via a filename that contains invalid UTF-8 characters.
	</description>
 </metadata>
<!-- 637482df74f39ca2b0e25b1021b0a851 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030627" comment="gaim less than 1.2.0-0.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2103</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2103" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2103" source="CVE"/>
	<description>
	Buffer overflow in the AIM and ICQ module in Gaim before 1.5.0 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an away message with a large number of AIM substitution strings, such as %t or %n.
	</description>
 </metadata>
<!-- 637482df74f39ca2b0e25b1021b0a851 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030627" comment="gaim less than 1.2.0-0.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2177</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2177" source="CVE"/>
	<description>
	Net-SNMP 5.0.x before 5.0.10.2, 5.2.x before 5.2.1.2, and 5.1.3, when net-snmp is using stream sockets such as TCP, allows remote attackers to cause a denial of service (daemon hang and CPU consumption) via a TCP packet of length 1, which triggers an infinite loop.
	</description>
 </metadata>
<!-- 03773b86152a9cf5a9cdb80046a8a724 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030640" comment="net-snmp less than 5.1-80.22"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2335</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2335" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2335" source="CVE"/>
	<description>
	Buffer overflow in the POP3 client in Fetchmail before 6.2.5.2 allows remote POP3 servers to cause a denial of service and possibly execute arbitrary code via long UIDL responses.  NOTE: a typo in an advisory accidentally used the wrong CVE identifier for the Fetchmail issue. This is the correct identifier.
	</description>
 </metadata>
<!-- 99a4c8ea19b0741d4fb2cbde545272f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030641" comment="fetchmail less than 6.2.5-49.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2337</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2337" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2337" source="CVE"/>
	<description>
	Ruby 1.6.x up to 1.6.8, 1.8.x up to 1.8.2, and 1.9.0 development up to 2005-09-01 allows attackers to bypass safe level and taint flag protections and execute disallowed code when Ruby processes a program through standard input (stdin).
	</description>
 </metadata>
<!-- 65591114d5c671d5d00755c7dc73908d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030642" comment="ruby less than 1.8.1-42.10"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2456</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2456" source="CVE"/>
	<description>
	Array index overflow in the xfrm_sk_policy_insert function in xfrm_user.c in Linux kernel 2.6 allows local users to cause a denial of service (oops or deadlock) and possibly execute arbitrary code via a p-&gt;dir value that is larger than XFRM_POLICY_OUT, which is used as an index in the sock-&gt;sk_policy array.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- cc4cac8da682a37bd29679876758bccf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030643" comment="kernel-bigsmp less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030615" comment="kernel-default less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030616" comment="kernel-smp less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
		</criteria>
	</criteria>
	<!-- e10ca3709a9019caf2c4ceda142f2980 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030615" comment="kernel-default less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030616" comment="kernel-smp less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2457</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2457" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2457" source="CVE"/>
	<description>
	The driver for compressed ISO file systems (zisofs) in the Linux kernel before 2.6.12.5 allows local users and remote attackers to cause a denial of service (kernel crash) via a crafted compressed ISO file system.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- cc4cac8da682a37bd29679876758bccf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030643" comment="kernel-bigsmp less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030615" comment="kernel-default less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030616" comment="kernel-smp less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
		</criteria>
	</criteria>
	<!-- e10ca3709a9019caf2c4ceda142f2980 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030615" comment="kernel-default less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030616" comment="kernel-smp less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2458</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2458" source="CVE"/>
	<description>
	inflate.c in the zlib routines in the Linux kernel before 2.6.12.5 allows remote attackers to cause a denial of service (kernel crash) via a compressed file with "improper tables".
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- cc4cac8da682a37bd29679876758bccf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030643" comment="kernel-bigsmp less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030615" comment="kernel-default less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030616" comment="kernel-smp less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
		</criteria>
	</criteria>
	<!-- e10ca3709a9019caf2c4ceda142f2980 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030615" comment="kernel-default less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030616" comment="kernel-smp less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2459</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2459" source="CVE"/>
	<description>
	The huft_build function in inflate.c in the zlib routines in the Linux kernel before 2.6.12.5 returns the wrong value, which allows remote attackers to cause a denial of service (kernel crash) via a certain compressed file that leads to a null pointer dereference, a different vulnerbility than CVE-2005-2458.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- cc4cac8da682a37bd29679876758bccf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030643" comment="kernel-bigsmp less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030615" comment="kernel-default less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030616" comment="kernel-smp less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
		</criteria>
	</criteria>
	<!-- e10ca3709a9019caf2c4ceda142f2980 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030615" comment="kernel-default less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030616" comment="kernel-smp less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2470</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2470" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2470" source="CVE"/>
	<description>
	Buffer overflow in a "core application plug-in" for Adobe Reader 5.1 through 7.0.2 and Acrobat 5.0 through 7.0.2 allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4a061c28380008ffcc1c4f3f50c4c229 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030644" comment="acroread less than 7.0.1-2.2"/>
	</criteria>
	<!-- e4e5a02e16f26b863bdc39c013ca827e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030608" comment="atk-32bit less than 9-200508261636"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030583" comment="atk-doc less than 1.6.0-2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030584" comment="atk less than 1.6.0-2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030609" comment="curl-32bit less than 9-200508261636"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030610" comment="glib2-32bit less than 9-200508261636"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030587" comment="glib2 less than 2.4.6-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030611" comment="glibc-locale-32bit less than 9-200508261636"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030612" comment="gtk2-32bit less than 9-200508261636"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030590" comment="gtk2-devel less than 2.4.14-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030591" comment="gtk2-doc less than 2.4.14-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030592" comment="gtk2 less than 2.4.14-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030613" comment="pango-32bit less than 9-200508261636"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030594" comment="pango less than 1.4.1-0.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2471</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2471" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2471" source="CVE"/>
	<description>
	pstopnm in netpbm does not properly use the "-dSAFER" option when calling Ghostscript to convert a PostScript file into a (1) PBM, (2) PGM, or (3) PNM file, which allows external user-assisted attackers to execute arbitrary commands.
	</description>
 </metadata>
<!-- ed799257235ba3dc80fe0e5578642fc8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030645" comment="libnetpbm less than 1.0.0-618.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030646" comment="netpbm less than 10.11.4-172.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2490</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2490" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2490" source="CVE"/>
	<description>
	Stack-based buffer overflow in the sendmsg function call in the Linux kernel 2.6 before 2.6.13.1 allows local users execute arbitrary code by calling sendmsg and modifying the message contents in another thread.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e2c7f08437e0128f5441c08f313e453 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- c7050141b3702832a32e74185b621254 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030556" comment="kernel-bigsmp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2491</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2491" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2491" source="CVE"/>
	<description>
	Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions (PCRE) before 6.2, as used in multiple products such as Python, Ethereal, and PHP, allows attackers to execute arbitrary code via quantifier values in regular expressions, which leads to a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b5ee8d570837e8d054b4dc0125fb4447 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030647" comment="python-32bit less than 9-200712110030"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030648" comment="python-curses less than 2.3.3-88.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030649" comment="python-demo less than 2.3.3-88.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030650" comment="python-devel less than 2.3.3-88.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030651" comment="python-doc-pdf less than 2.3.3-88.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030652" comment="python-doc less than 2.3.3-88.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030653" comment="python-gdbm less than 2.3.3-88.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030654" comment="python-idle less than 2.3.3-88.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030655" comment="python-mpz less than 2.3.3-88.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030656" comment="python-tk less than 2.3.3-88.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030657" comment="python-xml less than 2.3.3-88.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030658" comment="python less than 2.3.3-88.18"/>
		</criteria>
	</criteria>
	<!-- e58d810ac0db99188b131e1a59b6c63e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030659" comment="pcre-devel less than 4.4-109.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030660" comment="pcre less than 4.4-109.4"/>
		</criteria>
	</criteria>
	<!-- f2a372ddb83d6f0e292e5c1e24bd50df -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030661" comment="libapr0 less than 2.0.49-27.34"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2495</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2495" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2495" source="CVE"/>
	<description>
	Multiple integer overflows in XFree86 before 4.3.0 allow user-assisted attackers to execute arbitrary code via a crafted pixmap image.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 21d7ac2cc55a0ea9ead625bf2538e728 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030662" comment="XFree86-Xvnc less than 4.3.99.902-43.50.3"/>
	</criteria>
	<!-- 3d6df3814d44ff22980e1553b6d66fab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030663" comment="XFree86-server less than 4.3.99.902-43.50.3"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2549</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2549" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2549" source="CVE"/>
	<description>
	Multiple format string vulnerabilities in Evolution 1.5 through 2.3.6.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) full vCard data, (2) contact data from remote LDAP servers, or (3) task list data from remote servers.
	</description>
 </metadata>
<!-- c4057f5954b5370db387b3407e4a9192 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030664" comment="evolution-devel less than 2.0.4-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030665" comment="evolution-pilot less than 2.0.4-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030666" comment="evolution less than 2.0.4-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2550</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2550" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2550" source="CVE"/>
	<description>
	Format string vulnerability in Evolution 1.4 through 2.3.6.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the calendar entries such as task lists, which are not properly handled when the user selects the Calendars tab.
	</description>
 </metadata>
<!-- c4057f5954b5370db387b3407e4a9192 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030664" comment="evolution-devel less than 2.0.4-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030665" comment="evolution-pilot less than 2.0.4-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030666" comment="evolution less than 2.0.4-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2555</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2555" source="CVE"/>
	<description>
	Linux kernel 2.6.x does not properly restrict socket policy access to users with the CAP_NET_ADMIN capability, which could allow local users to conduct unauthorized activities via (1) ipv4/ip_sockglue.c and (2) ipv6/ipv6_sockglue.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- cc4cac8da682a37bd29679876758bccf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030643" comment="kernel-bigsmp less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030615" comment="kernel-default less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030616" comment="kernel-smp less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
		</criteria>
	</criteria>
	<!-- e10ca3709a9019caf2c4ceda142f2980 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030615" comment="kernel-default less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030616" comment="kernel-smp less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2558</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2558" source="CVE"/>
	<description>
	Stack-based buffer overflow in the init_syms function in MySQL 4.0 before 4.0.25, 4.1 before 4.1.13, and 5.0 before 5.0.7-beta allows remote authenticated users who can create user-defined functions to execute arbitrary code via a long function_name field.
	</description>
 </metadata>
<!-- c8fb4edbc90e89596212e0827b8bf34d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030667" comment="mysql-Max less than 4.0.18-32.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030668" comment="mysql-devel less than 4.0.18-32.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030669" comment="mysql less than 4.0.18-32.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2700</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2700" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2700" source="CVE"/>
	<description>
	ssl_engine_kernel.c in mod_ssl before 2.8.24, when using "SSLVerifyClient optional" in the global virtual host configuration, does not properly enforce "SSLVerifyClient require" in a per-location context, which allows remote attackers to bypass intended access restrictions.
	</description>
 </metadata>
<!-- f2a372ddb83d6f0e292e5c1e24bd50df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030661" comment="libapr0 less than 2.0.49-27.34"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2701</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2701" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2701" source="CVE"/>
	<description>
	Heap-based buffer overflow in Firefox before 1.0.7 and Mozilla Suite before 1.7.12 allows remote attackers to execute arbitrary code via an XBM image file that ends in a large number of spaces instead of the expected end tag.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8de3ea0ba7cd0da892d902baee1e6d60 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030670" comment="MozillaFirefox-translations less than 1.0.7-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030671" comment="MozillaFirefox less than 1.0.7-0.2"/>
		</criteria>
	</criteria>
	<!-- b310b00e5cb76adf21b02190e55fb6a2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030672" comment="mozilla-cs less than 1.7.5-4.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030673" comment="mozilla-deat less than 1.7.6-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030674" comment="mozilla-devel less than 1.7.8-5.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030675" comment="mozilla-dom-inspector less than 1.7.8-5.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030676" comment="mozilla-hu less than 1.78-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030677" comment="mozilla-irc less than 1.7.8-5.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030678" comment="mozilla-ja less than 1.7.7-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030679" comment="mozilla-ko less than 1.75-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030680" comment="mozilla-lib64 less than 1.6-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030681" comment="mozilla-mail less than 1.7.8-5.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030682" comment="mozilla-venkman less than 1.7.8-5.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030683" comment="mozilla less than 1.7.8-5.13"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2702</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2702" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2702" source="CVE"/>
	<description>
	Firefox before 1.0.7 and Mozilla Suite before 1.7.12 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Unicode sequences with "zero-width non-joiner" characters.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8de3ea0ba7cd0da892d902baee1e6d60 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030670" comment="MozillaFirefox-translations less than 1.0.7-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030671" comment="MozillaFirefox less than 1.0.7-0.2"/>
		</criteria>
	</criteria>
	<!-- b310b00e5cb76adf21b02190e55fb6a2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030672" comment="mozilla-cs less than 1.7.5-4.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030673" comment="mozilla-deat less than 1.7.6-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030674" comment="mozilla-devel less than 1.7.8-5.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030675" comment="mozilla-dom-inspector less than 1.7.8-5.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030676" comment="mozilla-hu less than 1.78-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030677" comment="mozilla-irc less than 1.7.8-5.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030678" comment="mozilla-ja less than 1.7.7-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030679" comment="mozilla-ko less than 1.75-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030680" comment="mozilla-lib64 less than 1.6-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030681" comment="mozilla-mail less than 1.7.8-5.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030682" comment="mozilla-venkman less than 1.7.8-5.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030683" comment="mozilla less than 1.7.8-5.13"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2703</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2703" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2703" source="CVE"/>
	<description>
	Firefox before 1.0.7 and Mozilla Suite before 1.7.12 allows remote attackers to modify HTTP headers of XML HTTP requests via XMLHttpRequest, and possibly use the client to exploit vulnerabilities in servers or proxies, including HTTP request smuggling and HTTP request splitting.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8de3ea0ba7cd0da892d902baee1e6d60 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030670" comment="MozillaFirefox-translations less than 1.0.7-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030671" comment="MozillaFirefox less than 1.0.7-0.2"/>
		</criteria>
	</criteria>
	<!-- b310b00e5cb76adf21b02190e55fb6a2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030672" comment="mozilla-cs less than 1.7.5-4.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030673" comment="mozilla-deat less than 1.7.6-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030674" comment="mozilla-devel less than 1.7.8-5.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030675" comment="mozilla-dom-inspector less than 1.7.8-5.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030676" comment="mozilla-hu less than 1.78-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030677" comment="mozilla-irc less than 1.7.8-5.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030678" comment="mozilla-ja less than 1.7.7-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030679" comment="mozilla-ko less than 1.75-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030680" comment="mozilla-lib64 less than 1.6-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030681" comment="mozilla-mail less than 1.7.8-5.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030682" comment="mozilla-venkman less than 1.7.8-5.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030683" comment="mozilla less than 1.7.8-5.13"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2704</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2704" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2704" source="CVE"/>
	<description>
	Firefox before 1.0.7 and Mozilla Suite before 1.7.12 allows remote attackers to spoof DOM objects via an XBL control that implements an internal XPCOM interface.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8de3ea0ba7cd0da892d902baee1e6d60 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030670" comment="MozillaFirefox-translations less than 1.0.7-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030671" comment="MozillaFirefox less than 1.0.7-0.2"/>
		</criteria>
	</criteria>
	<!-- b310b00e5cb76adf21b02190e55fb6a2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030672" comment="mozilla-cs less than 1.7.5-4.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030673" comment="mozilla-deat less than 1.7.6-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030674" comment="mozilla-devel less than 1.7.8-5.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030675" comment="mozilla-dom-inspector less than 1.7.8-5.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030676" comment="mozilla-hu less than 1.78-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030677" comment="mozilla-irc less than 1.7.8-5.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030678" comment="mozilla-ja less than 1.7.7-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030679" comment="mozilla-ko less than 1.75-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030680" comment="mozilla-lib64 less than 1.6-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030681" comment="mozilla-mail less than 1.7.8-5.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030682" comment="mozilla-venkman less than 1.7.8-5.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030683" comment="mozilla less than 1.7.8-5.13"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2705</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2705" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2705" source="CVE"/>
	<description>
	Integer overflow in the JavaScript engine in Firefox before 1.0.7 and Mozilla Suite before 1.7.12 might allow remote attackers to execute arbitrary code.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8de3ea0ba7cd0da892d902baee1e6d60 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030670" comment="MozillaFirefox-translations less than 1.0.7-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030671" comment="MozillaFirefox less than 1.0.7-0.2"/>
		</criteria>
	</criteria>
	<!-- b310b00e5cb76adf21b02190e55fb6a2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030672" comment="mozilla-cs less than 1.7.5-4.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030673" comment="mozilla-deat less than 1.7.6-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030674" comment="mozilla-devel less than 1.7.8-5.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030675" comment="mozilla-dom-inspector less than 1.7.8-5.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030676" comment="mozilla-hu less than 1.78-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030677" comment="mozilla-irc less than 1.7.8-5.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030678" comment="mozilla-ja less than 1.7.7-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030679" comment="mozilla-ko less than 1.75-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030680" comment="mozilla-lib64 less than 1.6-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030681" comment="mozilla-mail less than 1.7.8-5.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030682" comment="mozilla-venkman less than 1.7.8-5.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030683" comment="mozilla less than 1.7.8-5.13"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2706</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2706" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2706" source="CVE"/>
	<description>
	Firefox before 1.0.7 and Mozilla before Suite 1.7.12 allows remote attackers to execute Javascript with chrome privileges via an about: page such as about:mozilla.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8de3ea0ba7cd0da892d902baee1e6d60 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030670" comment="MozillaFirefox-translations less than 1.0.7-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030671" comment="MozillaFirefox less than 1.0.7-0.2"/>
		</criteria>
	</criteria>
	<!-- b310b00e5cb76adf21b02190e55fb6a2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030672" comment="mozilla-cs less than 1.7.5-4.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030673" comment="mozilla-deat less than 1.7.6-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030674" comment="mozilla-devel less than 1.7.8-5.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030675" comment="mozilla-dom-inspector less than 1.7.8-5.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030676" comment="mozilla-hu less than 1.78-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030677" comment="mozilla-irc less than 1.7.8-5.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030678" comment="mozilla-ja less than 1.7.7-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030679" comment="mozilla-ko less than 1.75-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030680" comment="mozilla-lib64 less than 1.6-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030681" comment="mozilla-mail less than 1.7.8-5.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030682" comment="mozilla-venkman less than 1.7.8-5.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030683" comment="mozilla less than 1.7.8-5.13"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2707</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2707" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2707" source="CVE"/>
	<description>
	Firefox before 1.0.7 and Mozilla Suite before 1.7.12 allows remote attackers to spawn windows without user interface components such as the address and status bar, which could be used to conduct spoofing or phishing attacks.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8de3ea0ba7cd0da892d902baee1e6d60 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030670" comment="MozillaFirefox-translations less than 1.0.7-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030671" comment="MozillaFirefox less than 1.0.7-0.2"/>
		</criteria>
	</criteria>
	<!-- b310b00e5cb76adf21b02190e55fb6a2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030672" comment="mozilla-cs less than 1.7.5-4.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030673" comment="mozilla-deat less than 1.7.6-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030674" comment="mozilla-devel less than 1.7.8-5.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030675" comment="mozilla-dom-inspector less than 1.7.8-5.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030676" comment="mozilla-hu less than 1.78-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030677" comment="mozilla-irc less than 1.7.8-5.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030678" comment="mozilla-ja less than 1.7.7-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030679" comment="mozilla-ko less than 1.75-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030680" comment="mozilla-lib64 less than 1.6-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030681" comment="mozilla-mail less than 1.7.8-5.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030682" comment="mozilla-venkman less than 1.7.8-5.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030683" comment="mozilla less than 1.7.8-5.13"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2710</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2710" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2710" source="CVE"/>
	<description>
	Format string vulnerability in Real HelixPlayer and RealPlayer 10 allows remote attackers to execute arbitrary code via the (1) image handle or (2) timeformat attribute in a RealPix (.rp) or RealText (.rt) file.
	</description>
 </metadata>
<!-- c4a54aaea5aff885a4e7d0ade1b5b490 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030684" comment="RealPlayer less than 10.0.6-1.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2728</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2728" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2728" source="CVE"/>
	<description>
	The byte-range filter in Apache 2.0 before 2.0.54 allows remote attackers to cause a denial of service (memory consumption) via an HTTP header with a large Range field.
	</description>
 </metadata>
<!-- f2a372ddb83d6f0e292e5c1e24bd50df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030661" comment="libapr0 less than 2.0.49-27.34"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2797</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2797" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2797" source="CVE"/>
	<description>
	OpenSSH 4.0, and other versions before 4.2, does not properly handle dynamic port forwarding ("-D" option) when a listen address is not provided, which may cause OpenSSH to enable the GatewayPorts functionality.
	</description>
 </metadata>
<!-- e00a6e1fcc18cc47415e3e46f02a76fd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030685" comment="openssh-askpass less than 4.1p1-11.38"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030686" comment="openssh less than 4.1p1-11.38"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2800</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2800" source="CVE"/>
	<description>
	Memory leak in the seq_file implemenetation in the SCSI procfs interface (sg.c) in Linux kernel 2.6.13 and earlier allows local users to cause a denial of service (memory consumption) via certain repeated reads from the /proc/scsi/sg/devices file, which is not properly handled when the next() iterator returns NULL or an error.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e2c7f08437e0128f5441c08f313e453 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- c7050141b3702832a32e74185b621254 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030556" comment="kernel-bigsmp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2871</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2871" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2871" source="CVE"/>
	<description>
	Buffer overflow in the International Domain Name (IDN) support in Mozilla Firefox 1.0.6 and earlier, and Netscape 8.0.3.3 and 7.2, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a hostname with all "soft" hyphens (character 0xAD), which is not properly handled by the NormalizeIDN call in nsStandardURL::BuildNormalizedSpec.
	</description>
 </metadata>
<!-- 3f9dbe027d9c0d85d0398dca7852e878 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030687" comment="MozillaFirefox-translations less than 1.0.6-4.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030688" comment="MozillaFirefox less than 1.0.6-4.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2872</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2872" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2872" source="CVE"/>
	<description>
	The ipt_recent kernel module (ipt_recent.c) in Linux kernel before 2.6.12, when running on 64-bit processors such as AMD64, allows remote attackers to cause a denial of service (kernel panic) via certain attacks such as SSH brute force, which leads to memset calls using a length based on the u_int32_t type, acting on an array of unsigned long elements, a different vulnerability than CVE-2005-2873.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e2c7f08437e0128f5441c08f313e453 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- c7050141b3702832a32e74185b621254 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030556" comment="kernel-bigsmp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2876</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2876" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2876" source="CVE"/>
	<description>
	umount in util-linux 2.8 to 2.12q, 2.13-pre1, and 2.13-pre2, and other packages such as loop-aes-utils, allows local users with unmount permissions to gain privileges via the -r (remount) option, which causes the file system to be remounted with just the read-only flag, which effectively clears the nosuid, nodev, and other flags.
	</description>
 </metadata>
<!-- 9c77391557809fad062df3ab3a8dd436 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030689" comment="util-linux less than 2.12-72.39.3"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2922</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2922" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2922" source="CVE"/>
	<description>
	Heap-based buffer overflow in the embedded player in multiple RealNetworks products and versions including RealPlayer 10.x, RealOne Player, and Helix Player allows remote malicious servers to cause a denial of service (crash) and possibly execute arbitrary code via a chunked Transfer-Encoding HTTP response in which either (1) the chunk header length is specified as -1, (2) the chunk header with a length that is less than the actual amount of sent data, or (3) a missing chunk header.
	</description>
 </metadata>
<!-- 3ad7b20395a03f666b8f4ffe14e9276d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030690" comment="RealPlayer less than 10.0.7-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2958</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2958" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2958" source="CVE"/>
	<description>
	Multiple format string vulnerabilities in the GNOME Data Access library for GNOME2 (libgda2) 1.2.1 and earlier allow attackers to execute arbitrary code.
	</description>
 </metadata>
<!-- c0633ad9cc88de3d20aeabddd1567fb2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030691" comment="libgda-devel less than 1.0.3-54.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030692" comment="libgda less than 1.0.3-54.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2967</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2967" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2967" source="CVE"/>
	<description>
	Format string vulnerability in input_cdda.c in xine-lib 1-beta through 1-beta 3, 1-rc, 1.0 through 1.0.2, and 1.1.1 allows remote servers to execute arbitrary code via format string specifiers in metadata in CDDB server responses when the victim plays a CD.
	</description>
 </metadata>
<!-- 8c36e8dc0980d66d150cd2ce6d1622fe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030693" comment="xine-lib less than 0.99.rc3a-106.24"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2969</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2969" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2969" source="CVE"/>
	<description>
	The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.
	</description>
 </metadata>
<!-- 5ac94511860f4bb76c8ce92f5791934b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030694" comment="openssl-devel less than 0.9.7d-15.15.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030695" comment="openssl less than 0.9.7d-15.15.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2973</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2973" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2973" source="CVE"/>
	<description>
	The udp_v6_get_port function in udp.c in Linux 2.6 before 2.6.14-rc5, when running IPv6, allows local users to cause a denial of service (infinite loop and crash).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e2c7f08437e0128f5441c08f313e453 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- c7050141b3702832a32e74185b621254 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030556" comment="kernel-bigsmp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2974</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2974" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2974" source="CVE"/>
	<description>
	libungif library before 4.1.0 allows attackers to cause a denial of service via a crafted GIF file that triggers a null dereference.
	</description>
 </metadata>
<!-- 3ba43539b4fabe2a647c09b0426fe95e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030696" comment="libungif less than 4.1.0b1-585.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2975</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2975" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2975" source="CVE"/>
	<description>
	io-xpm.c in the gdk-pixbuf XPM image rendering library in GTK+ before 2.8.7 allows attackers to cause a denial of service (infinite loop) via a crafted XPM image with a large number of colors.
	</description>
 </metadata>
<!-- 810b5d5b88360d9fa4de633a3441dfd4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030697" comment="gdk-pixbuf-devel less than 0.22.0-62.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030698" comment="gdk-pixbuf less than 0.22.0-62.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2976</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2976" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2976" source="CVE"/>
	<description>
	Integer overflow in io-xpm.c in gdk-pixbuf 0.22.0 in GTK+ before 2.8.7 allows attackers to cause a denial of service (crash) or execute arbitrary code via an XPM file with large height, width, and colour values, a different vulnerability than CVE-2005-3186.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4f5fae06488ebd06d78f3ec5ecb019e6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030699" comment="gtk2-32bit less than 9-200511031328"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030700" comment="gtk2-devel less than 2.4.14-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030701" comment="gtk2 less than 2.4.14-0.8"/>
		</criteria>
	</criteria>
	<!-- 810b5d5b88360d9fa4de633a3441dfd4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030697" comment="gdk-pixbuf-devel less than 0.22.0-62.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030698" comment="gdk-pixbuf less than 0.22.0-62.13"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2978</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-2978" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2978" source="CVE"/>
	<description>
	pnmtopng in netpbm before 10.25, when using the -trans option, uses uninitialized size and index variables when converting Portable Anymap (PNM) images to Portable Network Graphics (PNG), which might allow attackers to execute arbitrary code by modifying the stack.
	</description>
 </metadata>
<!-- d074b20b26ec1a884ab4688604ae1c57 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030702" comment="netpbm less than 10.11.4-172.6.3"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3011</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-3011" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3011" source="CVE"/>
	<description>
	The sort_offline function for texindex in texinfo 4.8 and earlier allows local users to overwrite arbitrary files via a symlink attack on temporary files.
	</description>
 </metadata>
<!-- 1474e956ae188821ca845e9d2407cc6e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030703" comment="texinfo less than 4.6-61.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3013</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-3013" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3013" source="CVE"/>
	<description>
	Buffer overflow in liby2util in Yet another Setup Tool (YaST) for SuSE Linux 9.3 allows local users to execute arbitrary code via a long Loc entry.
	</description>
 </metadata>
<!-- ca7aae82c004049bc264cbb952ae7bc4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030704" comment="liby2util-devel less than 2.9.27-0.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030705" comment="liby2util less than 2.9.27-0.2.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3044</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-3044" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3044" source="CVE"/>
	<description>
	Multiple vulnerabilities in Linux kernel before 2.6.13.2 allow local users to cause a denial of service (kernel OOPS from null dereference) via (1) fput in a 32-bit ioctl on 64-bit x86 systems or (2) sockfd_put in the 32-bit routing_ioctl function on 64-bit systems.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e2c7f08437e0128f5441c08f313e453 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- c7050141b3702832a32e74185b621254 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030556" comment="kernel-bigsmp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3055</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-3055" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3055" source="CVE"/>
	<description>
	Linux kernel 2.6.8 to 2.6.14-rc2 allows local users to cause a denial of service (kernel OOPS) via a userspace process that issues a USB Request Block (URB) to a USB device and terminates before the URB is finished, which leads to a stale pointer reference.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e2c7f08437e0128f5441c08f313e453 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- c7050141b3702832a32e74185b621254 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030556" comment="kernel-bigsmp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3110</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-3110" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3110" source="CVE"/>
	<description>
	Race condition in ebtables netfilter module (ebtables.c) in Linux 2.6, when running on an SMP system that is operating under a heavy load, might allow remote attackers to cause a denial of service (crash) via a series of packets that cause a value to be modified after it has been read but before it has been locked.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e2c7f08437e0128f5441c08f313e453 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- c7050141b3702832a32e74185b621254 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030556" comment="kernel-bigsmp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3180</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-3180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3180" source="CVE"/>
	<description>
	The Orinoco driver (orinoco.c) in Linux kernel 2.6.13 and earlier does not properly clear memory from a previously used packet whose length is increased, which allows remote attackers to obtain sensitive information.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e2c7f08437e0128f5441c08f313e453 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- c7050141b3702832a32e74185b621254 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030556" comment="kernel-bigsmp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3185</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-3185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3185" source="CVE"/>
	<description>
	Stack-based buffer overflow in the ntlm_output function in http-ntlm.c for (1) wget 1.10, (2) curl 7.13.2, and (3) libcurl 7.13.2, and other products that use libcurl, when NTLM authentication is enabled, allows remote servers to execute arbitrary code via a long NTLM username.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2029a7dd3980ab372ffc3f4542790a79 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030706" comment="curl-devel less than 7.11.0-39.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030707" comment="curl less than 7.11.0-39.9"/>
		</criteria>
	</criteria>
	<!-- a4b05b41f1d218a2680342fec83ddb5d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030707" comment="curl less than 7.11.0-39.9"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3186</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-3186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3186" source="CVE"/>
	<description>
	Integer overflow in the GTK+ gdk-pixbuf XPM image rendering library in GTK+ 2.4.0 allows attackers to execute arbitrary code via an XPM file with a number of colors that causes insufficient memory to be allocated, which leads to a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4f5fae06488ebd06d78f3ec5ecb019e6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030699" comment="gtk2-32bit less than 9-200511031328"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030700" comment="gtk2-devel less than 2.4.14-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030701" comment="gtk2 less than 2.4.14-0.8"/>
		</criteria>
	</criteria>
	<!-- 810b5d5b88360d9fa4de633a3441dfd4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030697" comment="gdk-pixbuf-devel less than 0.22.0-62.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030698" comment="gdk-pixbuf less than 0.22.0-62.13"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3191</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-3191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3191" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in the (1) DCTStream::readProgressiveSOF and (2) DCTStream::readBaselineSOF functions in the DCT stream parsing code (Stream.cc) in xpdf 3.01 and earlier, as used in products such as (a) Poppler, (b) teTeX, (c) KDE kpdf, (d) pdftohtml, (e) KOffice KWord, (f) CUPS, and (g) libextractor allow user-assisted attackers to cause a denial of service (heap corruption) and possibly execute arbitrary code via a crafted PDF file with an out-of-range number of components (numComps), which is used as an array index.
	</description>
 </metadata>
<!-- eab1246f6b01eeaf2b89d56dfd8852f9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030708" comment="cups less than 1.1.20-108.31"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3192</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-3192" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3192" source="CVE"/>
	<description>
	Heap-based buffer overflow in the StreamPredictor function in Xpdf 3.01, as used in products such as (1) Poppler, (2) teTeX, (3) KDE kpdf, and (4) pdftohtml, (5) KOffice KWord, (6) CUPS, and (7) libextractor allows remote attackers to execute arbitrary code via a PDF file with an out-of-range numComps (number of components) field.
	</description>
 </metadata>
<!-- eab1246f6b01eeaf2b89d56dfd8852f9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030708" comment="cups less than 1.1.20-108.31"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3252</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-3252" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3252" source="CVE"/>
	<description>
	Stack-based buffer overflow in the Back Orifice (BO) preprocessor for Snort before 2.4.3 allows remote attackers to execute arbitrary code via a crafted UDP packet.
	</description>
 </metadata>
<!-- 48afb4b4c0875f6a077be241cd5a9efe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030709" comment="snort less than 2.3.2-0.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3256</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-3256" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3256" source="CVE"/>
	<description>
	The key selection dialogue in Enigmail before 0.92.1 can incorrectly select a key with a user ID that does not have additional information, which allows parties with that key to decrypt the message.
	</description>
 </metadata>
<!-- 2310e8cc2ba4f42e93d9d71f96b31bac -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030710" comment="mozilla-mail less than 1.7.8-5.16"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3275</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-3275" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3275" source="CVE"/>
	<description>
	The NAT code (1) ip_nat_proto_tcp.c and (2) ip_nat_proto_udp.c in Linux kernel 2.6 before 2.6.13 and 2.4 before 2.4.32-rc1 incorrectly declares a variable to be static, which allows remote attackers to cause a denial of service (memory corruption) by causing two packets for the same protocol to be NATed at the same time, which leads to memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e2c7f08437e0128f5441c08f313e453 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- c7050141b3702832a32e74185b621254 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030556" comment="kernel-bigsmp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3350</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-3350" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3350" source="CVE"/>
	<description>
	libungif library before 4.1.0 allows attackers to corrupt memory and possibly execute arbitrary code via a crafted GIF file that leads to an out-of-bounds write.
	</description>
 </metadata>
<!-- 3ba43539b4fabe2a647c09b0426fe95e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030696" comment="libungif less than 4.1.0b1-585.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3356</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-3356" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3356" source="CVE"/>
	<description>
	The mq_open system call in Linux kernel 2.6.9, in certain situations, can decrement a counter twice ("double decrement") as a result of multiple calls to the mntput function when the dentry_open function call fails, which allows local users to cause a denial of service (panic) via unspecified attack vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 34f03dfffcde711fd59b2f89adf275de -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030711" comment="kernel-bigsmp less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030712" comment="kernel-default less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030713" comment="kernel-smp less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030714" comment="kernel-source less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030715" comment="kernel-syms less than 2.6.5-7.252"/>
		</criteria>
	</criteria>
	<!-- 87c56bb926a498cfdb5b0219c188f773 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030712" comment="kernel-default less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030713" comment="kernel-smp less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030714" comment="kernel-source less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030715" comment="kernel-syms less than 2.6.5-7.252"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3358</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-3358" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3358" source="CVE"/>
	<description>
	Linux kernel before 2.6.15 allows local users to cause a denial of service (panic) via a set_mempolicy call with a 0 bitmask, which causes a panic when a page fault occurs.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 34f03dfffcde711fd59b2f89adf275de -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030711" comment="kernel-bigsmp less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030712" comment="kernel-default less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030713" comment="kernel-smp less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030714" comment="kernel-source less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030715" comment="kernel-syms less than 2.6.5-7.252"/>
		</criteria>
	</criteria>
	<!-- 87c56bb926a498cfdb5b0219c188f773 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030712" comment="kernel-default less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030713" comment="kernel-smp less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030714" comment="kernel-source less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030715" comment="kernel-syms less than 2.6.5-7.252"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3510</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-3510" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3510" source="CVE"/>
	<description>
	Apache Tomcat 5.5.0 to 5.5.11 allows remote attackers to cause a denial of service (CPU consumption) via a large number of simultaneous requests to list a web directory that has a large number of files.
	</description>
 </metadata>
<!-- 2495ca9e3f4d48cf82846e7b51f4da79 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030716" comment="jakarta-tomcat less than 5.0.19-29.20"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3623</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-3623" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3623" source="CVE"/>
	<description>
	nfs2acl.c in the Linux kernel 2.6.14.4 does not check for MAY_SATTR privilege before setting access controls (ACL) on files on exported NFS filesystems, which allows remote attackers to bypass ACLs for readonly mounted NFS filesystems.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 34f03dfffcde711fd59b2f89adf275de -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030711" comment="kernel-bigsmp less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030712" comment="kernel-default less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030713" comment="kernel-smp less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030714" comment="kernel-source less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030715" comment="kernel-syms less than 2.6.5-7.252"/>
		</criteria>
	</criteria>
	<!-- 87c56bb926a498cfdb5b0219c188f773 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030712" comment="kernel-default less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030713" comment="kernel-smp less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030714" comment="kernel-source less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030715" comment="kernel-syms less than 2.6.5-7.252"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3632</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-3632" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3632" source="CVE"/>
	<description>
	Multiple buffer overflows in pnmtopng in netpbm 10.0 and earlier allow attackers to execute arbitrary code via a crafted PNM file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 11d0803c9aa25e3642eea1e4de33d20d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030717" comment="libnetpbm less than 1.0.0-618.14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030718" comment="netpbm less than 10.11.4-172.14"/>
		</criteria>
	</criteria>
	<!-- 5a2366732b3f33ea89b740686d13baf3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030719" comment="netpbm less than 10.11.4-172.6.6"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3662</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-3662" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3662" source="CVE"/>
	<description>
	Off-by-one buffer overflow in pnmtopng before 2.39, when using the -alpha command line option (Alphas_Of_Color), allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PNM file with exactly 256 colors.
	</description>
 </metadata>
<!-- 5a2366732b3f33ea89b740686d13baf3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030719" comment="netpbm less than 10.11.4-172.6.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3671</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-3671" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3671" source="CVE"/>
	<description>
	The Internet Key Exchange version 1 (IKEv1) implementation in Openswan 2 (openswan-2) before 2.4.4, and freeswan in SUSE LINUX 9.1 before 2.04_1.5.4-1.23, allow remote attackers to cause a denial of service via (1) a crafted packet using 3DES with an invalid key length, or (2) unspecified inputs when Aggressive Mode is enabled and the PSK is known, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1.
	</description>
 </metadata>
<!-- b009511f6a95df19e9a44b526dd24358 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030720" comment="freeswan less than 2.04_1.5.4-1.23"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3732</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-3732" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3732" source="CVE"/>
	<description>
	The Internet Key Exchange version 1 (IKEv1) implementation (isakmp_agg.c) in racoon in ipsec-tools before 0.6.3, when running in aggressive mode, allows remote attackers to cause a denial of service (null dereference and crash) via crafted IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1.
	</description>
 </metadata>
<!-- 9f8549c0fdb4c32ce15be24ba50f632b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030721" comment="ipsec-tools less than 0.3.3-1.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3783</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-3783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3783" source="CVE"/>
	<description>
	The ptrace functionality (ptrace.c) in Linux kernel 2.6 before 2.6.14.2, using CLONE_THREAD, does not use the thread group ID to check whether it is attaching to itself, which allows local users to cause a denial of service (crash).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e2c7f08437e0128f5441c08f313e453 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- c7050141b3702832a32e74185b621254 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030556" comment="kernel-bigsmp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3784</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-3784" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3784" source="CVE"/>
	<description>
	The auto-reap of child processes in Linux kernel 2.6 before 2.6.15 includes processes with ptrace attached, which leads to a dangling ptrace reference and allows local users to cause a denial of service (crash) and gain root privileges.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e2c7f08437e0128f5441c08f313e453 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- c7050141b3702832a32e74185b621254 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030556" comment="kernel-bigsmp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3806</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-3806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3806" source="CVE"/>
	<description>
	The IPv6 flow label handling code (ip6_flowlabel.c) in Linux kernels 2.4 up to 2.4.32 and 2.6 before 2.6.14 modifies the wrong variable in certain circumstances, which allows local users to corrupt kernel memory or cause a denial of service (crash) by triggering a free of non-allocated memory.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e2c7f08437e0128f5441c08f313e453 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- c7050141b3702832a32e74185b621254 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030556" comment="kernel-bigsmp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3848</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-3848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3848" source="CVE"/>
	<description>
	Memory leak in the icmp_push_reply function in Linux 2.6 before 2.6.12.6 and 2.6.13 allows remote attackers to cause a denial of service (memory consumption) via a large number of crafted packets that cause the ip_append_data function to fail, aka "DST leak in icmp_push_reply."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 34f03dfffcde711fd59b2f89adf275de -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030711" comment="kernel-bigsmp less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030712" comment="kernel-default less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030713" comment="kernel-smp less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030714" comment="kernel-source less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030715" comment="kernel-syms less than 2.6.5-7.252"/>
		</criteria>
	</criteria>
	<!-- 87c56bb926a498cfdb5b0219c188f773 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030712" comment="kernel-default less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030713" comment="kernel-smp less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030714" comment="kernel-source less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030715" comment="kernel-syms less than 2.6.5-7.252"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3858</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-3858" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3858" source="CVE"/>
	<description>
	Memory leak in the ip6_input_finish function in ip6_input.c in Linux kernel 2.6.12 and earlier might allow attackers to cause a denial of service via malformed IPv6 packets with unspecified parameter problems, which prevents the SKB from being freed.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 34f03dfffcde711fd59b2f89adf275de -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030711" comment="kernel-bigsmp less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030712" comment="kernel-default less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030713" comment="kernel-smp less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030714" comment="kernel-source less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030715" comment="kernel-syms less than 2.6.5-7.252"/>
		</criteria>
	</criteria>
	<!-- 87c56bb926a498cfdb5b0219c188f773 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030712" comment="kernel-default less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030713" comment="kernel-smp less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030714" comment="kernel-source less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030715" comment="kernel-syms less than 2.6.5-7.252"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3904</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-3904" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3904" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Management Extensions (JMX) in Java JDK and JRE 5.0 Update 3, 1.4.2 and later, 1.3.1 and later allows remote attackers to escape the Java sandbox and access arbitrary files or execute arbitrary application via unknown attack vectors.
	</description>
 </metadata>
<!-- a4a96b4a8a21aa3aa9378b26ce492035 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030722" comment="java2-jre less than 1.4.2-129.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030723" comment="java2 less than 1.4.2-129.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3905</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-3905" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3905" source="CVE"/>
	<description>
	Unspecified vulnerability in reflection APIs in Java SDK and JRE 1.3.1_15 and earlier, 1.4.2_08 and earlier, and JDK and JRE 5.0 Update 3 and earlier allows remote attackers to escape the Java sandbox and access arbitrary files or execute arbitrary application via unknown attack vectors, a different vulnerability than CVE-2005-3906.  NOTE: this is associated with the "first issue" identified in SUNALERT:102003.
	</description>
 </metadata>
<!-- a4a96b4a8a21aa3aa9378b26ce492035 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030722" comment="java2-jre less than 1.4.2-129.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030723" comment="java2 less than 1.4.2-129.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3906</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-3906" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3906" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in reflection APIs in Java SDK and JRE 1.4.2_08 and earlier and JDK and JRE 5.0 Update 3 and earlier allow remote attackers to escape the Java sandbox and access arbitrary files or execute arbitrary applications via unknown attack vectors, a different set of vulnerabilities than CVE-2005-3905.  NOTE: this is associated with the "second and third issues" identified in SUNALERT:102003.
	</description>
 </metadata>
<!-- a4a96b4a8a21aa3aa9378b26ce492035 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030722" comment="java2-jre less than 1.4.2-129.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030723" comment="java2 less than 1.4.2-129.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3962</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-3962" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3962" source="CVE"/>
	<description>
	Integer overflow in the format string functionality (Perl_sv_vcatpvfn) in Perl 5.9.2 and 5.8.6 Perl allows attackers to overwrite arbitrary memory and possibly execute arbitrary code via format string specifiers with large values, which causes an integer wrap and leads to a buffer overflow, as demonstrated using format string vulnerabilities in Perl applications.
	</description>
 </metadata>
<!-- f1f7d27ae5fa1885e9f8997fbfd489de -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030724" comment="perl-32bit less than 9-200512171950"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030725" comment="perl less than 5.8.3-32.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20054268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-4268</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-4268" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4268" source="CVE"/>
	<description>
	Buffer overflow in cpio 2.6-8.FC4 on 64-bit platforms, when creating a cpio archive, allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a file whose size is represented by more than 8 digits.
	</description>
 </metadata>
<!-- 538e74e078656d72bf43e00c836ab28a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030558" comment="cpio less than 2.5-324.12"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20054348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-4348</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-4348" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4348" source="CVE"/>
	<description>
	fetchmail before 6.3.1 and before 6.2.5.5, when configured for multidrop mode, allows remote attackers to cause a denial of service (application crash) by sending messages without headers from upstream mail servers.
	</description>
 </metadata>
<!-- 460569ff05f9f1dd9cb03924fffb9bda -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030726" comment="fetchmail less than 6.2.5-49.15"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20054601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-4601</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-4601" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4601" source="CVE"/>
	<description>
	The delegate code in ImageMagick 6.2.4.5-0.3 allows remote attackers to execute arbitrary commands via shell metacharacters in a filename that is processed by the display command.
	</description>
 </metadata>
<!-- 0ef4cc971b1fea8a1052e4a15983749e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030727" comment="ImageMagick-devel less than 5.5.7-225.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030728" comment="ImageMagick less than 5.5.7-225.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20054772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-4772</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2005-4772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4772" source="CVE"/>
	<description>
	liby2util in Yet another Setup Tool (YaST) in SUSE Linux before 20051007 preserves permissions and ownerships when copying a remote repository, which might allow local users to read or modify sensitive files, possibly giving local users the ability to exploit CVE-2005-3013.
	</description>
 </metadata>
<!-- ca7aae82c004049bc264cbb952ae7bc4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030704" comment="liby2util-devel less than 2.9.27-0.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030705" comment="liby2util less than 2.9.27-0.2.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0019</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-0019" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0019" source="CVE"/>
	<description>
	Heap-based buffer overflow in the encodeURI and decodeURI functions in the kjs JavaScript interpreter engine in KDE 3.2.0 through 3.5.0 allows remote attackers to execute arbitrary code via a crafted, UTF-8 encoded URI.
	</description>
 </metadata>
<!-- c529411b083519d0efa17dd55af4ae8c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030729" comment="kdelibs3-32bit less than 9-200601130434"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030730" comment="kdelibs3-devel less than 3.2.1-44.65"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030731" comment="kdelibs3 less than 3.2.1-44.65"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0024</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-0024" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0024" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Adobe Flash Player 8.0.22.0 and earlier allow remote attackers to execute arbitrary code via a crafted SWF file.
	</description>
 </metadata>
<!-- d000a328085994512d2a98ef9e006471 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030732" comment="flash-player less than 7.0.63.0-1.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0049</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-0049" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0049" source="CVE"/>
	<description>
	gpg in GnuPG before 1.4.2.2 does not properly verify non-detached signatures, which allows attackers to inject unsigned data via a data packet that is not associated with a control packet, which causes the check for concatenated signatures to report that the signature is valid, a different vulnerability than CVE-2006-0455.
	</description>
 </metadata>
<!-- a78b647fae6fd03f11da9c538433f9c8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030733" comment="gpg less than 1.2.4-68.13"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0052</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-0052" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0052" source="CVE"/>
	<description>
	The attachment scrubber (Scrubber.py) in Mailman 2.1.5 and earlier, when using Python's library email module 2.5, allows remote attackers to cause a denial of service (mailing list delivery failure) via a multipart MIME message with a single part that has two blank lines between the first boundary and the end boundary.
	</description>
 </metadata>
<!-- f8df83e2b0054d4d222673467c50c10b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030734" comment="mailman less than 2.1.4-83.24"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0082</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-0082" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0082" source="CVE"/>
	<description>
	Format string vulnerability in the SetImageInfo function in image.c for ImageMagick 6.2.3 and other versions, and GraphicsMagick, allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a numeric format string specifier such as %d in the file name, a variant of CVE-2005-0397, and as demonstrated using the convert program.
	</description>
 </metadata>
<!-- 0ef4cc971b1fea8a1052e4a15983749e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030727" comment="ImageMagick-devel less than 5.5.7-225.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030728" comment="ImageMagick less than 5.5.7-225.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0095</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-0095" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0095" source="CVE"/>
	<description>
	dm-crypt in Linux kernel 2.6.15 and earlier does not clear a structure before it is freed, which leads to a memory disclosure that could allow local users to obtain sensitive information about a cryptographic key.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a85a3e0133108b1cb77026293bc419dc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- e793251698757eb4bf71b0822baf6a5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030739" comment="kernel-bigsmp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0225</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-0225" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0225" source="CVE"/>
	<description>
	scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.
	</description>
 </metadata>
<!-- c0a0e2dc5435936145cde433208b0b1b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030740" comment="openssh-askpass less than 4.1p1-11.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030741" comment="openssh less than 4.1p1-11.16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0323</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-0323" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0323" source="CVE"/>
	<description>
	Buffer overflow in swfformat.dll in multiple RealNetworks products and versions including RealPlayer 10.x, RealOne Player, Rhapsody 3, and Helix Player allows remote attackers to execute arbitrary code via a crafted SWF (Flash) file with (1) a a size value that is less than the actual size, or (2) other unspecified manipulations.
	</description>
 </metadata>
<!-- 3ad7b20395a03f666b8f4ffe14e9276d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030690" comment="RealPlayer less than 10.0.7-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0455</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-0455" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0455" source="CVE"/>
	<description>
	gpgv in GnuPG before 1.4.2.1, when using unattended signature verification, returns a 0 exit code in certain cases even when the detached signature file does not carry a signature, which could cause programs that use gpgv to assume that the signature verification has succeeded.  Note: this also occurs when running the equivalent command "gpg --verify".
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 76efde0032721703f2b0b1d8a15c440c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030742" comment="gpg less than 1.2.4-68.10"/>
	</criteria>
	<!-- 774b8f0c88c8a494eaeb3bc2bc16da82 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030743" comment="gpg2 less than 1.9.10-2.4"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0554</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-0554" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0554" source="CVE"/>
	<description>
	Linux kernel 2.6 before 2.6.15.5 allows local users to obtain sensitive information via a crafted XFS ftruncate call, which may return stale data.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a85a3e0133108b1cb77026293bc419dc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- e793251698757eb4bf71b0822baf6a5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030739" comment="kernel-bigsmp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0555</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-0555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0555" source="CVE"/>
	<description>
	The Linux Kernel before 2.6.15.5 allows local users to cause a denial of service (NFS client panic) via unknown attack vectors related to the use of O_DIRECT (direct I/O).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a85a3e0133108b1cb77026293bc419dc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- e793251698757eb4bf71b0822baf6a5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030739" comment="kernel-bigsmp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0557</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-0557" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0557" source="CVE"/>
	<description>
	sys_mbind in mempolicy.c in Linux kernel 2.6.16 and earlier does not sanity check the maxnod variable before making certain computations for the get_nodes function, which has unknown impact and attack vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a85a3e0133108b1cb77026293bc419dc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- e793251698757eb4bf71b0822baf6a5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030739" comment="kernel-bigsmp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0582</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-0582" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0582" source="CVE"/>
	<description>
	Unspecified vulnerability in rshd in Heimdal 0.6.x before 0.6.6 and 0.7.x before 0.7.2, when storing forwarded credentials, allows attackers to overwrite arbitrary files and change file ownership via unknown vectors.
	</description>
 </metadata>
<!-- f1e0fa19e4bd47f5f481fa6abb284ed4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030744" comment="heimdal-devel-32bit less than 9-200602210430"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030745" comment="heimdal-devel less than 0.6.1rc3-55.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030746" comment="heimdal-lib-32bit less than 9-200602210430"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030747" comment="heimdal-lib less than 0.6.1rc3-55.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030748" comment="heimdal less than 0.6.1rc3-55.21"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0645</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-0645" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0645" source="CVE"/>
	<description>
	Tiny ASN.1 Library (libtasn1) before 0.2.18, as used by (1) GnuTLS 1.2.x before 1.2.10 and 1.3.x before 1.3.4, and (2) GNU Shishi, allows attackers to crash the DER decoder and possibly execute arbitrary code via "out-of-bounds access" caused by invalid input, as demonstrated by the ProtoVer SSL test suite.
	</description>
 </metadata>
<!-- 9227af38b7ec7336ece2f1ed01619cbf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030749" comment="gnutls-32bit less than 9-200602210534"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030750" comment="gnutls-devel-32bit less than 9-200602210534"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030751" comment="gnutls-devel less than 1.0.8-26.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030752" comment="gnutls less than 1.0.8-26.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0646</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-0646" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0646" source="CVE"/>
	<description>
	ld in SUSE Linux 9.1 through 10.0, and SLES 9, in certain circumstances when linking binaries, can leave an empty RPATH or RUNPATH, which allows local attackers to execute arbitrary code as other users via by running an ld-linked application from the current directory, which could contain an attacker-controlled library file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 37ceddfb4166e0699e8b64b9e4afea11 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030753" comment="dia less than 0.94-13.5"/>
	</criteria>
	<!-- 43ed32936d1f47c23b6d758b748169d9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030754" comment="binutils-32bit less than 9-200601210802"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030755" comment="binutils less than 2.15.90.0.1.1-32.13"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0677</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-0677" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0677" source="CVE"/>
	<description>
	telnetd in Heimdal 0.6.x before 0.6.6 and 0.7.x before 0.7.2 allows remote unauthenticated attackers to cause a denial of service (server crash) via unknown vectors that trigger a null dereference.
	</description>
 </metadata>
<!-- f1e0fa19e4bd47f5f481fa6abb284ed4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030744" comment="heimdal-devel-32bit less than 9-200602210430"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030745" comment="heimdal-devel less than 0.6.1rc3-55.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030746" comment="heimdal-lib-32bit less than 9-200602210430"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030747" comment="heimdal-lib less than 0.6.1rc3-55.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030748" comment="heimdal less than 0.6.1rc3-55.21"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0741</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-0741" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0741" source="CVE"/>
	<description>
	Linux kernel before 2.6.15.5, when running on Intel processors, allows local users to cause a denial of service ("endless recursive fault") via unknown attack vectors related to a "bad elf entry address."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a85a3e0133108b1cb77026293bc419dc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- e793251698757eb4bf71b0822baf6a5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030739" comment="kernel-bigsmp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0744</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-0744" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0744" source="CVE"/>
	<description>
	Linux kernel before 2.6.16.5 does not properly handle uncanonical return addresses on Intel EM64T CPUs, which reports an exception in the SYSRET instead of the next instruction, which causes the kernel exception handler to run on the user stack with the wrong GS.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a09c4d297070acc234594c664ed2e674 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- a85a3e0133108b1cb77026293bc419dc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- b9980133c6300cf04c7bfe9fe654442d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030760" comment="kernel-bigsmp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- e793251698757eb4bf71b0822baf6a5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030739" comment="kernel-bigsmp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0747</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-0747" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0747" source="CVE"/>
	<description>
	Integer underflow in Freetype before 2.2 allows remote attackers to cause a denial of service (crash) via a font file with an odd number of blue values, which causes the underflow when decrementing by 2 in a context that assumes an even number of values.
	</description>
 </metadata>
<!-- 6dbf1efb42be3b7b43ec184b71d00153 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030761" comment="freetype2-32bit less than 9-200606132344"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030762" comment="freetype2-devel-32bit less than 9-200606132344"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030763" comment="freetype2-devel less than 2.1.7-53.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030764" comment="freetype2 less than 2.1.7-53.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0749</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-0749" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0749" source="CVE"/>
	<description>
	nsHTMLContentSink.cpp in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors involving a "particular sequence of HTML tags" that leads to memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5bf7d4b67ee6a73aa73ac37c89c4495a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030765" comment="MozillaFirefox-translations less than 1.0.8-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030766" comment="MozillaFirefox less than 1.0.8-0.2"/>
		</criteria>
	</criteria>
	<!-- cf16d61c47496ed9e8c45206ca18f76a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030767" comment="mozilla-cs less than 1.7.5-4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030768" comment="mozilla-deat less than 1.7.6-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030769" comment="mozilla-devel less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030770" comment="mozilla-dom-inspector less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030771" comment="mozilla-hu less than 1.78-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030772" comment="mozilla-irc less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030773" comment="mozilla-ja less than 1.7.7-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030774" comment="mozilla-ko less than 1.75-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030775" comment="mozilla-lib64 less than 1.6-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030776" comment="mozilla-mail less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030777" comment="mozilla-venkman less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030778" comment="mozilla less than 1.7.8-5.20"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0803</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-0803" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0803" source="CVE"/>
	<description>
	The signature verification functionality in the YaST Online Update (YOU) script handling relies on a gpg feature that is not intended for signature verification, which prevents YOU from detecting malicious scripts or code that do not pass the signature check when gpg 1.4.x is being used.
	</description>
 </metadata>
<!-- 3b6c0c5ac07d0c820d800216e3ed2240 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030779" comment="liby2util-devel less than 2.9.27-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030780" comment="liby2util less than 2.9.27-0.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0855</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-0855" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0855" source="CVE"/>
	<description>
	Stack-based buffer overflow in the fullpath function in misc.c for zoo 2.10 and earlier, as used in products such as Barracuda Spam Firewall, allows user-assisted attackers to execute arbitrary code via a crafted ZOO file that causes the combine function to return a longer string than expected.
	</description>
 </metadata>
<!-- 2eddcef6bf69d75cf49f47f1b1445dfc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030781" comment="zoo less than 2.10-851.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1054</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-1054" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1054" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2006-1861.  Reason: This candidate is a reservation duplicate of CVE-2006-1861.  Notes: All CVE users should reference CVE-2006-1861 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
<!-- 6dbf1efb42be3b7b43ec184b71d00153 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030761" comment="freetype2-32bit less than 9-200606132344"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030762" comment="freetype2-devel-32bit less than 9-200606132344"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030763" comment="freetype2-devel less than 2.1.7-53.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030764" comment="freetype2 less than 2.1.7-53.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1056</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-1056" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1056" source="CVE"/>
	<description>
	The Linux kernel before 2.6.16.9 and the FreeBSD kernel, when running on AMD64 and other 7th and 8th generation AuthenticAMD processors, only save/restore the FOP, FIP, and FDP x87 registers in FXSAVE/FXRSTOR when an exception is pending, which allows one process to determine portions of the state of floating point instructions of other processes, which can be leveraged to obtain sensitive information such as cryptographic keys.  NOTE: this is the documented behavior of AMD64 processors, but it is inconsistent with Intel processers in a security-relevant fashion that was not addressed by the kernels.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a85a3e0133108b1cb77026293bc419dc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- e793251698757eb4bf71b0822baf6a5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030739" comment="kernel-bigsmp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1242</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-1242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1242" source="CVE"/>
	<description>
	The ip_push_pending_frames function in Linux 2.4.x and 2.6.x before 2.6.16 increments the IP ID field when sending a RST after receiving unsolicited TCP SYN-ACK packets, which allows remote attackers to conduct an Idle Scan (nmap -sI) attack, which bypasses intended protections against such attacks.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a85a3e0133108b1cb77026293bc419dc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- e793251698757eb4bf71b0822baf6a5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030739" comment="kernel-bigsmp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1269</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-1269" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1269" source="CVE"/>
	<description>
	Buffer overflow in the parse function in parse.c in zoo 2.10 might allow local users to execute arbitrary code via long filename command line arguments, which are not properly handled during archive creation.  NOTE: since this issue is local and not setuid, the set of attack scenarios is limited, although is reasonable to expect that there are some situations in which the zoo user might automatically list attacker-controlled filenames to add to the zoo archive.
	</description>
 </metadata>
<!-- b3bb654cdbad2030607ffc36b26b0698 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030782" comment="zoo less than 2.10-851.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1342</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-1342" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1342" source="CVE"/>
	<description>
	net/ipv4/af_inet.c in Linux kernel 2.4 does not clear sockaddr_in.sin_zero before returning IPv4 socket names from the (1) getsockname, (2) getpeername, and (3) accept functions, which allows local users to obtain portions of potentially sensitive memory.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a85a3e0133108b1cb77026293bc419dc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- e793251698757eb4bf71b0822baf6a5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030739" comment="kernel-bigsmp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1516</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-1516" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1516" source="CVE"/>
	<description>
	The check_connection function in sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to read portions of memory via a username without a trailing null byte, which causes a buffer over-read.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- d94b3db707a1941a88a2f7c7933da754 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030783" comment="mysql less than 4.0.18-32.23"/>
	</criteria>
	<!-- dfa3b040161b26a12cd505da9c0b7bb7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030784" comment="mysql-Max less than 4.0.18-32.26"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1517</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-1517" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1517" source="CVE"/>
	<description>
	sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to obtain sensitive information via a COM_TABLE_DUMP request with an incorrect packet length, which includes portions of memory in an error message.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- d94b3db707a1941a88a2f7c7933da754 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030783" comment="mysql less than 4.0.18-32.23"/>
	</criteria>
	<!-- dfa3b040161b26a12cd505da9c0b7bb7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030784" comment="mysql-Max less than 4.0.18-32.26"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1518</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-1518" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1518" source="CVE"/>
	<description>
	Buffer overflow in the open_table function in sql_base.cc in MySQL 5.0.x up to 5.0.20 might allow remote attackers to execute arbitrary code via crafted COM_TABLE_DUMP packets with invalid length values.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- d94b3db707a1941a88a2f7c7933da754 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030783" comment="mysql less than 4.0.18-32.23"/>
	</criteria>
	<!-- dfa3b040161b26a12cd505da9c0b7bb7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030784" comment="mysql-Max less than 4.0.18-32.26"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1523</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-1523" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1523" source="CVE"/>
	<description>
	The __group_complete_signal function in the RCU signal handling (signal.c) in Linux kernel 2.6.16, and possibly other versions, has unknown impact and attack vectors related to improper use of BUG_ON.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a85a3e0133108b1cb77026293bc419dc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- e793251698757eb4bf71b0822baf6a5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030739" comment="kernel-bigsmp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1524</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-1524" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1524" source="CVE"/>
	<description>
	madvise_remove in Linux kernel 2.6.16 up to 2.6.16.6 does not follow file and mmap restrictions, which allows local users to bypass IPC permissions and replace portions of readonly tmpfs files with zeroes, aka the MADV_REMOVE vulnerability.  NOTE: this description was originally written in a way that combined two separate issues.  The mprotect issue now has a separate name, CVE-2006-2071.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a85a3e0133108b1cb77026293bc419dc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- e793251698757eb4bf71b0822baf6a5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030739" comment="kernel-bigsmp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1525</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-1525" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1525" source="CVE"/>
	<description>
	ip_route_input in Linux kernel 2.6 before 2.6.16.8 allows local users to cause a denial of service (panic) via a request for a route for a multicast IP address, which triggers a null dereference.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a85a3e0133108b1cb77026293bc419dc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- e793251698757eb4bf71b0822baf6a5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030739" comment="kernel-bigsmp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1527</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-1527" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1527" source="CVE"/>
	<description>
	The SCTP-netfilter code in Linux kernel before 2.6.16.13 allows remote attackers to trigger a denial of service (infinite loop) via unknown vectors that cause an invalid SCTP chunk size to be processed by the for_each_sctp_chunk function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a85a3e0133108b1cb77026293bc419dc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- e793251698757eb4bf71b0822baf6a5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030739" comment="kernel-bigsmp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1528</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-1528" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1528" source="CVE"/>
	<description>
	Linux kernel before 2.6.13 allows local users to cause a denial of service (crash) via a dio transfer from the sg driver to memory mapped (mmap) IO space.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a09c4d297070acc234594c664ed2e674 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- b9980133c6300cf04c7bfe9fe654442d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030760" comment="kernel-bigsmp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1550</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-1550" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1550" source="CVE"/>
	<description>
	Multiple buffer overflows in the xfig import code (xfig-import.c) in Dia 0.87 and later before 0.95-pre6 allow user-assisted attackers to have an unknown impact via a crafted xfig file, possibly involving an invalid (1) color index, (2) number of points, or (3) depth.
	</description>
 </metadata>
<!-- da9aae8bedcda85f84d548f45597f320 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030785" comment="dia less than 0.94-13.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1721</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-1721" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1721" source="CVE"/>
	<description>
	digestmd5.c in the CMU Cyrus Simple Authentication and Security Layer (SASL) library 2.1.18, and possibly other versions before 2.1.21, allows remote unauthenticated attackers to cause a denial of service (segmentation fault) via malformed inputs in DIGEST-MD5 negotiation.
	</description>
 </metadata>
<!-- 35452cb6896bec388d5e441a772fd24f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030786" comment="cyrus-sasl-digestmd5 less than 2.1.18-33.11"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1727</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-1727" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1727" source="CVE"/>
	<description>
	Unspecified vulnerability in Mozilla Firefox and Thunderbird 1.x before 1.5.0.2 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0.1 allows remote attackers to gain chrome privileges via multiple attack vectors related to the use of XBL scripts with "Print Preview".
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5bf7d4b67ee6a73aa73ac37c89c4495a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030765" comment="MozillaFirefox-translations less than 1.0.8-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030766" comment="MozillaFirefox less than 1.0.8-0.2"/>
		</criteria>
	</criteria>
	<!-- cf16d61c47496ed9e8c45206ca18f76a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030767" comment="mozilla-cs less than 1.7.5-4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030768" comment="mozilla-deat less than 1.7.6-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030769" comment="mozilla-devel less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030770" comment="mozilla-dom-inspector less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030771" comment="mozilla-hu less than 1.78-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030772" comment="mozilla-irc less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030773" comment="mozilla-ja less than 1.7.7-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030774" comment="mozilla-ko less than 1.75-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030775" comment="mozilla-lib64 less than 1.6-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030776" comment="mozilla-mail less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030777" comment="mozilla-venkman less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030778" comment="mozilla less than 1.7.8-5.20"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1728</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-1728" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1728" source="CVE"/>
	<description>
	Unspecified vulnerability in Mozilla Firefox and Thunderbird 1.x before 1.5.0.2 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0.1 allows remote attackers to execute arbitrary code via unknown vectors related to the crypto.generateCRMFRequest method.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5bf7d4b67ee6a73aa73ac37c89c4495a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030765" comment="MozillaFirefox-translations less than 1.0.8-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030766" comment="MozillaFirefox less than 1.0.8-0.2"/>
		</criteria>
	</criteria>
	<!-- cf16d61c47496ed9e8c45206ca18f76a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030767" comment="mozilla-cs less than 1.7.5-4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030768" comment="mozilla-deat less than 1.7.6-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030769" comment="mozilla-devel less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030770" comment="mozilla-dom-inspector less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030771" comment="mozilla-hu less than 1.78-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030772" comment="mozilla-irc less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030773" comment="mozilla-ja less than 1.7.7-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030774" comment="mozilla-ko less than 1.75-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030775" comment="mozilla-lib64 less than 1.6-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030776" comment="mozilla-mail less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030777" comment="mozilla-venkman less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030778" comment="mozilla less than 1.7.8-5.20"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1729</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-1729" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1729" source="CVE"/>
	<description>
	Mozilla Firefox 1.x before 1.5.0.2 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0.1 allows remote attackers to read arbitrary files by (1) inserting the target filename into a text box, then turning that box into a file upload control, or (2) changing the type of the input control that is associated with an event handler.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5bf7d4b67ee6a73aa73ac37c89c4495a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030765" comment="MozillaFirefox-translations less than 1.0.8-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030766" comment="MozillaFirefox less than 1.0.8-0.2"/>
		</criteria>
	</criteria>
	<!-- cf16d61c47496ed9e8c45206ca18f76a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030767" comment="mozilla-cs less than 1.7.5-4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030768" comment="mozilla-deat less than 1.7.6-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030769" comment="mozilla-devel less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030770" comment="mozilla-dom-inspector less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030771" comment="mozilla-hu less than 1.78-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030772" comment="mozilla-irc less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030773" comment="mozilla-ja less than 1.7.7-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030774" comment="mozilla-ko less than 1.75-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030775" comment="mozilla-lib64 less than 1.6-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030776" comment="mozilla-mail less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030777" comment="mozilla-venkman less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030778" comment="mozilla less than 1.7.8-5.20"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1730</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-1730" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1730" source="CVE"/>
	<description>
	Integer overflow in Mozilla Firefox and Thunderbird 1.x before 1.5.0.2 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0.1 allows remote attackers to execute arbitrary code via a large number in the CSS letter-spacing property that leads to a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5bf7d4b67ee6a73aa73ac37c89c4495a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030765" comment="MozillaFirefox-translations less than 1.0.8-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030766" comment="MozillaFirefox less than 1.0.8-0.2"/>
		</criteria>
	</criteria>
	<!-- cf16d61c47496ed9e8c45206ca18f76a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030767" comment="mozilla-cs less than 1.7.5-4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030768" comment="mozilla-deat less than 1.7.6-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030769" comment="mozilla-devel less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030770" comment="mozilla-dom-inspector less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030771" comment="mozilla-hu less than 1.78-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030772" comment="mozilla-irc less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030773" comment="mozilla-ja less than 1.7.7-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030774" comment="mozilla-ko less than 1.75-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030775" comment="mozilla-lib64 less than 1.6-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030776" comment="mozilla-mail less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030777" comment="mozilla-venkman less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030778" comment="mozilla less than 1.7.8-5.20"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1731</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-1731" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1731" source="CVE"/>
	<description>
	Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 returns the Object class prototype instead of the global window object when (1) .valueOf.call or (2) .valueOf.apply are called without any arguments, which allows remote attackers to conduct cross-site scripting (XSS) attacks.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5bf7d4b67ee6a73aa73ac37c89c4495a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030765" comment="MozillaFirefox-translations less than 1.0.8-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030766" comment="MozillaFirefox less than 1.0.8-0.2"/>
		</criteria>
	</criteria>
	<!-- cf16d61c47496ed9e8c45206ca18f76a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030767" comment="mozilla-cs less than 1.7.5-4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030768" comment="mozilla-deat less than 1.7.6-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030769" comment="mozilla-devel less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030770" comment="mozilla-dom-inspector less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030771" comment="mozilla-hu less than 1.78-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030772" comment="mozilla-irc less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030773" comment="mozilla-ja less than 1.7.7-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030774" comment="mozilla-ko less than 1.75-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030775" comment="mozilla-lib64 less than 1.6-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030776" comment="mozilla-mail less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030777" comment="mozilla-venkman less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030778" comment="mozilla less than 1.7.8-5.20"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1732</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-1732" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1732" source="CVE"/>
	<description>
	Unspecified vulnerability in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to bypass same-origin protections and conduct cross-site scripting (XSS) attacks via unspecified vectors involving the window.controllers array.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5bf7d4b67ee6a73aa73ac37c89c4495a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030765" comment="MozillaFirefox-translations less than 1.0.8-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030766" comment="MozillaFirefox less than 1.0.8-0.2"/>
		</criteria>
	</criteria>
	<!-- cf16d61c47496ed9e8c45206ca18f76a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030767" comment="mozilla-cs less than 1.7.5-4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030768" comment="mozilla-deat less than 1.7.6-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030769" comment="mozilla-devel less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030770" comment="mozilla-dom-inspector less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030771" comment="mozilla-hu less than 1.78-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030772" comment="mozilla-irc less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030773" comment="mozilla-ja less than 1.7.7-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030774" comment="mozilla-ko less than 1.75-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030775" comment="mozilla-lib64 less than 1.6-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030776" comment="mozilla-mail less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030777" comment="mozilla-venkman less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030778" comment="mozilla less than 1.7.8-5.20"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1733</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-1733" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1733" source="CVE"/>
	<description>
	Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 does not properly protect the compilation scope of privileged built-in XBL bindings, which allows remote attackers to execute arbitrary code via the (1) valueOf.call or (2) valueOf.apply methods of an XBL binding, or (3) "by inserting an XBL method into the DOM's document.body prototype chain."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5bf7d4b67ee6a73aa73ac37c89c4495a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030765" comment="MozillaFirefox-translations less than 1.0.8-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030766" comment="MozillaFirefox less than 1.0.8-0.2"/>
		</criteria>
	</criteria>
	<!-- cf16d61c47496ed9e8c45206ca18f76a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030767" comment="mozilla-cs less than 1.7.5-4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030768" comment="mozilla-deat less than 1.7.6-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030769" comment="mozilla-devel less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030770" comment="mozilla-dom-inspector less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030771" comment="mozilla-hu less than 1.78-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030772" comment="mozilla-irc less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030773" comment="mozilla-ja less than 1.7.7-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030774" comment="mozilla-ko less than 1.75-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030775" comment="mozilla-lib64 less than 1.6-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030776" comment="mozilla-mail less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030777" comment="mozilla-venkman less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030778" comment="mozilla less than 1.7.8-5.20"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1734</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-1734" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1734" source="CVE"/>
	<description>
	Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to execute arbitrary code by using the Object.watch method to access the "clone parent" internal function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5bf7d4b67ee6a73aa73ac37c89c4495a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030765" comment="MozillaFirefox-translations less than 1.0.8-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030766" comment="MozillaFirefox less than 1.0.8-0.2"/>
		</criteria>
	</criteria>
	<!-- cf16d61c47496ed9e8c45206ca18f76a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030767" comment="mozilla-cs less than 1.7.5-4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030768" comment="mozilla-deat less than 1.7.6-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030769" comment="mozilla-devel less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030770" comment="mozilla-dom-inspector less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030771" comment="mozilla-hu less than 1.78-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030772" comment="mozilla-irc less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030773" comment="mozilla-ja less than 1.7.7-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030774" comment="mozilla-ko less than 1.75-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030775" comment="mozilla-lib64 less than 1.6-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030776" comment="mozilla-mail less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030777" comment="mozilla-venkman less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030778" comment="mozilla less than 1.7.8-5.20"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1735</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-1735" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1735" source="CVE"/>
	<description>
	Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to execute arbitrary code by using an eval in an XBL method binding (XBL.method.eval) to create Javascript functions that are compiled with extra privileges.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5bf7d4b67ee6a73aa73ac37c89c4495a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030765" comment="MozillaFirefox-translations less than 1.0.8-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030766" comment="MozillaFirefox less than 1.0.8-0.2"/>
		</criteria>
	</criteria>
	<!-- cf16d61c47496ed9e8c45206ca18f76a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030767" comment="mozilla-cs less than 1.7.5-4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030768" comment="mozilla-deat less than 1.7.6-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030769" comment="mozilla-devel less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030770" comment="mozilla-dom-inspector less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030771" comment="mozilla-hu less than 1.78-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030772" comment="mozilla-irc less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030773" comment="mozilla-ja less than 1.7.7-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030774" comment="mozilla-ko less than 1.75-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030775" comment="mozilla-lib64 less than 1.6-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030776" comment="mozilla-mail less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030777" comment="mozilla-venkman less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030778" comment="mozilla less than 1.7.8-5.20"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1736</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-1736" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1736" source="CVE"/>
	<description>
	Mozilla Firefox 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to trick users into downloading and saving an executable file via an image that is overlaid by a transparent image link that points to the executable, which causes the executable to be saved when the user clicks the "Save image as..." option.  NOTE: this attack is made easier due to a GUI truncation issue that prevents the user from seeing the malicious extension when there is extra whitespace in the filename.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5bf7d4b67ee6a73aa73ac37c89c4495a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030765" comment="MozillaFirefox-translations less than 1.0.8-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030766" comment="MozillaFirefox less than 1.0.8-0.2"/>
		</criteria>
	</criteria>
	<!-- cf16d61c47496ed9e8c45206ca18f76a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030767" comment="mozilla-cs less than 1.7.5-4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030768" comment="mozilla-deat less than 1.7.6-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030769" comment="mozilla-devel less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030770" comment="mozilla-dom-inspector less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030771" comment="mozilla-hu less than 1.78-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030772" comment="mozilla-irc less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030773" comment="mozilla-ja less than 1.7.7-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030774" comment="mozilla-ko less than 1.75-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030775" comment="mozilla-lib64 less than 1.6-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030776" comment="mozilla-mail less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030777" comment="mozilla-venkman less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030778" comment="mozilla less than 1.7.8-5.20"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1737</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-1737" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1737" source="CVE"/>
	<description>
	Integer overflow in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary bytecode via JavaScript with a large regular expression.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5bf7d4b67ee6a73aa73ac37c89c4495a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030765" comment="MozillaFirefox-translations less than 1.0.8-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030766" comment="MozillaFirefox less than 1.0.8-0.2"/>
		</criteria>
	</criteria>
	<!-- cf16d61c47496ed9e8c45206ca18f76a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030767" comment="mozilla-cs less than 1.7.5-4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030768" comment="mozilla-deat less than 1.7.6-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030769" comment="mozilla-devel less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030770" comment="mozilla-dom-inspector less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030771" comment="mozilla-hu less than 1.78-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030772" comment="mozilla-irc less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030773" comment="mozilla-ja less than 1.7.7-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030774" comment="mozilla-ko less than 1.75-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030775" comment="mozilla-lib64 less than 1.6-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030776" comment="mozilla-mail less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030777" comment="mozilla-venkman less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030778" comment="mozilla less than 1.7.8-5.20"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1738</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-1738" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1738" source="CVE"/>
	<description>
	Unspecified vulnerability in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to cause a denial of service (crash) by changing the (1) -moz-grid and (2) -moz-grid-group display styles.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5bf7d4b67ee6a73aa73ac37c89c4495a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030765" comment="MozillaFirefox-translations less than 1.0.8-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030766" comment="MozillaFirefox less than 1.0.8-0.2"/>
		</criteria>
	</criteria>
	<!-- cf16d61c47496ed9e8c45206ca18f76a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030767" comment="mozilla-cs less than 1.7.5-4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030768" comment="mozilla-deat less than 1.7.6-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030769" comment="mozilla-devel less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030770" comment="mozilla-dom-inspector less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030771" comment="mozilla-hu less than 1.78-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030772" comment="mozilla-irc less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030773" comment="mozilla-ja less than 1.7.7-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030774" comment="mozilla-ko less than 1.75-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030775" comment="mozilla-lib64 less than 1.6-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030776" comment="mozilla-mail less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030777" comment="mozilla-venkman less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030778" comment="mozilla less than 1.7.8-5.20"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1739</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-1739" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1739" source="CVE"/>
	<description>
	The CSS border-rendering code in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain Cascading Style Sheets (CSS) that causes an out-of-bounds array write and buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5bf7d4b67ee6a73aa73ac37c89c4495a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030765" comment="MozillaFirefox-translations less than 1.0.8-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030766" comment="MozillaFirefox less than 1.0.8-0.2"/>
		</criteria>
	</criteria>
	<!-- cf16d61c47496ed9e8c45206ca18f76a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030767" comment="mozilla-cs less than 1.7.5-4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030768" comment="mozilla-deat less than 1.7.6-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030769" comment="mozilla-devel less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030770" comment="mozilla-dom-inspector less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030771" comment="mozilla-hu less than 1.78-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030772" comment="mozilla-irc less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030773" comment="mozilla-ja less than 1.7.7-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030774" comment="mozilla-ko less than 1.75-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030775" comment="mozilla-lib64 less than 1.6-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030776" comment="mozilla-mail less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030777" comment="mozilla-venkman less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030778" comment="mozilla less than 1.7.8-5.20"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1740</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-1740" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1740" source="CVE"/>
	<description>
	Mozilla Firefox 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to spoof secure site indicators such as the locked icon by opening the trusted site in a popup window, then changing the location to a malicious site.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5bf7d4b67ee6a73aa73ac37c89c4495a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030765" comment="MozillaFirefox-translations less than 1.0.8-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030766" comment="MozillaFirefox less than 1.0.8-0.2"/>
		</criteria>
	</criteria>
	<!-- cf16d61c47496ed9e8c45206ca18f76a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030767" comment="mozilla-cs less than 1.7.5-4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030768" comment="mozilla-deat less than 1.7.6-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030769" comment="mozilla-devel less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030770" comment="mozilla-dom-inspector less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030771" comment="mozilla-hu less than 1.78-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030772" comment="mozilla-irc less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030773" comment="mozilla-ja less than 1.7.7-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030774" comment="mozilla-ko less than 1.75-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030775" comment="mozilla-lib64 less than 1.6-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030776" comment="mozilla-mail less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030777" comment="mozilla-venkman less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030778" comment="mozilla less than 1.7.8-5.20"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1741</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-1741" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1741" source="CVE"/>
	<description>
	Mozilla Firefox 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to inject arbitrary Javascript into other sites by (1) "using a modal alert to suspend an event handler while a new page is being loaded", (2) using eval(), and using certain variants involving (3) "new Script;" and (4) using window.__proto__ to extend eval, aka "cross-site JavaScript injection".
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5bf7d4b67ee6a73aa73ac37c89c4495a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030765" comment="MozillaFirefox-translations less than 1.0.8-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030766" comment="MozillaFirefox less than 1.0.8-0.2"/>
		</criteria>
	</criteria>
	<!-- cf16d61c47496ed9e8c45206ca18f76a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030767" comment="mozilla-cs less than 1.7.5-4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030768" comment="mozilla-deat less than 1.7.6-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030769" comment="mozilla-devel less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030770" comment="mozilla-dom-inspector less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030771" comment="mozilla-hu less than 1.78-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030772" comment="mozilla-irc less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030773" comment="mozilla-ja less than 1.7.7-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030774" comment="mozilla-ko less than 1.75-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030775" comment="mozilla-lib64 less than 1.6-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030776" comment="mozilla-mail less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030777" comment="mozilla-venkman less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030778" comment="mozilla less than 1.7.8-5.20"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1742</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-1742" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1742" source="CVE"/>
	<description>
	The JavaScript engine in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 does not properly handle temporary variables that are not garbage collected, which might allow remote attackers to trigger operations on freed memory and cause memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5bf7d4b67ee6a73aa73ac37c89c4495a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030765" comment="MozillaFirefox-translations less than 1.0.8-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030766" comment="MozillaFirefox less than 1.0.8-0.2"/>
		</criteria>
	</criteria>
	<!-- cf16d61c47496ed9e8c45206ca18f76a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030767" comment="mozilla-cs less than 1.7.5-4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030768" comment="mozilla-deat less than 1.7.6-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030769" comment="mozilla-devel less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030770" comment="mozilla-dom-inspector less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030771" comment="mozilla-hu less than 1.78-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030772" comment="mozilla-irc less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030773" comment="mozilla-ja less than 1.7.7-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030774" comment="mozilla-ko less than 1.75-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030775" comment="mozilla-lib64 less than 1.6-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030776" comment="mozilla-mail less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030777" comment="mozilla-venkman less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030778" comment="mozilla less than 1.7.8-5.20"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1790</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-1790" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1790" source="CVE"/>
	<description>
	A regression fix in Mozilla Firefox 1.0.7 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the InstallTrigger.install method, which leads to memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5bf7d4b67ee6a73aa73ac37c89c4495a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030765" comment="MozillaFirefox-translations less than 1.0.8-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030766" comment="MozillaFirefox less than 1.0.8-0.2"/>
		</criteria>
	</criteria>
	<!-- cf16d61c47496ed9e8c45206ca18f76a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030767" comment="mozilla-cs less than 1.7.5-4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030768" comment="mozilla-deat less than 1.7.6-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030769" comment="mozilla-devel less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030770" comment="mozilla-dom-inspector less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030771" comment="mozilla-hu less than 1.78-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030772" comment="mozilla-irc less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030773" comment="mozilla-ja less than 1.7.7-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030774" comment="mozilla-ko less than 1.75-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030775" comment="mozilla-lib64 less than 1.6-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030776" comment="mozilla-mail less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030777" comment="mozilla-venkman less than 1.7.8-5.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030778" comment="mozilla less than 1.7.8-5.20"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1857</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-1857" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1857" source="CVE"/>
	<description>
	Buffer overflow in SCTP in Linux kernel before 2.6.16.17 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a malformed HB-ACK chunk.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a09c4d297070acc234594c664ed2e674 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- b9980133c6300cf04c7bfe9fe654442d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030760" comment="kernel-bigsmp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1858</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-1858" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1858" source="CVE"/>
	<description>
	SCTP in Linux kernel before 2.6.16.17 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a chunk length that is inconsistent with the actual length of provided parameters.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a09c4d297070acc234594c664ed2e674 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- b9980133c6300cf04c7bfe9fe654442d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030760" comment="kernel-bigsmp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1861</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-1861" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1861" source="CVE"/>
	<description>
	Multiple integer overflows in FreeType before 2.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via attack vectors related to (1) bdf/bdflib.c, (2) sfnt/ttcmap.c, (3) cff/cffgload.c, and (4) the read_lwfn function and a crafted LWFN file in base/ftmac.c.  NOTE: item 4 was originally identified by CVE-2006-2493.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1a58c52af7fc0fe31cc51a8f418fd4ac -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030787" comment="XFree86-server less than 4.3.99.902-43.76"/>
	</criteria>
	<!-- 6dbf1efb42be3b7b43ec184b71d00153 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030761" comment="freetype2-32bit less than 9-200606132344"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030762" comment="freetype2-devel-32bit less than 9-200606132344"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030763" comment="freetype2-devel less than 2.1.7-53.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030764" comment="freetype2 less than 2.1.7-53.9"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1863</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-1863" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1863" source="CVE"/>
	<description>
	Directory traversal vulnerability in CIFS in Linux 2.6.16 and earlier allows local users to escape chroot restrictions for an SMB-mounted filesystem via "..\\" sequences, a similar vulnerability to CVE-2006-1864.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a85a3e0133108b1cb77026293bc419dc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- e793251698757eb4bf71b0822baf6a5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030739" comment="kernel-bigsmp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1864</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-1864" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1864" source="CVE"/>
	<description>
	Directory traversal vulnerability in smbfs in Linux 2.6.16 and earlier allows local users to escape chroot restrictions for an SMB-mounted filesystem via "..\\" sequences, a similar vulnerability to CVE-2006-1863.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a85a3e0133108b1cb77026293bc419dc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- e793251698757eb4bf71b0822baf6a5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030739" comment="kernel-bigsmp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1931</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-1931" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1931" source="CVE"/>
	<description>
	The HTTP/XMLRPC server in Ruby before 1.8.2 uses blocking sockets, which allows attackers to cause a denial of service (blocked connections) via a large amount of data.
	</description>
 </metadata>
<!-- de9e1328949e358786eb6c04abf043ab -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030788" comment="ruby less than 1.8.1-42.13"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2024</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-2024" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2024" source="CVE"/>
	<description>
	Multiple vulnerabilities in libtiff before 3.8.1 allow context-dependent attackers to cause a denial of service via a TIFF image that triggers errors in (1) the TIFFFetchAnyArray function in (a) tif_dirread.c; (2) certain "codec cleanup methods" in (b) tif_lzw.c, (c) tif_pixarlog.c, and (d) tif_zip.c; (3) and improper restoration of setfield and getfield methods in cleanup functions within (e) tif_jpeg.c, tif_pixarlog.c, (f) tif_fax3.c, and tif_zip.c.
	</description>
 </metadata>
<!-- 32d301b13e21354ed937b6adbcb11461 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030789" comment="libtiff-32bit less than 9-200604240415"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030790" comment="libtiff less than 3.6.1-38.26"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2025</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-2025" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2025" source="CVE"/>
	<description>
	Integer overflow in the TIFFFetchData function in tif_dirread.c for libtiff before 3.8.1 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via a crafted TIFF image.
	</description>
 </metadata>
<!-- 32d301b13e21354ed937b6adbcb11461 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030789" comment="libtiff-32bit less than 9-200604240415"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030790" comment="libtiff less than 3.6.1-38.26"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2026</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-2026" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2026" source="CVE"/>
	<description>
	Double free vulnerability in tif_jpeg.c in libtiff before 3.8.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image that triggers errors related to "setfield/getfield methods in cleanup functions."
	</description>
 </metadata>
<!-- 32d301b13e21354ed937b6adbcb11461 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030789" comment="libtiff-32bit less than 9-200604240415"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030790" comment="libtiff less than 3.6.1-38.26"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2191</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-2191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2191" source="CVE"/>
	<description>
	** DISPUTED **  Format string vulnerability in Mailman before 2.1.9 allows attackers to execute arbitrary code via unspecified vectors. NOTE: the vendor has disputed this vulnerability, stating that it is "unexploitable."
	</description>
 </metadata>
<!-- 7d7b4291a8a6bf4a9378e00b2c4c8f7f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030791" comment="mailman less than 2.1.4-83.27"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2198</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-2198" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2198" source="CVE"/>
	<description>
	OpenOffice.org (aka StarOffice) 1.1.x up to 1.1.5 and 2.0.x before 2.0.3 allows user-assisted attackers to conduct unauthorized activities via an OpenOffice document with a malicious BASIC macro, which is executed without prompting the user.
	</description>
 </metadata>
<!-- 9c33c18a6978aefd174b5768b865e8ce -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030792" comment="OpenOffice_org-ar less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030793" comment="OpenOffice_org-ca less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030794" comment="OpenOffice_org-cs less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030795" comment="OpenOffice_org-da less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030796" comment="OpenOffice_org-de less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030797" comment="OpenOffice_org-el less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030798" comment="OpenOffice_org-en less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030799" comment="OpenOffice_org-es less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030800" comment="OpenOffice_org-et less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030801" comment="OpenOffice_org-fi less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030802" comment="OpenOffice_org-fr less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030803" comment="OpenOffice_org-gnome less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030804" comment="OpenOffice_org-hu less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030805" comment="OpenOffice_org-it less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030806" comment="OpenOffice_org-ja less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030807" comment="OpenOffice_org-kde less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030808" comment="OpenOffice_org-ko less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030809" comment="OpenOffice_org-nl less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030810" comment="OpenOffice_org-pl less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030811" comment="OpenOffice_org-pt-BR less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030812" comment="OpenOffice_org-pt less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030813" comment="OpenOffice_org-ru less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030814" comment="OpenOffice_org-sk less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030815" comment="OpenOffice_org-sl less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030816" comment="OpenOffice_org-sv less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030817" comment="OpenOffice_org-tr less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030818" comment="OpenOffice_org-zh-CN less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030819" comment="OpenOffice_org-zh-TW less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030820" comment="OpenOffice_org less than 1.1.5-0.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2199</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-2199" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2199" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Applets in OpenOffice.org 1.1.x (aka StarOffice) up to 1.1.5 and 2.0.x before 2.0.3 allows user-assisted attackers to escape the Java sandbox and conduct unauthorized activities via certain applets in OpenOffice documents.
	</description>
 </metadata>
<!-- 9c33c18a6978aefd174b5768b865e8ce -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030792" comment="OpenOffice_org-ar less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030793" comment="OpenOffice_org-ca less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030794" comment="OpenOffice_org-cs less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030795" comment="OpenOffice_org-da less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030796" comment="OpenOffice_org-de less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030797" comment="OpenOffice_org-el less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030798" comment="OpenOffice_org-en less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030799" comment="OpenOffice_org-es less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030800" comment="OpenOffice_org-et less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030801" comment="OpenOffice_org-fi less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030802" comment="OpenOffice_org-fr less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030803" comment="OpenOffice_org-gnome less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030804" comment="OpenOffice_org-hu less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030805" comment="OpenOffice_org-it less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030806" comment="OpenOffice_org-ja less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030807" comment="OpenOffice_org-kde less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030808" comment="OpenOffice_org-ko less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030809" comment="OpenOffice_org-nl less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030810" comment="OpenOffice_org-pl less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030811" comment="OpenOffice_org-pt-BR less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030812" comment="OpenOffice_org-pt less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030813" comment="OpenOffice_org-ru less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030814" comment="OpenOffice_org-sk less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030815" comment="OpenOffice_org-sl less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030816" comment="OpenOffice_org-sv less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030817" comment="OpenOffice_org-tr less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030818" comment="OpenOffice_org-zh-CN less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030819" comment="OpenOffice_org-zh-TW less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030820" comment="OpenOffice_org less than 1.1.5-0.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2271</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-2271" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2271" source="CVE"/>
	<description>
	The ECNE chunk handling in Linux SCTP (lksctp) before 2.6.17 allows remote attackers to cause a denial of service (kernel panic) via an unexpected chunk when the session is in CLOSED state.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a85a3e0133108b1cb77026293bc419dc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- e793251698757eb4bf71b0822baf6a5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030739" comment="kernel-bigsmp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2272</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-2272" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2272" source="CVE"/>
	<description>
	Linux SCTP (lksctp) before 2.6.17 allows remote attackers to cause a denial of service (kernel panic) via incoming IP fragmented (1) COOKIE_ECHO and (2) HEARTBEAT SCTP control chunks.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a85a3e0133108b1cb77026293bc419dc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- e793251698757eb4bf71b0822baf6a5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030739" comment="kernel-bigsmp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2274</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-2274" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2274" source="CVE"/>
	<description>
	Linux SCTP (lksctp) before 2.6.17 allows remote attackers to cause a denial of service (infinite recursion and crash) via a packet that contains two or more DATA fragments, which causes an skb pointer to refer back to itself when the full message is reassembled, leading to infinite recursion in the sctp_skb_pull function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a85a3e0133108b1cb77026293bc419dc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- e793251698757eb4bf71b0822baf6a5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030739" comment="kernel-bigsmp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2313</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-2313" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2313" source="CVE"/>
	<description>
	PostgreSQL 8.1.x before 8.1.4, 8.0.x before 8.0.8, 7.4.x before 7.4.13, 7.3.x before 7.3.15, and earlier versions allows context-dependent attackers to bypass SQL injection protection methods in applications via invalid encodings of multibyte characters, aka one variant of "Encoding-Based SQL Injection."
	</description>
 </metadata>
<!-- da59db7f50aac32f6bd1b258f6e09652 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030821" comment="postgresql-contrib less than 7.4.13-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030822" comment="postgresql-devel less than 7.4.13-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030823" comment="postgresql-docs less than 7.4.13-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030824" comment="postgresql-libs-32bit less than 9-200605291910"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030825" comment="postgresql-libs less than 7.4.13-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030826" comment="postgresql-pl less than 7.4.13-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030827" comment="postgresql-server less than 7.4.13-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030828" comment="postgresql less than 7.4.13-0.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2314</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-2314" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2314" source="CVE"/>
	<description>
	PostgreSQL 8.1.x before 8.1.4, 8.0.x before 8.0.8, 7.4.x before 7.4.13, 7.3.x before 7.3.15, and earlier versions allows context-dependent attackers to bypass SQL injection protection methods in applications that use multibyte encodings that allow the "\" (backslash) byte 0x5c to be the trailing byte of a multibyte character, such as SJIS, BIG5, GBK, GB18030, and UHC, which cannot be handled correctly by a client that does not understand multibyte encodings, aka a second variant of "Encoding-Based SQL Injection." NOTE: it could be argued that this is a class of issue related to interaction errors between the client and PostgreSQL, but a CVE has been assigned since PostgreSQL is treating this as a preventative measure against this class of problem.
	</description>
 </metadata>
<!-- da59db7f50aac32f6bd1b258f6e09652 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030821" comment="postgresql-contrib less than 7.4.13-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030822" comment="postgresql-devel less than 7.4.13-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030823" comment="postgresql-docs less than 7.4.13-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030824" comment="postgresql-libs-32bit less than 9-200605291910"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030825" comment="postgresql-libs less than 7.4.13-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030826" comment="postgresql-pl less than 7.4.13-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030827" comment="postgresql-server less than 7.4.13-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030828" comment="postgresql less than 7.4.13-0.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2362</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-2362" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2362" source="CVE"/>
	<description>
	Buffer overflow in getsym in tekhex.c in libbfd in Free Software Foundation GNU Binutils before 20060423, as used by GNU strings, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a file with a crafted Tektronix Hex Format (TekHex) record in which the length character is not a valid hexadecimal character.
	</description>
 </metadata>
<!-- 5887ede68e068a4a4275a811661b5b87 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030829" comment="binutils-32bit less than 9-200610302219"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030830" comment="binutils less than 2.15.90.0.1.1-32.17"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2444</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-2444" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2444" source="CVE"/>
	<description>
	The snmp_trap_decode function in the SNMP NAT helper for Linux kernel before 2.6.16.18 allows remote attackers to cause a denial of service (crash) via unspecified remote attack vectors that cause failures in snmp_trap_decode that trigger (1) frees of random memory or (2) frees of previously-freed memory (double-free) by snmp_trap_decode as well as its calling function, as demonstrated via certain test cases of the PROTOS SNMP test suite.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a09c4d297070acc234594c664ed2e674 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- b9980133c6300cf04c7bfe9fe654442d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030760" comment="kernel-bigsmp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2447</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-2447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2447" source="CVE"/>
	<description>
	SpamAssassin before 3.1.3, when running with vpopmail and the paranoid (-P) switch, allows remote attackers to execute arbitrary commands via a crafted message that is not properly handled when invoking spamd with the virtual pop username.
	</description>
 </metadata>
<!-- 8b27f3035ab308f3b3f9e3c9b4b4b044 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030831" comment="perl-spamassassin less than 2.64-3.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2448</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-2448" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2448" source="CVE"/>
	<description>
	Linux kernel before 2.6.16.21 and 2.6.17, when running on PowerPC, does not perform certain required access_ok checks, which allows local users to read arbitrary kernel memory on 64-bit systems (signal_64.c) and cause a denial of service (crash) and possibly read kernel memory on 32-bit systems (signal_32.c).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a09c4d297070acc234594c664ed2e674 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- b9980133c6300cf04c7bfe9fe654442d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030760" comment="kernel-bigsmp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2449</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-2449" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2449" source="CVE"/>
	<description>
	KDE Display Manager (KDM) in KDE 3.2.0 up to 3.5.3 allows local users to read arbitrary files via a symlink attack related to the session type for login.
	</description>
 </metadata>
<!-- c43d8bdde8ba418c079df014b739eaa7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030832" comment="kdebase3-kdm-SLD less than 3.2.1-0.17"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2451</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-2451" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2451" source="CVE"/>
	<description>
	The suid_dumpable support in Linux kernel 2.6.13 up to versions before 2.6.17.4, and 2.6.16 before 2.6.16.24, allows a local user to cause a denial of service (disk consumption) and possibly gain privileges via the PR_SET_DUMPABLE argument of the prctl function and a program that causes a core dump file to be created in a directory for which the user does not have permissions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a09c4d297070acc234594c664ed2e674 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- b9980133c6300cf04c7bfe9fe654442d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030760" comment="kernel-bigsmp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2452</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-2452" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2452" source="CVE"/>
	<description>
	GNOME GDM 2.8, 2.12, 2.14, and 2.15, when the "face browser" feature is enabled, allows local users to access the "Configure Login Manager" functionality using their own password instead of the root password, which can be leveraged to gain additional privileges.
	</description>
 </metadata>
<!-- 86ea741376acfa1ddfc8ef9e5e57a13b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030833" comment="gdm less than 2.6.0.0-2.19"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2453</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-2453" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2453" source="CVE"/>
	<description>
	Multiple unspecified format string vulnerabilities in Dia have unspecified impact and attack vectors, a different set of issues than CVE-2006-2480.
	</description>
 </metadata>
<!-- fe04ecd1224e6aa915c0ad7628cc1fbd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030834" comment="dia less than 0.94-13.10"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2480</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-2480" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2480" source="CVE"/>
	<description>
	Format string vulnerability in Dia 0.94 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code by triggering errors or warnings, as demonstrated via format string specifiers in a .bmp filename.  NOTE: the original exploit was demonstrated through a command line argument, but there are other mechanisms for input that are automatically processed by Dia, such as a crafted .dia file.
	</description>
 </metadata>
<!-- fe04ecd1224e6aa915c0ad7628cc1fbd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030834" comment="dia less than 0.94-13.10"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2493</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-2493" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2493" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2006-1861.  Reason: This candidate is a duplicate of CVE-2006-1861.  Notes: All CVE users should reference CVE-2006-1861 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
<!-- 6dbf1efb42be3b7b43ec184b71d00153 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030761" comment="freetype2-32bit less than 9-200606132344"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030762" comment="freetype2-devel-32bit less than 9-200606132344"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030763" comment="freetype2-devel less than 2.1.7-53.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030764" comment="freetype2 less than 2.1.7-53.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2607</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-2607" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2607" source="CVE"/>
	<description>
	do_command.c in Vixie cron (vixie-cron) 4.1 does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits, as originally demonstrated by a program that exceeds the process limits as defined in /etc/security/limits.conf.
	</description>
 </metadata>
<!-- 9b78595924034dfdf1a0dcd1777838f9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030835" comment="cron less than 3.0.1-920.12"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2656</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-2656" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2656" source="CVE"/>
	<description>
	Stack-based buffer overflow in the tiffsplit command in libtiff 3.8.2 and earlier might might allow attackers to execute arbitrary code via a long filename.  NOTE: tiffsplit is not setuid.  If there is not a common scenario under which tiffsplit is called with attacker-controlled command line arguments, then perhaps this issue should not be included in CVE.
	</description>
 </metadata>
<!-- 21b97ac78198808ff6b59cf8e3bdf0b0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030836" comment="tiff less than 3.6.1-38.30"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2661</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-2661" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2661" source="CVE"/>
	<description>
	ftutil.c in Freetype before 2.2 allows remote attackers to cause a denial of service (crash) via a crafted font file that triggers a null dereference.
	</description>
 </metadata>
<!-- 6dbf1efb42be3b7b43ec184b71d00153 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030761" comment="freetype2-32bit less than 9-200606132344"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030762" comment="freetype2-devel-32bit less than 9-200606132344"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030763" comment="freetype2-devel less than 2.1.7-53.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030764" comment="freetype2 less than 2.1.7-53.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2769</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-2769" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2769" source="CVE"/>
	<description>
	The HTTP Inspect preprocessor (http_inspect) in Snort 2.4.0 through 2.4.4 allows remote attackers to bypass "uricontent" rules via a carriage return (\r) after the URL and before the HTTP declaration.
	</description>
 </metadata>
<!-- 88cedfd543976a123b966bb0b977632e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030837" comment="snort less than 2.3.2-0.10"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2802</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-2802" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2802" source="CVE"/>
	<description>
	Buffer overflow in the HTTP Plugin (xineplug_inp_http.so) for xine-lib 1.1.1 allows remote attackers to cause a denial of service (application crash) via a long reply from an HTTP server, as demonstrated using gxine 0.5.6.
	</description>
 </metadata>
<!-- 0a7f58871a5a530b19a524e257644ed7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030838" comment="xine-lib-32bit less than 9-200606081412"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030839" comment="xine-lib less than 0.99.rc3a-106.29"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2894</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-2894" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2894" source="CVE"/>
	<description>
	Mozilla Firefox 1.5.0.4, 2.0.x before 2.0.0.8, Mozilla Suite 1.7.13, Mozilla SeaMonkey 1.0.2 and other versions before 1.1.5, and Netscape 8.1 and earlier allow user-assisted remote attackers to read arbitrary files by tricking a user into typing the characters of the target filename in a text box and using the OnKeyDown, OnKeyPress, and OnKeyUp Javascript keystroke events to change the focus and cause those characters to be inserted into a file upload input control, which can then upload the file when the user submits the form.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 94e7e87449ed25841acaf9b535567347 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030840" comment="MozillaFirefox-translations less than 1.5.0.12-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030841" comment="MozillaFirefox less than 1.5.0.12-0.5"/>
		</criteria>
	</criteria>
	<!-- bc8dbb4aea45ba7fac544f7e63f7898b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030842" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030843" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030844" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030845" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030846" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030847" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030848" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030849" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030850" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030851" comment="mozilla less than 1.8_seamonkey_1.0.9-1.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2916</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-2916" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2916" source="CVE"/>
	<description>
	artswrapper in aRts, when running setuid root on Linux 2.6.0 or later versions, does not check the return value of the setuid function call, which allows local users to gain root privileges by causing setuid to fail, which prevents artsd from dropping privileges.
	</description>
 </metadata>
<!-- 79defadba854b4eed84abae8b9808eea -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030852" comment="arts-32bit less than 9-200606211826"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030853" comment="arts less than 1.2.1-35.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2934</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-2934" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2934" source="CVE"/>
	<description>
	SCTP conntrack (ip_conntrack_proto_sctp.c) in netfilter for Linux kernel 2.6.17 before 2.6.17.3 and 2.6.16 before 2.6.16.23 allows remote attackers to cause a denial of service (crash) via a packet without any chunks, which causes a variable to contain an invalid value that is later used to dereference a pointer.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a09c4d297070acc234594c664ed2e674 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- b9980133c6300cf04c7bfe9fe654442d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030760" comment="kernel-bigsmp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2935</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-2935" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2935" source="CVE"/>
	<description>
	The dvd_read_bca function in the DVD handling code in drivers/cdrom/cdrom.c in Linux kernel 2.2.16, and later versions, assigns the wrong value to a length variable, which allows local users to execute arbitrary code via a crafted USB Storage device that triggers a buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a09c4d297070acc234594c664ed2e674 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- b9980133c6300cf04c7bfe9fe654442d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030760" comment="kernel-bigsmp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2936</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-2936" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2936" source="CVE"/>
	<description>
	The ftdi_sio driver (usb/serial/ftdi_sio.c) in Linux kernel 2.6.x up to 2.6.17, and possibly later versions, allows local users to cause a denial of service (memory consumption) by writing more data to the serial port than the hardware can handle, which causes the data to be queued.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4309006ed78370b6a442ab18e97609c1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- bd16f566b869a29489f5fbc7c16bddd0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030858" comment="kernel-bigsmp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2937</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-2937" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2937" source="CVE"/>
	<description>
	OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition.
	</description>
 </metadata>
<!-- 16e2a93b390a1ceb86b0945a88a4d415 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030859" comment="openssl-32bit less than 9-200609270654"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030860" comment="openssl-devel-32bit less than 9-200609270654"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030861" comment="openssl-devel less than 0.9.7d-15.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030862" comment="openssl less than 0.9.7d-15.29"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2940</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-2940" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940" source="CVE"/>
	<description>
	OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) "public exponent" or (2) "public modulus" values in X.509 certificates that require extra time to process when using RSA signature verification.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 03b8557c3814c26b0caf9fbe2677b9ae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030863" comment="openssl-32bit less than 9-200610132325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030864" comment="openssl-devel-32bit less than 9-200610132325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030865" comment="openssl-devel less than 0.9.7d-15.32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030866" comment="openssl less than 0.9.7d-15.32"/>
		</criteria>
	</criteria>
	<!-- 16e2a93b390a1ceb86b0945a88a4d415 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030859" comment="openssl-32bit less than 9-200609270654"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030860" comment="openssl-devel-32bit less than 9-200609270654"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030861" comment="openssl-devel less than 0.9.7d-15.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030862" comment="openssl less than 0.9.7d-15.29"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2941</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-2941" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2941" source="CVE"/>
	<description>
	Mailman before 2.1.9rc1 allows remote attackers to cause a denial of service via unspecified vectors involving "standards-breaking RFC 2231 formatted headers".
	</description>
 </metadata>
<!-- 7d7b4291a8a6bf4a9378e00b2c4c8f7f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030791" comment="mailman less than 2.1.4-83.27"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3082</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3082" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3082" source="CVE"/>
	<description>
	parse-packet.c in GnuPG (gpg) 1.4.3 and 1.9.20, and earlier versions, allows remote attackers to cause a denial of service (gpg crash) and possibly overwrite memory via a message packet with a large length (long user ID string), which could lead to an integer overflow, as demonstrated using the --no-armor option.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0c1209e2e201376b26446619ccffb23e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030867" comment="gpg less than 1.2.4-68.16"/>
	</criteria>
	<!-- edc152f6072d76c1bc71a2011ddec883 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030868" comment="gpg2 less than 1.9.10-2.6"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3085</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3085" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3085" source="CVE"/>
	<description>
	xt_sctp in netfilter for Linux kernel before 2.6.17.1 allows attackers to cause a denial of service (infinite loop) via an SCTP chunk with a 0 length.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a09c4d297070acc234594c664ed2e674 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- b9980133c6300cf04c7bfe9fe654442d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030760" comment="kernel-bigsmp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3093</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3093" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3093" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Adobe Acrobat Reader (acroread) before 7.0.8 have unknown impact and unknown vectors.
	</description>
 </metadata>
<!-- 4bcb737ce75711656765de2a11b9a70e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030869" comment="acroread less than 7.0.8-1.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3113</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3113" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3113" source="CVE"/>
	<description>
	Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via simultaneous XPCOM events, which causes a timer object to be deleted in a way that triggers memory corruption.
	</description>
 </metadata>
<!-- 91d3fb6dc75c0248de5d27fd5a3ffe70 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030870" comment="MozillaFirefox-translations less than 1.5.0.6-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030871" comment="MozillaFirefox less than 1.5.0.6-1.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3117</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3117" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3117" source="CVE"/>
	<description>
	Heap-based buffer overflow in OpenOffice.org (aka StarOffice) 1.1.x up to 1.1.5 and 2.0.x before 2.0.3 allows user-assisted attackers to execute arbitrary code via a crafted OpenOffice XML document that is not properly handled by (1) Calc, (2) Draw, (3) Impress, (4) Math, or (5) Writer, aka "File Format / Buffer Overflow Vulnerability."
	</description>
 </metadata>
<!-- 9c33c18a6978aefd174b5768b865e8ce -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030792" comment="OpenOffice_org-ar less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030793" comment="OpenOffice_org-ca less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030794" comment="OpenOffice_org-cs less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030795" comment="OpenOffice_org-da less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030796" comment="OpenOffice_org-de less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030797" comment="OpenOffice_org-el less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030798" comment="OpenOffice_org-en less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030799" comment="OpenOffice_org-es less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030800" comment="OpenOffice_org-et less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030801" comment="OpenOffice_org-fi less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030802" comment="OpenOffice_org-fr less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030803" comment="OpenOffice_org-gnome less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030804" comment="OpenOffice_org-hu less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030805" comment="OpenOffice_org-it less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030806" comment="OpenOffice_org-ja less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030807" comment="OpenOffice_org-kde less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030808" comment="OpenOffice_org-ko less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030809" comment="OpenOffice_org-nl less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030810" comment="OpenOffice_org-pl less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030811" comment="OpenOffice_org-pt-BR less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030812" comment="OpenOffice_org-pt less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030813" comment="OpenOffice_org-ru less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030814" comment="OpenOffice_org-sk less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030815" comment="OpenOffice_org-sl less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030816" comment="OpenOffice_org-sv less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030817" comment="OpenOffice_org-tr less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030818" comment="OpenOffice_org-zh-CN less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030819" comment="OpenOffice_org-zh-TW less than 1.1.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030820" comment="OpenOffice_org less than 1.1.5-0.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3126</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3126" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3126" source="CVE"/>
	<description>
	c2faxrecv in capi4hylafax 01.02.03 allows remote attackers to execute arbitrary commands via null (\0) and shell metacharacters in the TSI string, as demonstrated by a fax from an anonymous number.
	</description>
 </metadata>
<!-- 51e840e4c087f99d6d889e5a8b0d901d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030872" comment="capi4hylafax less than 4.1.8-24.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3242</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3242" source="CVE"/>
	<description>
	Stack-based buffer overflow in the browse_get_namespace function in imap/browse.c of Mutt 1.4.2.1 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via long namespaces received from the IMAP server.
	</description>
 </metadata>
<!-- 5a0f3b7c68d6058aaac617f40e61e770 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030873" comment="mutt less than 1.5.6i-64.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3311</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3311" source="CVE"/>
	<description>
	Buffer overflow in Adobe Flash Player 8.0.24.0 and earlier, Flash Professional 8, Flash MX 2004, and Flex 1.5 allows user-assisted remote attackers to execute arbitrary code via a long, dynamically created string in a SWF movie.
	</description>
 </metadata>
<!-- 8ca1dc42850524d1908ffbf18670eb2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030874" comment="flash-player less than 7.0.68.0-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3334</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3334" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3334" source="CVE"/>
	<description>
	Buffer overflow in the png_decompress_chunk function in pngrutil.c in libpng before 1.2.12 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors related to "chunk error processing," possibly involving the "chunk_name".
	</description>
 </metadata>
<!-- e998029189ef39123c667f390933f7c4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030875" comment="libpng-32bit less than 9-200612010115"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030876" comment="libpng-devel less than 1.2.5-182.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030877" comment="libpng less than 1.2.5-182.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3376</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3376" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3376" source="CVE"/>
	<description>
	Integer overflow in player.c in libwmf 0.2.8.4, as used in multiple products including (1) wv, (2) abiword, (3) freetype, (4) gimp, (5) libgsf, and (6) imagemagick allows remote attackers to execute arbitrary code via the MaxRecordSize header field in a WMF file.
	</description>
 </metadata>
<!-- 8d3fb155961488f0003a411557d7036c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030878" comment="libwmf less than 0.2.8.2-88.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3403</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3403" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3403" source="CVE"/>
	<description>
	The smdb daemon (smbd/service.c) in Samba 3.0.1 through 3.0.22 allows remote attackers to cause a denial of service (memory consumption) via a large number of share connection requests.
	</description>
 </metadata>
<!-- c6fc729a4d59d3990295d101f02dd6df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030879" comment="samba less than 3.0.20b-3.11"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3404</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3404" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3404" source="CVE"/>
	<description>
	Buffer overflow in the xcf_load_vector function in app/xcf/xcf-load.c for gimp before 2.2.12 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XCF file with a large num_axes value in the VECTORS property.
	</description>
 </metadata>
<!-- e9104cedf7dc76ebe369407b5542e09b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030880" comment="gimp less than 2.0.2-1.5"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3459</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3459" source="CVE"/>
	<description>
	Multiple stack-based buffer overflows in the TIFF library (libtiff) before 3.8.2, as used in Adobe Reader 9.3.0 and other products, allow context-dependent attackers to execute arbitrary code or cause a denial of service via unspecified vectors, including a large tdir_count value in the TIFFFetchShortPair function in tif_dirread.c.
	</description>
 </metadata>
<!-- af67a688fbb2e507784c8a1e9db46ab3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030881" comment="libtiff-32bit less than 9-200607271200"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030882" comment="libtiff less than 3.6.1-38.33"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3460</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3460" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3460" source="CVE"/>
	<description>
	Heap-based buffer overflow in the JPEG decoder in the TIFF library (libtiff) before 3.8.2 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via an encoded JPEG stream that is longer than the scan line size (TiffScanLineSize).
	</description>
 </metadata>
<!-- af67a688fbb2e507784c8a1e9db46ab3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030881" comment="libtiff-32bit less than 9-200607271200"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030882" comment="libtiff less than 3.6.1-38.33"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3461</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3461" source="CVE"/>
	<description>
	Heap-based buffer overflow in the PixarLog decoder in the TIFF library (libtiff) before 3.8.2 might allow context-dependent attackers to execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- af67a688fbb2e507784c8a1e9db46ab3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030881" comment="libtiff-32bit less than 9-200607271200"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030882" comment="libtiff less than 3.6.1-38.33"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3462</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3462" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3462" source="CVE"/>
	<description>
	Heap-based buffer overflow in the NeXT RLE decoder in the TIFF library (libtiff) before 3.8.2 might allow context-dependent attackers to execute arbitrary code via unknown vectors involving decoding large RLE images.
	</description>
 </metadata>
<!-- af67a688fbb2e507784c8a1e9db46ab3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030881" comment="libtiff-32bit less than 9-200607271200"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030882" comment="libtiff less than 3.6.1-38.33"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3463</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3463" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3463" source="CVE"/>
	<description>
	The EstimateStripByteCounts function in TIFF library (libtiff) before 3.8.2 uses a 16-bit unsigned short when iterating over an unsigned 32-bit value, which allows context-dependent attackers to cause a denial of service via a large td_nstrips value, which triggers an infinite loop.
	</description>
 </metadata>
<!-- af67a688fbb2e507784c8a1e9db46ab3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030881" comment="libtiff-32bit less than 9-200607271200"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030882" comment="libtiff less than 3.6.1-38.33"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3464</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3464" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3464" source="CVE"/>
	<description>
	TIFF library (libtiff) before 3.8.2 allows context-dependent attackers to pass numeric range checks and possibly execute code, and trigger assert errors, via large offset values in a TIFF directory that lead to an integer overflow and other unspecified vectors involving "unchecked arithmetic operations".
	</description>
 </metadata>
<!-- af67a688fbb2e507784c8a1e9db46ab3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030881" comment="libtiff-32bit less than 9-200607271200"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030882" comment="libtiff less than 3.6.1-38.33"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3465</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3465" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3465" source="CVE"/>
	<description>
	Unspecified vulnerability in the custom tag support for the TIFF library (libtiff) before 3.8.2 allows remote attackers to cause a denial of service (instability or crash) and execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- af67a688fbb2e507784c8a1e9db46ab3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030881" comment="libtiff-32bit less than 9-200607271200"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030882" comment="libtiff less than 3.6.1-38.33"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3467</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3467" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3467" source="CVE"/>
	<description>
	Integer overflow in FreeType before 2.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PCF file, as demonstrated by the Red Hat bad1.pcf test file, due to a partial fix of CVE-2006-1861.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1a58c52af7fc0fe31cc51a8f418fd4ac -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030787" comment="XFree86-server less than 4.3.99.902-43.76"/>
	</criteria>
	<!-- f534b9ffd4b983d69bc74733530440a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030883" comment="freetype2-32bit less than 9-200607282027"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030884" comment="freetype2-devel-32bit less than 9-200607282027"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030885" comment="freetype2-devel less than 2.1.7-53.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030886" comment="freetype2 less than 2.1.7-53.12"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3468</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3468" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3468" source="CVE"/>
	<description>
	Linux kernel 2.6.x, when using both NFS and EXT3, allows remote attackers to cause a denial of service (file system panic) via a crafted UDP packet with a V2 lookup procedure that specifies a bad file handle (inode number), which triggers an error and causes an exported directory to be remounted read-only.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 261185f7ea10c374f4fc53453e6ef3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030887" comment="kernel-default less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030888" comment="kernel-smp less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030889" comment="kernel-source less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030890" comment="kernel-syms less than 2.6.5-7.282"/>
		</criteria>
	</criteria>
	<!-- e2ef926c5f7d109a84807c89d6446736 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030891" comment="kernel-bigsmp less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030887" comment="kernel-default less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030888" comment="kernel-smp less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030889" comment="kernel-source less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030890" comment="kernel-syms less than 2.6.5-7.282"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3587</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3587" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3587" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe (Macromedia) Flash Player 8.0.24.0 allows remote attackers to execute arbitrary commands via a malformed .swf file that results in "multiple improper memory access" errors.
	</description>
 </metadata>
<!-- 8ca1dc42850524d1908ffbf18670eb2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030874" comment="flash-player less than 7.0.68.0-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3588</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3588" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3588" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe (Macromedia) Flash Player 8.0.24.0 allows remote attackers to cause a denial of service (browser crash) via a malformed, compressed .swf file, a different issue than CVE-2006-3587.
	</description>
 </metadata>
<!-- 8ca1dc42850524d1908ffbf18670eb2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030874" comment="flash-player less than 7.0.68.0-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3626</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3626" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3626" source="CVE"/>
	<description>
	Race condition in Linux kernel 2.6.17.4 and earlier allows local users to gain root privileges by using prctl with PR_SET_DUMPABLE in a way that causes /proc/self/environ to become setuid root.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a09c4d297070acc234594c664ed2e674 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- b9980133c6300cf04c7bfe9fe654442d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030760" comment="kernel-bigsmp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3636</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3636" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3636" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in Mailman before 2.1.9rc1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
	</description>
 </metadata>
<!-- 7d7b4291a8a6bf4a9378e00b2c4c8f7f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030791" comment="mailman less than 2.1.4-83.27"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3677</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3677" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3677" source="CVE"/>
	<description>
	Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.
	</description>
 </metadata>
<!-- 91d3fb6dc75c0248de5d27fd5a3ffe70 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030870" comment="MozillaFirefox-translations less than 1.5.0.6-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030871" comment="MozillaFirefox less than 1.5.0.6-1.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3694</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3694" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3694" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Ruby before 1.8.5 allow remote attackers to bypass "safe level" checks via unspecified vectors involving (1) the alias function and (2) "directory operations".
	</description>
 </metadata>
<!-- 6afcb4d97a623f4874604c6ba352d777 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030892" comment="ruby less than 1.8.1-42.16"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3738</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3738" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3738" source="CVE"/>
	<description>
	Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.
	</description>
 </metadata>
<!-- 16e2a93b390a1ceb86b0945a88a4d415 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030859" comment="openssl-32bit less than 9-200609270654"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030860" comment="openssl-devel-32bit less than 9-200609270654"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030861" comment="openssl-devel less than 0.9.7d-15.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030862" comment="openssl less than 0.9.7d-15.29"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3739</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3739" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3739" source="CVE"/>
	<description>
	Integer overflow in the CIDAFM function in X.Org 6.8.2 and XFree86 X server allows local users to execute arbitrary code via crafted Adobe Font Metrics (AFM) files with a modified number of character metrics (StartCharMetrics), which leads to a heap-based buffer overflow.
	</description>
 </metadata>
<!-- d910fdfd162fc8e9041e3f41c8dcd190 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030893" comment="XFree86-server less than 4.3.99.902-43.78"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3740</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3740" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3740" source="CVE"/>
	<description>
	Integer overflow in the scan_cidfont function in X.Org 6.8.2 and XFree86 X server allows local users to execute arbitrary code via crafted (1) CMap and (2) CIDFont font data with modified item counts in the (a) begincodespacerange, (b) cidrange, and (c) notdefrange sections.
	</description>
 </metadata>
<!-- d910fdfd162fc8e9041e3f41c8dcd190 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030893" comment="XFree86-server less than 4.3.99.902-43.78"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3741</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3741" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3741" source="CVE"/>
	<description>
	The perfmonctl system call (sys_perfmonctl) in Linux kernel 2.4.x and 2.6 before 2.6.18, when running on Itanium systems, does not properly track the reference count for file descriptors, which allows local users to cause a denial of service (file descriptor consumption).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06a879ef6bcde6c750e9ee4e43ccc446 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 15107fb406dee9a6d661cedc4a7bd068 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030898" comment="kernel-bigsmp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3743</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3743" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3743" source="CVE"/>
	<description>
	Multiple buffer overflows in ImageMagick before 6.2.9 allow user-assisted attackers to execute arbitrary code via crafted XCF images.
	</description>
 </metadata>
<!-- 9572451219715989842a945aed31ae16 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030899" comment="ImageMagick-devel less than 5.5.7-225.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030900" comment="ImageMagick less than 5.5.7-225.25"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3744</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3744" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3744" source="CVE"/>
	<description>
	Multiple integer overflows in ImageMagick before 6.2.9 allows user-assisted attackers to execute arbitrary code via crafted Sun Rasterfile (bitmap) images that trigger heap-based buffer overflows.
	</description>
 </metadata>
<!-- 9572451219715989842a945aed31ae16 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030899" comment="ImageMagick-devel less than 5.5.7-225.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030900" comment="ImageMagick less than 5.5.7-225.25"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3745</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3745" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3745" source="CVE"/>
	<description>
	Unspecified vulnerability in the sctp_make_abort_user function in the SCTP implementation in Linux 2.6.x before 2.6.17.10 and 2.4.23 up to 2.4.33 allows local users to cause a denial of service (panic) and possibly gain root privileges via unknown attack vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 261185f7ea10c374f4fc53453e6ef3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030887" comment="kernel-default less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030888" comment="kernel-smp less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030889" comment="kernel-source less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030890" comment="kernel-syms less than 2.6.5-7.282"/>
		</criteria>
	</criteria>
	<!-- e2ef926c5f7d109a84807c89d6446736 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030891" comment="kernel-bigsmp less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030887" comment="kernel-default less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030888" comment="kernel-smp less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030889" comment="kernel-source less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030890" comment="kernel-syms less than 2.6.5-7.282"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3746</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3746" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3746" source="CVE"/>
	<description>
	Integer overflow in parse_comment in GnuPG (gpg) 1.4.4 allows remote attackers to cause a denial of service (segmentation fault) via a crafted message.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 30953130b8d77c86e88c33a5b05d48e9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030901" comment="gpg2 less than 1.9.10-2.9"/>
	</criteria>
	<!-- 8d64612d107bac165c1d9707130d521b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030902" comment="gpg less than 1.2.4-68.19"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3801</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3801" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3801" source="CVE"/>
	<description>
	Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.
	</description>
 </metadata>
<!-- 91d3fb6dc75c0248de5d27fd5a3ffe70 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030870" comment="MozillaFirefox-translations less than 1.5.0.6-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030871" comment="MozillaFirefox less than 1.5.0.6-1.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3802</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3802" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3802" source="CVE"/>
	<description>
	Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to hijack native DOM methods from objects in another domain and conduct cross-site scripting (XSS) attacks using DOM methods of the top-level object.
	</description>
 </metadata>
<!-- 91d3fb6dc75c0248de5d27fd5a3ffe70 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030870" comment="MozillaFirefox-translations less than 1.5.0.6-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030871" comment="MozillaFirefox less than 1.5.0.6-1.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3803</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3803" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3803" source="CVE"/>
	<description>
	Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.
	</description>
 </metadata>
<!-- 91d3fb6dc75c0248de5d27fd5a3ffe70 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030870" comment="MozillaFirefox-translations less than 1.5.0.6-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030871" comment="MozillaFirefox less than 1.5.0.6-1.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3804</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3804" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3804" source="CVE"/>
	<description>
	Heap-based buffer overflow in Mozilla Thunderbird before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) via a VCard attachment with a malformed base64 field, which copies more data than expected due to an integer underflow.
	</description>
 </metadata>
<!-- 91d3fb6dc75c0248de5d27fd5a3ffe70 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030870" comment="MozillaFirefox-translations less than 1.5.0.6-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030871" comment="MozillaFirefox less than 1.5.0.6-1.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3805</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3805" source="CVE"/>
	<description>
	The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.
	</description>
 </metadata>
<!-- 91d3fb6dc75c0248de5d27fd5a3ffe70 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030870" comment="MozillaFirefox-translations less than 1.5.0.6-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030871" comment="MozillaFirefox less than 1.5.0.6-1.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3806</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3806" source="CVE"/>
	<description>
	Multiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified "string function arguments."
	</description>
 </metadata>
<!-- 91d3fb6dc75c0248de5d27fd5a3ffe70 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030870" comment="MozillaFirefox-translations less than 1.5.0.6-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030871" comment="MozillaFirefox less than 1.5.0.6-1.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3807</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3807" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3807" source="CVE"/>
	<description>
	Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling "named JavaScript functions" that use the constructor.
	</description>
 </metadata>
<!-- 91d3fb6dc75c0248de5d27fd5a3ffe70 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030870" comment="MozillaFirefox-translations less than 1.5.0.6-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030871" comment="MozillaFirefox less than 1.5.0.6-1.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3808</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3808" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3808" source="CVE"/>
	<description>
	Mozilla Firefox before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote Proxy AutoConfig (PAC) servers to execute code with elevated privileges via a PAC script that sets the FindProxyForURL function to an eval method on a privileged object.
	</description>
 </metadata>
<!-- 91d3fb6dc75c0248de5d27fd5a3ffe70 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030870" comment="MozillaFirefox-translations less than 1.5.0.6-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030871" comment="MozillaFirefox less than 1.5.0.6-1.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3809</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3809" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3809" source="CVE"/>
	<description>
	Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows scripts with the UniversalBrowserRead privilege to gain UniversalXPConnect privileges and possibly execute code or obtain sensitive data by reading into a privileged context.
	</description>
 </metadata>
<!-- 91d3fb6dc75c0248de5d27fd5a3ffe70 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030870" comment="MozillaFirefox-translations less than 1.5.0.6-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030871" comment="MozillaFirefox less than 1.5.0.6-1.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3810</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3810" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3810" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the XPCNativeWrapper(window).Function construct.
	</description>
 </metadata>
<!-- 91d3fb6dc75c0248de5d27fd5a3ffe70 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030870" comment="MozillaFirefox-translations less than 1.5.0.6-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030871" comment="MozillaFirefox less than 1.5.0.6-1.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3811</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3811" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3811" source="CVE"/>
	<description>
	Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) "anonymous box selectors outside of UA stylesheets," (5) stale references to "removed nodes," and (6) running the crypto.generateCRMFRequest callback on deleted context.
	</description>
 </metadata>
<!-- 91d3fb6dc75c0248de5d27fd5a3ffe70 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030870" comment="MozillaFirefox-translations less than 1.5.0.6-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030871" comment="MozillaFirefox less than 1.5.0.6-1.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3812</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3812" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3812" source="CVE"/>
	<description>
	Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to reference remote files and possibly load chrome: URLs by tricking the user into copying or dragging links.
	</description>
 </metadata>
<!-- 91d3fb6dc75c0248de5d27fd5a3ffe70 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030870" comment="MozillaFirefox-translations less than 1.5.0.6-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030871" comment="MozillaFirefox less than 1.5.0.6-1.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3835</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3835" source="CVE"/>
	<description>
	Apache Tomcat 5 before 5.5.17 allows remote attackers to list directories via a semicolon (;) preceding a filename with a mapped extension, as demonstrated by URLs ending with /;index.jsp and /;help.do.
	</description>
 </metadata>
<!-- 2495ca9e3f4d48cf82846e7b51f4da79 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030716" comment="jakarta-tomcat less than 5.0.19-29.20"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3918</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-3918" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3918" source="CVE"/>
	<description>
	http_protocol.c in (1) IBM HTTP Server 6.0 before 6.0.2.13 and 6.1 before 6.1.0.1, and (2) Apache HTTP Server 1.3 before 1.3.35, 2.0 before 2.0.58, and 2.2 before 2.2.2, does not sanitize the Expect header from an HTTP request when it is reflected back in an error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated using a Flash SWF file.
	</description>
 </metadata>
<!-- 484f33da03a9e3e4632f40254c4a96a3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030903" comment="apache-devel less than 1.3.29-71.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030904" comment="apache less than 1.3.29-71.26"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4031</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-4031" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4031" source="CVE"/>
	<description>
	MySQL 4.1 before 4.1.21 and 5.0 before 5.0.24 allows a local user to access a table through a previously created MERGE table, even after the user's privileges are revoked for the original table, which might violate intended security policy.
	</description>
 </metadata>
<!-- b91810524dc2a76e952c5b9c8a0183cf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030905" comment="mysql-Max less than 4.0.18-32.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030906" comment="mysql less than 4.0.18-32.28"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4093</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-4093" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4093" source="CVE"/>
	<description>
	Linux kernel 2.x.6 before 2.6.17.9 and 2.4.x before 2.4.33.1 on PowerPC PPC970 systems allows local users to cause a denial of service (crash) related to the "HID0 attention enable on PPC970 at boot time."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 261185f7ea10c374f4fc53453e6ef3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030887" comment="kernel-default less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030888" comment="kernel-smp less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030889" comment="kernel-source less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030890" comment="kernel-syms less than 2.6.5-7.282"/>
		</criteria>
	</criteria>
	<!-- e2ef926c5f7d109a84807c89d6446736 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030891" comment="kernel-bigsmp less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030887" comment="kernel-default less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030888" comment="kernel-smp less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030889" comment="kernel-source less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030890" comment="kernel-syms less than 2.6.5-7.282"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4144</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-4144" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4144" source="CVE"/>
	<description>
	Integer overflow in the ReadSGIImage function in sgi.c in ImageMagick before 6.2.9 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via large (1) bytes_per_pixel, (2) columns, and (3) rows values, which trigger a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1ff85a06d6c4a8b1993abba98f6769f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030907" comment="ImageMagick-devel less than 5.5.7-225.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030908" comment="ImageMagick less than 5.5.7-225.30"/>
		</criteria>
	</criteria>
	<!-- 9572451219715989842a945aed31ae16 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030899" comment="ImageMagick-devel less than 5.5.7-225.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030900" comment="ImageMagick less than 5.5.7-225.25"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4145</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-4145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4145" source="CVE"/>
	<description>
	The Universal Disk Format (UDF) filesystem driver in Linux kernel 2.6.17 and earlier allows local users to cause a denial of service (hang and crash) via certain operations involving truncated files, as demonstrated via the dd command.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06a879ef6bcde6c750e9ee4e43ccc446 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 15107fb406dee9a6d661cedc4a7bd068 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030898" comment="kernel-bigsmp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4197</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-4197" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4197" source="CVE"/>
	<description>
	Multiple buffer overflows in libmusicbrainz (aka mb_client or MusicBrainz Client Library) 2.1.2 and earlier, and SVN 8406 and earlier, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via (1) a long Location header by the HTTP server, which triggers an overflow in the MBHttp::Download function in lib/http.cpp; and (2) a long URL in RDF data, as demonstrated by a URL in an rdf:resource field in an RDF XML document, which triggers overflows in many functions in lib/rdfparse.c.
	</description>
 </metadata>
<!-- 4947fd34b3d0ade045e38661c9914746 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030909" comment="libmusicbrainz less than 2.0.2-110.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4250</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-4250" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4250" source="CVE"/>
	<description>
	Buffer overflow in man and mandb (man-db) 2.4.3 and earlier allows local users to execute arbitrary code via crafted arguments to the -H flag.
	</description>
 </metadata>
<!-- 43ec78f2697282b2694f04befd7f14f4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030910" comment="man less than 2.4.1-214.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064253" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4253</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-4253" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4253" source="CVE"/>
	<description>
	Concurrency vulnerability in Mozilla Firefox 1.5.0.6 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via multiple Javascript timed events that load a deeply nested XML file, followed by redirecting the browser to another page, which leads to a concurrency failure that causes structures to be freed incorrectly, as demonstrated by (1) ffoxdie and (2) ffoxdie3.  NOTE: it has been reported that Netscape 8.1 and K-Meleon 1.0.1 are also affected by ffoxdie.  Mozilla confirmed to CVE that ffoxdie and ffoxdie3 trigger the same underlying vulnerability.  NOTE: it was later reported that Firefox 2.0 RC2 and 1.5.0.7 are also affected.
	</description>
 </metadata>
<!-- ef4a219c3a29a3b7d4c57c43cccd0acc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030911" comment="MozillaFirefox-translations less than 1.5.0.7-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030912" comment="MozillaFirefox less than 1.5.0.7-1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4334</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-4334" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4334" source="CVE"/>
	<description>
	Unspecified vulnerability in gzip 1.3.5 allows context-dependent attackers to cause a denial of service (crash) via a crafted GZIP (gz) archive, which results in a NULL dereference.
	</description>
 </metadata>
<!-- c9a04465aadc28a00f8e67df4a55f059 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030913" comment="gzip less than 1.3.5-136.13"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4335</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-4335" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4335" source="CVE"/>
	<description>
	Array index error in the make_table function in unlzh.c in the LZH decompression component in gzip 1.3.5, when running on certain platforms, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted GZIP archive that triggers an out-of-bounds write, aka a "stack modification vulnerability."
	</description>
 </metadata>
<!-- c9a04465aadc28a00f8e67df4a55f059 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030913" comment="gzip less than 1.3.5-136.13"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4336</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-4336" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4336" source="CVE"/>
	<description>
	Buffer underflow in the build_tree function in unpack.c in gzip 1.3.5 allows context-dependent attackers to execute arbitrary code via a crafted leaf count table that causes a write to a negative index.
	</description>
 </metadata>
<!-- c9a04465aadc28a00f8e67df4a55f059 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030913" comment="gzip less than 1.3.5-136.13"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4337</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-4337" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4337" source="CVE"/>
	<description>
	Buffer overflow in the make_table function in the LHZ component in gzip 1.3.5 allows context-dependent attackers to execute arbitrary code via a crafted decoding table in a GZIP archive.
	</description>
 </metadata>
<!-- c9a04465aadc28a00f8e67df4a55f059 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030913" comment="gzip less than 1.3.5-136.13"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4338</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-4338" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4338" source="CVE"/>
	<description>
	unlzh.c in the LHZ component in gzip 1.3.5 allows context-dependent attackers to cause a denial of service (infinite loop) via a crafted GZIP archive.
	</description>
 </metadata>
<!-- c9a04465aadc28a00f8e67df4a55f059 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030913" comment="gzip less than 1.3.5-136.13"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4339</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-4339" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339" source="CVE"/>
	<description>
	OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5601813d23ce6bec904c8179130dc272 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030914" comment="bind-utils-32bit less than 9-200611140525"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030915" comment="bind-utils less than 9.2.3-76.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030916" comment="bind less than 9.2.3-76.28"/>
		</criteria>
	</criteria>
	<!-- 5ed5dd66328b2d660bce8191dbd9d7de -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030917" comment="openssl-32bit less than 9-200609140529"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030918" comment="openssl-devel-32bit less than 9-200609140529"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030919" comment="openssl-devel less than 0.9.7d-15.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030920" comment="openssl less than 0.9.7d-15.26"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4340</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-4340" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4340" source="CVE"/>
	<description>
	Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates, a similar vulnerability to CVE-2006-4339.  NOTE: on 20061107, Mozilla released an advisory stating that these versions were not completely patched by MFSA2006-60. The newer fixes for 1.5.0.7 are covered by CVE-2006-5462.
	</description>
 </metadata>
<!-- ef4a219c3a29a3b7d4c57c43cccd0acc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030911" comment="MozillaFirefox-translations less than 1.5.0.7-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030912" comment="MozillaFirefox less than 1.5.0.7-1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4343</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-4343" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343" source="CVE"/>
	<description>
	The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.
	</description>
 </metadata>
<!-- 16e2a93b390a1ceb86b0945a88a4d415 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030859" comment="openssl-32bit less than 9-200609270654"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030860" comment="openssl-devel-32bit less than 9-200609270654"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030861" comment="openssl-devel less than 0.9.7d-15.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030862" comment="openssl less than 0.9.7d-15.29"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4484</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-4484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4484" source="CVE"/>
	<description>
	Buffer overflow in the LWZReadByte_ function in ext/gd/libgd/gd_gif_in.c in the GD extension in PHP before 5.1.5 allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array.
	</description>
 </metadata>
<!-- e7210de56ee03db74da657f036c64cc6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030921" comment="perl-Tk less than 800.024-429.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4514</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-4514" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4514" source="CVE"/>
	<description>
	Heap-based buffer overflow in the ole_info_read_metabat function in Gnome Structured File library (libgsf) 1.14.0, and other versions before 1.14.2, allows context-dependent attackers to execute arbitrary code via a large num_metabat value in an OLE document, which causes the ole_init_info function to allocate insufficient memory.
	</description>
 </metadata>
<!-- 8925f151052752a744fcfe7924249f34 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030922" comment="libgsf-32bit less than 9-200612081114"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030923" comment="libgsf less than 1.11.1-2.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4519</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-4519" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4519" source="CVE"/>
	<description>
	Multiple integer overflows in the image loader plug-ins in GIMP before 2.2.16 allow user-assisted remote attackers to execute arbitrary code via crafted length values in (1) DICOM, (2) PNM, (3) PSD, (4) PSP, (5) Sun RAS, (6) XBM, and (7) XWD files.
	</description>
 </metadata>
<!-- 63cd81aa6b64df4df73ab2b6c72b267d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030924" comment="gimp-devel less than 2.0.2-1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030925" comment="gimp less than 2.0.2-1.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4538</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-4538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4538" source="CVE"/>
	<description>
	Linux kernel 2.6.17 and earlier, when running on IA64 or SPARC platforms, allows local users to cause a denial of service (crash) via a malformed ELF file that triggers memory maps that cross region boundaries.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06a879ef6bcde6c750e9ee4e43ccc446 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 15107fb406dee9a6d661cedc4a7bd068 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030898" comment="kernel-bigsmp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4565</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-4565" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4565" source="CVE"/>
	<description>
	Heap-based buffer overflow in Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a JavaScript regular expression with a "minimal quantifier."
	</description>
 </metadata>
<!-- ef4a219c3a29a3b7d4c57c43cccd0acc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030911" comment="MozillaFirefox-translations less than 1.5.0.7-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030912" comment="MozillaFirefox less than 1.5.0.7-1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4566</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-4566" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4566" source="CVE"/>
	<description>
	Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5 allows remote attackers to cause a denial of service (crash) via a malformed JavaScript regular expression that ends with a backslash in an unterminated character set ("[\\"), which leads to a buffer over-read.
	</description>
 </metadata>
<!-- ef4a219c3a29a3b7d4c57c43cccd0acc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030911" comment="MozillaFirefox-translations less than 1.5.0.7-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030912" comment="MozillaFirefox less than 1.5.0.7-1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4567</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-4567" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4567" source="CVE"/>
	<description>
	Mozilla Firefox before 1.5.0.7 and Thunderbird before 1.5.0.7 makes it easy for users to accept self-signed certificates for the auto-update mechanism, which might allow remote user-assisted attackers to use DNS spoofing to trick users into visiting a malicious site and accepting a malicious certificate for the Mozilla update site, which can then be used to install arbitrary code on the next update.
	</description>
 </metadata>
<!-- ef4a219c3a29a3b7d4c57c43cccd0acc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030911" comment="MozillaFirefox-translations less than 1.5.0.7-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030912" comment="MozillaFirefox less than 1.5.0.7-1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4568</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-4568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4568" source="CVE"/>
	<description>
	Mozilla Firefox before 1.5.0.7 and SeaMonkey before 1.0.5 allows remote attackers to bypass the security model and inject content into the sub-frame of another site via targetWindow.frames[n].document.open(), which facilitates spoofing and other attacks.
	</description>
 </metadata>
<!-- ef4a219c3a29a3b7d4c57c43cccd0acc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030911" comment="MozillaFirefox-translations less than 1.5.0.7-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030912" comment="MozillaFirefox less than 1.5.0.7-1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4569</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-4569" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4569" source="CVE"/>
	<description>
	The popup blocker in Mozilla Firefox before 1.5.0.7 opens the "blocked popups" display in the context of the Location bar instead of the subframe from which the popup originated, which might make it easier for remote user-assisted attackers to conduct cross-site scripting (XSS) attacks.
	</description>
 </metadata>
<!-- ef4a219c3a29a3b7d4c57c43cccd0acc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030911" comment="MozillaFirefox-translations less than 1.5.0.7-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030912" comment="MozillaFirefox less than 1.5.0.7-1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4570</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-4570" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4570" source="CVE"/>
	<description>
	Mozilla Thunderbird before 1.5.0.7 and SeaMonkey before 1.0.5, with "Load Images" enabled, allows remote user-assisted attackers to bypass settings that disable JavaScript via a remote XBL file in a message that is loaded when the user views, forwards, or replies to the original message.
	</description>
 </metadata>
<!-- ef4a219c3a29a3b7d4c57c43cccd0acc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030911" comment="MozillaFirefox-translations less than 1.5.0.7-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030912" comment="MozillaFirefox less than 1.5.0.7-1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4571</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-4571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4571" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5 allow remote attackers to cause a denial of service (crash), corrupt memory, and possibly execute arbitrary code via unspecified vectors, some of which involve JavaScript, and possibly large images or plugin data.
	</description>
 </metadata>
<!-- ef4a219c3a29a3b7d4c57c43cccd0acc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030911" comment="MozillaFirefox-translations less than 1.5.0.7-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030912" comment="MozillaFirefox less than 1.5.0.7-1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4573</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-4573" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4573" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the "utf8 combining characters handling" (utf8_handle_comb function in encoding.c) in screen before 4.0.3 allows user-assisted attackers to cause a denial of service (crash or hang) via certain UTF8 sequences.
	</description>
 </metadata>
<!-- e192e1cbb45632e4da008b3b6243cf87 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030926" comment="screen less than 4.0.2-41.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4600</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-4600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4600" source="CVE"/>
	<description>
	slapd in OpenLDAP before 2.3.25 allows remote authenticated users with selfwrite Access Control List (ACL) privileges to modify arbitrary Distinguished Names (DN).
	</description>
 </metadata>
<!-- 9609dd5032a2ada02a8800965fa511b2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030927" comment="openldap2 less than 2.2.24-4.19"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4640</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-4640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4640" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.16.0 allows user-assisted remote attackers to bypass the allowScriptAccess protection via unspecified vectors.
	</description>
 </metadata>
<!-- 8ca1dc42850524d1908ffbf18670eb2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030874" comment="flash-player less than 7.0.68.0-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4790</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-4790" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4790" source="CVE"/>
	<description>
	verify.c in GnuTLS before 1.4.4, when using an RSA key with exponent 3, does not properly handle excess data in the digestAlgorithm.parameters field when generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents GnuTLS from correctly verifying X.509 and other certificates that use PKCS, a variant of CVE-2006-4339.
	</description>
 </metadata>
<!-- 1eb852e54561e6d6fdfa9598ad260a7d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030928" comment="gnutls-devel less than 1.0.8-26.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030929" comment="gnutls less than 1.0.8-26.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4799</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-4799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4799" source="CVE"/>
	<description>
	Buffer overflow in ffmpeg for xine-lib before 1.1.2 might allow context-dependent attackers to execute arbitrary code via a crafted AVI file and "bad indexes", a different vulnerability than CVE-2005-4048 and CVE-2006-2802.
	</description>
 </metadata>
<!-- 71fe824ad8d14f886e3c15a6be27fc14 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030930" comment="xine-lib-32bit less than 9-200611230135"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030931" comment="xine-lib less than 0.99.rc3a-106.31"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4800</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-4800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4800" source="CVE"/>
	<description>
	Multiple buffer overflows in libavcodec in ffmpeg before 0.4.9_p20060530 allow remote attackers to cause a denial of service or possibly execute arbitrary code via multiple unspecified vectors in (1) dtsdec.c, (2) vorbis.c, (3) rm.c, (4) sierravmd.c, (5) smacker.c, (6) tta.c, (7) 4xm.c, (8) alac.c, (9) cook.c, (10) shorten.c, (11) smacker.c, (12) snow.c, and (13) tta.c.  NOTE: it is likely that this is a different vulnerability than CVE-2005-4048 and CVE-2006-2802.
	</description>
 </metadata>
<!-- 71fe824ad8d14f886e3c15a6be27fc14 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030930" comment="xine-lib-32bit less than 9-200611230135"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030931" comment="xine-lib less than 0.99.rc3a-106.31"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4810</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-4810" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4810" source="CVE"/>
	<description>
	Buffer overflow in the readline function in util/texindex.c, as used by the (1) texi2dvi and (2) texindex commands, in texinfo 4.8 and earlier allows local users to execute arbitrary code via a crafted Texinfo file.
	</description>
 </metadata>
<!-- f14a053a1c56609caedf6846afdcdd16 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030932" comment="texinfo less than 4.6-61.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4811</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-4811" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4811" source="CVE"/>
	<description>
	Integer overflow in Qt 3.3 before 3.3.7, 4.1 before 4.1.5, and 4.2 before 4.2.1, as used in the KDE khtml library, kdelibs 3.1.3, and possibly other packages, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted pixmap image.
	</description>
 </metadata>
<!-- 595ed8e88dd0e76ba4d62c4bb475e623 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030933" comment="qt3-32bit less than 9-200610230741"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030934" comment="qt3-devel-32bit less than 9-200610230741"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030935" comment="qt3-devel-doc less than 3.3.1-36.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030936" comment="qt3-devel less than 3.3.1-36.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030937" comment="qt3-non-mt less than 3.3.1-41.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030938" comment="qt3 less than 3.3.1-36.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4813</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-4813" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4813" source="CVE"/>
	<description>
	The __block_prepare_write function in fs/buffer.c for Linux kernel 2.6.x before 2.6.13 does not properly clear buffers during certain error conditions, which allows local users to read portions of files that have been unlinked.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06a879ef6bcde6c750e9ee4e43ccc446 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 15107fb406dee9a6d661cedc4a7bd068 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030898" comment="kernel-bigsmp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4924</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-4924" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4924" source="CVE"/>
	<description>
	sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack detector.
	</description>
 </metadata>
<!-- 05412985c36daeff0c33b88942b68c2c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030939" comment="openssh-askpass less than 4.1p1-11.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030940" comment="openssh less than 4.1p1-11.28"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4925</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-4925" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4925" source="CVE"/>
	<description>
	packet.c in ssh in OpenSSH allows remote attackers to cause a denial of service (crash) by sending an invalid protocol sequence with USERAUTH_SUCCESS before NEWKEYS, which causes newkeys[mode] to be NULL.
	</description>
 </metadata>
<!-- 05412985c36daeff0c33b88942b68c2c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030939" comment="openssh-askpass less than 4.1p1-11.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030940" comment="openssh less than 4.1p1-11.28"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4965</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-4965" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4965" source="CVE"/>
	<description>
	Apple QuickTime 7.1.3 Player and Plug-In allows remote attackers to execute arbitrary JavaScript code and possibly conduct other attacks via a QuickTime Media Link (QTL) file with an embed XML element and a qtnext parameter that identifies resources outside of the original domain.  NOTE: as of 20070912, this issue has been demonstrated by using instances of Components.interfaces.nsILocalFile and Components.interfaces.nsIProcess to execute arbitrary local files within Firefox and possibly Internet Explorer.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 94e7e87449ed25841acaf9b535567347 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030840" comment="MozillaFirefox-translations less than 1.5.0.12-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030841" comment="MozillaFirefox less than 1.5.0.12-0.5"/>
		</criteria>
	</criteria>
	<!-- bc8dbb4aea45ba7fac544f7e63f7898b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030842" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030843" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030844" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030845" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030846" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030847" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030848" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030849" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030850" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030851" comment="mozilla less than 1.8_seamonkey_1.0.9-1.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4980</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-4980" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4980" source="CVE"/>
	<description>
	Buffer overflow in the repr function in Python 2.3 through 2.6 before 20060822 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via crafted wide character UTF-32/UCS-4 strings to certain scripts.
	</description>
 </metadata>
<!-- c068fdf79cae7d7c51cab673cf24c1b6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030941" comment="python-32bit less than 9-200610132325"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030942" comment="python-devel less than 2.3.3-88.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030943" comment="python less than 2.3.3-88.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4997</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-4997" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4997" source="CVE"/>
	<description>
	The clip_mkip function in net/atm/clip.c of the ATM subsystem in Linux kernel allows remote attackers to cause a denial of service (panic) via unknown vectors that cause the ATM subsystem to access the memory of socket buffers after they are freed (freed pointer dereference).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06a879ef6bcde6c750e9ee4e43ccc446 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 15107fb406dee9a6d661cedc4a7bd068 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030898" comment="kernel-bigsmp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5051</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-5051" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5051" source="CVE"/>
	<description>
	Signal handler race condition in OpenSSH before 4.4 allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code if GSSAPI authentication is enabled, via unspecified vectors that lead to a double-free.
	</description>
 </metadata>
<!-- 05412985c36daeff0c33b88942b68c2c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030939" comment="openssh-askpass less than 4.1p1-11.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030940" comment="openssh less than 4.1p1-11.28"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5052</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-5052" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5052" source="CVE"/>
	<description>
	Unspecified vulnerability in portable OpenSSH before 4.4, when running on some platforms, allows remote attackers to determine the validity of usernames via unknown vectors involving a GSSAPI "authentication abort."
	</description>
 </metadata>
<!-- 05412985c36daeff0c33b88942b68c2c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030939" comment="openssh-askpass less than 4.1p1-11.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030940" comment="openssh less than 4.1p1-11.28"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5170</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-5170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5170" source="CVE"/>
	<description>
	pam_ldap in nss_ldap on Red Hat Enterprise Linux 4, Fedora Core 3 and earlier, and possibly other distributions does not return an error condition when an LDAP directory server responds with a PasswordPolicyResponse control response, which causes the pam_authenticate function to return a success code even if authentication has failed, as originally reported for xscreensaver.
	</description>
 </metadata>
<!-- 24da01b634bfff963111019a1b725dca -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030944" comment="pam_ldap-32bit less than 9-200610241503"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030945" comment="pam_ldap less than 169-28.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5174</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-5174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5174" source="CVE"/>
	<description>
	The copy_from_user function in the uaccess code in Linux kernel 2.6 before 2.6.19-rc1, when running on s390, does not properly clear a kernel buffer, which allows local user space programs to read portions of kernel memory by "appending to a file from a bad address," which triggers a fault that prevents the unused memory from being cleared in the kernel buffer.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06a879ef6bcde6c750e9ee4e43ccc446 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 15107fb406dee9a6d661cedc4a7bd068 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030898" comment="kernel-bigsmp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5330</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-5330" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5330" source="CVE"/>
	<description>
	CRLF injection vulnerability in Adobe Flash Player plugin 9.0.16 and earlier for Windows, 7.0.63 and earlier for Linux, 7.x before 7.0 r67 for Solaris, and before 9.0.28.0 for Mac OS X, allows remote attackers to modify HTTP headers of client requests and conduct HTTP Request Splitting attacks via CRLF sequences in arguments to the ActionScript functions (1) XML.addRequestHeader and (2) XML.contentType.  NOTE: the flexibility of the attack varies depending on the type of web browser being used.
	</description>
 </metadata>
<!-- e0b1939107e149b2e2c750dae6331938 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030946" comment="flash-player less than 7.0.69.0-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5456</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-5456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5456" source="CVE"/>
	<description>
	Multiple buffer overflows in GraphicsMagick before 1.1.7 and ImageMagick 6.0.7 allow user-assisted attackers to cause a denial of service and possibly execute arbitrary code via (1) a DCM image that is not properly handled by the ReadDCMImage function in coders/dcm.c, or (2) a PALM image that is not properly handled by the ReadPALMImage function in coders/palm.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 54784cdc395efc4acd3491b3f202e583 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030947" comment="ImageMagick-devel less than 5.5.7-225.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030948" comment="ImageMagick less than 5.5.7-225.28"/>
		</criteria>
	</criteria>
	<!-- 790f86a305698341c2124b89f6630259 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030949" comment="ImageMagick-devel less than 5.5.7-225.33"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030950" comment="ImageMagick less than 5.5.7-225.33"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5462</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-5462" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5462" source="CVE"/>
	<description>
	Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates. NOTE: this identifier is for unpatched product versions that were originally intended to be addressed by CVE-2006-4340.
	</description>
 </metadata>
<!-- eb29e246d47ad02c74de06d48db89df2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030951" comment="MozillaFirefox-translations less than 1.5.0.8-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030952" comment="MozillaFirefox less than 1.5.0.8-0.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5463</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-5463" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5463" source="CVE"/>
	<description>
	Unspecified vulnerability in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6 allows remote attackers to execute arbitrary JavaScript bytecode via unspecified vectors involving modification of a Script object while it is executing.
	</description>
 </metadata>
<!-- eb29e246d47ad02c74de06d48db89df2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030951" comment="MozillaFirefox-translations less than 1.5.0.8-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030952" comment="MozillaFirefox less than 1.5.0.8-0.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5464</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-5464" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5464" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the layout engine in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6 allow remote attackers to cause a denial of service (crash) via unspecified vectors.
	</description>
 </metadata>
<!-- eb29e246d47ad02c74de06d48db89df2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030951" comment="MozillaFirefox-translations less than 1.5.0.8-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030952" comment="MozillaFirefox less than 1.5.0.8-0.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5467</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-5467" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5467" source="CVE"/>
	<description>
	The cgi.rb CGI library for Ruby 1.8 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an HTTP request with a multipart MIME body that contains an invalid boundary specifier, as demonstrated using a specifier that begins with a "-" instead of "--" and contains an inconsistent ID.
	</description>
 </metadata>
<!-- 9f7246de37b3edd912705a13b8498270 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030953" comment="ruby less than 1.8.1-42.19"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5540</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-5540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5540" source="CVE"/>
	<description>
	backend/parser/analyze.c in PostgreSQL 8.1.x before 8.1.5 allows remote authenticated users to cause a denial of service (daemon crash) via certain aggregate functions in an UPDATE statement, which are not properly handled during a "MIN/MAX index optimization."
	</description>
 </metadata>
<!-- 59650c03a8bc5ae310cd7898bd106ad2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030954" comment="postgresql-contrib less than 7.4.13-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030955" comment="postgresql-devel less than 7.4.13-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030956" comment="postgresql-docs less than 7.4.13-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030957" comment="postgresql-libs-32bit less than 9-200611160118"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030958" comment="postgresql-libs less than 7.4.13-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030959" comment="postgresql-pl less than 7.4.13-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030960" comment="postgresql-server less than 7.4.13-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030961" comment="postgresql less than 7.4.13-0.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5541</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-5541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5541" source="CVE"/>
	<description>
	backend/parser/parse_coerce.c in PostgreSQL 7.4.1 through 7.4.14, 8.0.x before 8.0.9, and 8.1.x before 8.1.5 allows remote authenticated users to cause a denial of service (daemon crash) via a coercion of an unknown element to ANYARRAY.
	</description>
 </metadata>
<!-- 59650c03a8bc5ae310cd7898bd106ad2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030954" comment="postgresql-contrib less than 7.4.13-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030955" comment="postgresql-devel less than 7.4.13-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030956" comment="postgresql-docs less than 7.4.13-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030957" comment="postgresql-libs-32bit less than 9-200611160118"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030958" comment="postgresql-libs less than 7.4.13-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030959" comment="postgresql-pl less than 7.4.13-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030960" comment="postgresql-server less than 7.4.13-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030961" comment="postgresql less than 7.4.13-0.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5542</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-5542" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5542" source="CVE"/>
	<description>
	backend/tcop/postgres.c in PostgreSQL 8.1.x before 8.1.5 allows remote authenticated users to cause a denial of service (daemon crash) related to duration logging of V3-protocol Execute messages for (1) COMMIT and (2) ROLLBACK SQL statements.
	</description>
 </metadata>
<!-- 59650c03a8bc5ae310cd7898bd106ad2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030954" comment="postgresql-contrib less than 7.4.13-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030955" comment="postgresql-devel less than 7.4.13-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030956" comment="postgresql-docs less than 7.4.13-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030957" comment="postgresql-libs-32bit less than 9-200611160118"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030958" comment="postgresql-libs less than 7.4.13-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030959" comment="postgresql-pl less than 7.4.13-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030960" comment="postgresql-server less than 7.4.13-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030961" comment="postgresql less than 7.4.13-0.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5601</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-5601" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5601" source="CVE"/>
	<description>
	Stack-based buffer overflow in the eap_do_notify function in eap.c in xsupplicant before 1.2.6, and possibly other versions, allows remote authenticated users to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- e03f8d729eccecca3c8d55e3fb9fc06f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030962" comment="xsupplicant less than 1.2.8-14.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5648</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-5648" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5648" source="CVE"/>
	<description>
	Ubuntu Linux 6.10 for the PowerPC (PPC) allows local users to cause a denial of service (resource consumption) by using the (1) sys_get_robust_list and (2) sys_set_robust_list functions to create processes that cannot be killed.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06a879ef6bcde6c750e9ee4e43ccc446 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 15107fb406dee9a6d661cedc4a7bd068 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030898" comment="kernel-bigsmp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5649</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-5649" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5649" source="CVE"/>
	<description>
	Unspecified vulnerability in the "alignment check exception handling" in Ubuntu 5.10, 6.06 LTS, and 6.10 for the PowerPC (PPC) allows local users to cause a denial of service (kernel panic) via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06a879ef6bcde6c750e9ee4e43ccc446 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 15107fb406dee9a6d661cedc4a7bd068 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030898" comment="kernel-bigsmp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5747</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-5747" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5747" source="CVE"/>
	<description>
	Unspecified vulnerability in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6 allows remote attackers to execute arbitrary code via the XML.prototype.hasOwnProperty JavaScript function.
	</description>
 </metadata>
<!-- eb29e246d47ad02c74de06d48db89df2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030951" comment="MozillaFirefox-translations less than 1.5.0.8-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030952" comment="MozillaFirefox less than 1.5.0.8-0.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5748</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-5748" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5748" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors that trigger memory corruption.
	</description>
 </metadata>
<!-- eb29e246d47ad02c74de06d48db89df2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030951" comment="MozillaFirefox-translations less than 1.5.0.8-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030952" comment="MozillaFirefox less than 1.5.0.8-0.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5749</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-5749" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5749" source="CVE"/>
	<description>
	The isdn_ppp_ccp_reset_alloc_state function in drivers/isdn/isdn_ppp.c in the Linux 2.4 kernel before 2.4.34-rc4 does not call the init_timer function for the ISDN PPP CCP reset state timer, which has unknown attack vectors and results in a system crash.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4309006ed78370b6a442ab18e97609c1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- bd16f566b869a29489f5fbc7c16bddd0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030858" comment="kernel-bigsmp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5752</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-5752" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5752" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in mod_status.c in the mod_status module in Apache HTTP Server (httpd), when ExtendedStatus is enabled and a public server-status page is used, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving charsets with browsers that perform "charset detection" when the content-type is not specified.
	</description>
 </metadata>
<!-- a5b67777faf570a7e001c677784ac7c7 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030963" comment="libapr0 less than 2.0.59-1.4"/>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030964" comment="apache2-devel less than 2.0.59-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030965" comment="apache2-prefork less than 2.0.59-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030966" comment="apache2-worker less than 2.0.59-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030967" comment="apache2 less than 2.0.59-1.4"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5753</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-5753" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5753" source="CVE"/>
	<description>
	Unspecified vulnerability in the listxattr system call in Linux kernel, when a "bad inode" is present, allows local users to cause a denial of service (data corruption) and possibly gain privileges via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4309006ed78370b6a442ab18e97609c1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- bd16f566b869a29489f5fbc7c16bddd0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030858" comment="kernel-bigsmp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5754</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-5754" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5754" source="CVE"/>
	<description>
	The aio_setup_ring function in Linux kernel does not properly initialize a variable, which allows local users to cause a denial of service (crash) via an unspecified error path that causes an incorrect free operation.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4309006ed78370b6a442ab18e97609c1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- bd16f566b869a29489f5fbc7c16bddd0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030858" comment="kernel-bigsmp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5757</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-5757" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5757" source="CVE"/>
	<description>
	Race condition in the __find_get_block_slow function in the ISO9660 filesystem in Linux 2.6.18 and possibly other versions allows local users to cause a denial of service (infinite loop) by mounting a crafted ISO9660 filesystem containing malformed data structures.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06a879ef6bcde6c750e9ee4e43ccc446 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 15107fb406dee9a6d661cedc4a7bd068 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030898" comment="kernel-bigsmp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5779</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-5779" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5779" source="CVE"/>
	<description>
	OpenLDAP before 2.3.29 allows remote attackers to cause a denial of service (daemon crash) via LDAP BIND requests with long authcid names, which triggers an assertion failure.
	</description>
 </metadata>
<!-- bb15de3abad130715a6d95ac3c49fde6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030968" comment="openldap2-client-32bit less than 9-200611171828"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030969" comment="openldap2-client less than 2.2.24-4.22"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5793</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-5793" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5793" source="CVE"/>
	<description>
	The sPLT chunk handling code (png_set_sPLT function in pngset.c) in libpng 1.0.6 through 1.2.12 uses a sizeof operator on the wrong data type, which allows context-dependent attackers to cause a denial of service (crash) via malformed sPLT chunks that trigger an out-of-bounds read.
	</description>
 </metadata>
<!-- e998029189ef39123c667f390933f7c4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030875" comment="libpng-32bit less than 9-200612010115"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030876" comment="libpng-devel less than 1.2.5-182.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030877" comment="libpng less than 1.2.5-182.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5794</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-5794" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5794" source="CVE"/>
	<description>
	Unspecified vulnerability in the sshd Privilege Separation Monitor in OpenSSH before 4.5 causes weaker verification that authentication has been successful, which might allow attackers to bypass authentication. NOTE: as of 20061108, it is believed that this issue is only exploitable by leveraging vulnerabilities in the unprivileged process, which are not known to exist.
	</description>
 </metadata>
<!-- 786c6a467b067c5cf9844349ee6f7593 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030970" comment="openssh-askpass less than 4.1p1-11.34"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030971" comment="openssh less than 4.1p1-11.34"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5823</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-5823" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5823" source="CVE"/>
	<description>
	The zlib_inflate function in Linux kernel 2.6.x allows local users to cause a denial of service (crash) via a malformed filesystem that uses zlib compression that triggers memory corruption, as demonstrated using cramfs.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06a879ef6bcde6c750e9ee4e43ccc446 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 15107fb406dee9a6d661cedc4a7bd068 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030898" comment="kernel-bigsmp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5857</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-5857" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5857" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 7.0.8 and earlier allows user-assisted remote attackers to execute code via a crafted PDF file that triggers memory corruption and overwrites a subroutine pointer during rendering.
	</description>
 </metadata>
<!-- e4aa9329743e7c8bb35f09a113da0938 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030972" comment="acroread less than 7.0.9-2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5864</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-5864" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5864" source="CVE"/>
	<description>
	Stack-based buffer overflow in the ps_gettext function in ps.c for GNU gv 3.6.2, and possibly earlier versions, allows user-assisted attackers to execute arbitrary code via a PostScript (PS) file with certain headers that contain long comments, as demonstrated using the (1) DocumentMedia, (2) DocumentPaperSizes, and possibly (3) PageMedia and (4) PaperSize headers.  NOTE: this issue can be exploited through other products that use gv such as evince.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9de061ea9e316c4f70d52043d835a259 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030973" comment="gv less than 3.5.8-1129.10"/>
	</criteria>
	<!-- a742cbcb7f25ec6b37cc65f865d2b4e9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030974" comment="gv less than 3.5.8-1129.8"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5867</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-5867" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5867" source="CVE"/>
	<description>
	fetchmail before 6.3.6-rc4 does not properly enforce TLS and may transmit cleartext passwords over unsecured links if certain circumstances occur, which allows remote attackers to obtain sensitive information via man-in-the-middle (MITM) attacks.
	</description>
 </metadata>
<!-- 460569ff05f9f1dd9cb03924fffb9bda -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030726" comment="fetchmail less than 6.2.5-49.15"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5870</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-5870" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5870" source="CVE"/>
	<description>
	Multiple integer overflows in OpenOffice.org (OOo) 2.0.4 and earlier, and possibly other versions before 2.1.0; and StarOffice 6 through 8; allow user-assisted remote attackers to execute arbitrary code via a crafted (a) WMF or (b) EMF file that triggers heap-based buffer overflows in (1) wmf/winwmf.cxx, during processing of META_ESCAPE records; and wmf/enhwmf.cxx, during processing of (2) EMR_POLYPOLYGON and (3) EMR_POLYPOLYGON16 records.
	</description>
 </metadata>
<!-- b38ccbe0fb2200869a3553e136fde4f2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030975" comment="OpenOffice_org-ar less than 1.1.5-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030976" comment="OpenOffice_org-ca less than 1.1.5-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030977" comment="OpenOffice_org-cs less than 1.1.5-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030978" comment="OpenOffice_org-da less than 1.1.5-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030979" comment="OpenOffice_org-de less than 1.1.5-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030980" comment="OpenOffice_org-el less than 1.1.5-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030981" comment="OpenOffice_org-en less than 1.1.5-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030982" comment="OpenOffice_org-es less than 1.1.5-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030983" comment="OpenOffice_org-et less than 1.1.5-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030984" comment="OpenOffice_org-fi less than 1.1.5-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030985" comment="OpenOffice_org-fr less than 1.1.5-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030986" comment="OpenOffice_org-gnome less than 1.1.5-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030987" comment="OpenOffice_org-hu less than 1.1.5-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030988" comment="OpenOffice_org-it less than 1.1.5-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030989" comment="OpenOffice_org-ja less than 1.1.5-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030990" comment="OpenOffice_org-kde less than 1.1.5-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030991" comment="OpenOffice_org-ko less than 1.1.5-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030992" comment="OpenOffice_org-nl less than 1.1.5-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030993" comment="OpenOffice_org-pl less than 1.1.5-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030994" comment="OpenOffice_org-pt-BR less than 1.1.5-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030995" comment="OpenOffice_org-pt less than 1.1.5-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030996" comment="OpenOffice_org-ru less than 1.1.5-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030997" comment="OpenOffice_org-sk less than 1.1.5-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030998" comment="OpenOffice_org-sl less than 1.1.5-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030999" comment="OpenOffice_org-sv less than 1.1.5-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031000" comment="OpenOffice_org-tr less than 1.1.5-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031001" comment="OpenOffice_org-zh-CN less than 1.1.5-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031002" comment="OpenOffice_org-zh-TW less than 1.1.5-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031003" comment="OpenOffice_org less than 1.1.5-0.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5871</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-5871" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5871" source="CVE"/>
	<description>
	smbfs in Linux kernel 2.6.8 and other versions, and 2.4.x before 2.4.34, when UNIX extensions are enabled, ignores certain mount options, which could cause clients to use server-specified uid, gid and mode settings.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4309006ed78370b6a442ab18e97609c1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- bd16f566b869a29489f5fbc7c16bddd0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030858" comment="kernel-bigsmp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5876</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-5876" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5876" source="CVE"/>
	<description>
	The soup_headers_parse function in soup-headers.c for libsoup HTTP library before 2.2.99 allows remote attackers to cause a denial of service (crash) via malformed HTTP headers, probably involving missing fields or values.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 43c2764245ef7a05f0cab984e5b33b81 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031004" comment="libredcarpet-python less than 2.4.9-1.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031005" comment="libredcarpet-tools less than 2.4.9-1.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031006" comment="libredcarpet less than 2.4.9-1.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031007" comment="python-openssl less than 0.6-3.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031008" comment="rcd-devel less than 2.4.9-1.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031009" comment="rcd-modules-devel less than 2.4.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031010" comment="rcd-modules less than 2.4.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031011" comment="rcd less than 2.4.9-1.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031012" comment="red-carpet less than 2.4.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031013" comment="rug less than 2.4.9-1.14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031014" comment="xmlrpc-c-devel less than 0.9.10-21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031015" comment="xmlrpc-c less than 0.9.10-21.3"/>
		</criteria>
	</criteria>
	<!-- 6eb62a9fe299da1a7b971369073667b2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031016" comment="libsoup-32bit less than 9-200701182000"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031017" comment="libsoup-devel-32bit less than 9-200701182000"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031018" comment="libsoup-devel less than 2.2.3-0.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031019" comment="libsoup less than 2.2.3-0.20"/>
		</criteria>
	</criteria>
	<!-- 92e17caf47363ae1d1347db4ef250fa7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031020" comment="rcd-devel less than 2.4.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031021" comment="rcd less than 2.4.9-1.17"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5974</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-5974" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5974" source="CVE"/>
	<description>
	fetchmail 6.3.5 and 6.3.6 before 6.3.6-rc4, when refusing a message delivered via the mda option, allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger a NULL pointer dereference when calling the (1) ferror or (2) fflush functions.
	</description>
 </metadata>
<!-- 460569ff05f9f1dd9cb03924fffb9bda -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030726" comment="fetchmail less than 6.2.5-49.15"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6053</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-6053" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6053" source="CVE"/>
	<description>
	The ext3fs_dirhash function in Linux kernel 2.6.x allows local users to cause a denial of service (crash) via an ext3 stream with malformed data structures.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06a879ef6bcde6c750e9ee4e43ccc446 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 15107fb406dee9a6d661cedc4a7bd068 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030898" comment="kernel-bigsmp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6054</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-6054" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6054" source="CVE"/>
	<description>
	The ext2 file system code in Linux kernel 2.6.x allows local users to cause a denial of service (crash) via an ext2 stream with malformed data structures that triggers an error in the ext2_check_page due to a length that is smaller than the minimum.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06a879ef6bcde6c750e9ee4e43ccc446 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 15107fb406dee9a6d661cedc4a7bd068 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030898" comment="kernel-bigsmp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6056</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-6056" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6056" source="CVE"/>
	<description>
	Linux kernel 2.6.x up to 2.6.18 and possibly other versions, when SELinux hooks are enabled, allows local users to cause a denial of service (crash) via a malformed file stream that triggers a NULL pointer dereference in the superblock_doinit function, as demonstrated using an HFS filesystem image.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06a879ef6bcde6c750e9ee4e43ccc446 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 15107fb406dee9a6d661cedc4a7bd068 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030898" comment="kernel-bigsmp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6060</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-6060" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6060" source="CVE"/>
	<description>
	The NTFS filesystem code in Linux kernel 2.6.x up to 2.6.18, and possibly other versions, allows local users to cause a denial of service (CPU consumption) via a malformed NTFS file stream that triggers an infinite loop in the __find_get_block_slow function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06a879ef6bcde6c750e9ee4e43ccc446 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 15107fb406dee9a6d661cedc4a7bd068 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030898" comment="kernel-bigsmp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6077</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-6077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6077" source="CVE"/>
	<description>
	The (1) Password Manager in Mozilla Firefox 2.0, and 1.5.0.8 and earlier; and the (2) Passcard Manager in Netscape 8.1.2 and possibly other versions, do not properly verify that an ACTION URL in a FORM element containing a password INPUT element matches the web site for which the user stored a password, which allows remote attackers to obtain passwords via a password INPUT element on a different web page located on the web site intended for this password.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 66969064f4a01b40dabf533d22cb76ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031022" comment="MozillaFirefox-translations less than 1.5.0.10-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031023" comment="MozillaFirefox less than 1.5.0.10-0.2"/>
		</criteria>
	</criteria>
	<!-- adf5cccb9b0cfb2f9cb649652f793fdc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031024" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031025" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031026" comment="mozilla-devel less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031027" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031028" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031029" comment="mozilla-irc less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031030" comment="mozilla-lib64 less than 1.6-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031031" comment="mozilla-mail less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031032" comment="mozilla-venkman less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031033" comment="mozilla less than 1.8_seamonkey_1.0.8-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6097</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-6097" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6097" source="CVE"/>
	<description>
	GNU tar 1.16 and 1.15.1, and possibly other versions, allows user-assisted attackers to overwrite arbitrary files via a tar file that contains a GNUTYPE_NAMES record with a symbolic link, which is not properly handled by the extract_archive function in extract.c and extract_mangle function in mangle.c, a variant of CVE-2002-1216.
	</description>
 </metadata>
<!-- 31a48f9cdcff5ec4b2d367c86e31da9d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031034" comment="tar less than 1.13.25-325.8"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6101</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-6101" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6101" source="CVE"/>
	<description>
	Integer overflow in the ProcRenderAddGlyphs function in the Render extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of glyph management data structures.
	</description>
 </metadata>
<!-- 3806664392b7217bd698fe6e5213851c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031035" comment="XFree86-server less than 4.3.99.902-43.82"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6102</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-6102" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6102" source="CVE"/>
	<description>
	Integer overflow in the ProcDbeGetVisualInfo function in the DBE extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of unspecified data structures.
	</description>
 </metadata>
<!-- 3806664392b7217bd698fe6e5213851c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031035" comment="XFree86-server less than 4.3.99.902-43.82"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6103</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-6103" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6103" source="CVE"/>
	<description>
	Integer overflow in the ProcDbeSwapBuffers function in the DBE extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of unspecified data structures.
	</description>
 </metadata>
<!-- 3806664392b7217bd698fe6e5213851c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031035" comment="XFree86-server less than 4.3.99.902-43.82"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6106</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-6106" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6106" source="CVE"/>
	<description>
	Multiple buffer overflows in the cmtp_recv_interopmsg function in the Bluetooth driver (net/bluetooth/cmtp/capi.c) in the Linux kernel 2.4.22 up to 2.4.33.4 and 2.6.2 before 2.6.18.6, and 2.6.19.x, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via CAPI messages with a large value for the length of the (1) manu (manufacturer) or (2) serial (serial number) field.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4309006ed78370b6a442ab18e97609c1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- bd16f566b869a29489f5fbc7c16bddd0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030858" comment="kernel-bigsmp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6169</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-6169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6169" source="CVE"/>
	<description>
	Heap-based buffer overflow in the ask_outfile_name function in openfile.c for GnuPG (gpg) 1.4 and 2.0, when running interactively, might allow attackers to execute arbitrary code via messages with "C-escape" expansions, which cause the make_printable_string function to return a longer string than expected while constructing a prompt.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 440643b5b7f99c513f043f911ca9d906 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031036" comment="gpg less than 1.2.4-68.22"/>
	</criteria>
	<!-- d29d6e06422f5a6d9e87580b666bbb83 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031037" comment="gpg2 less than 1.9.10-2.12"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6235</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-6235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6235" source="CVE"/>
	<description>
	A "stack overwrite" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 440643b5b7f99c513f043f911ca9d906 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031036" comment="gpg less than 1.2.4-68.22"/>
	</criteria>
	<!-- d29d6e06422f5a6d9e87580b666bbb83 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031037" comment="gpg2 less than 1.9.10-2.12"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6297</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-6297" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6297" source="CVE"/>
	<description>
	Stack consumption vulnerability in the KFILE JPEG (kfile_jpeg) plugin in kdegraphics 3, as used by konqueror, digikam, and other KDE image browsers, allows remote attackers to cause a denial of service (stack consumption) via a crafted EXIF section in a JPEG file, which results in an infinite recursion.
	</description>
 </metadata>
<!-- 017cc98e150d608e083aaf6fed65f033 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031038" comment="kdegraphics3 less than 3.2.1-67.18"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6303</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-6303" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6303" source="CVE"/>
	<description>
	The read_multipart function in cgi.rb in Ruby before 1.8.5-p2 does not properly detect boundaries in MIME multipart content, which allows remote attackers to cause a denial of service (infinite loop) via crafted HTTP requests, a different issue than CVE-2006-5467.
	</description>
 </metadata>
<!-- b9b7d69cac6ba0eb8c7fb702bdc1ef88 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031039" comment="ruby less than 1.8.1-42.22"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6497</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-6497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6497" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the layout engine for Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 allow remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via unknown attack vectors.
	</description>
 </metadata>
<!-- 5f62b1276a8877510b3124f13b3c3b27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031040" comment="MozillaFirefox-translations less than 1.5.0.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031041" comment="MozillaFirefox less than 1.5.0.9-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6498</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-6498" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6498" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the JavaScript engine for Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, SeaMonkey before 1.0.7, and Mozilla 1.7 and probably earlier on Solaris, allow remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via unknown impact and attack vectors.
	</description>
 </metadata>
<!-- 5f62b1276a8877510b3124f13b3c3b27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031040" comment="MozillaFirefox-translations less than 1.5.0.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031041" comment="MozillaFirefox less than 1.5.0.9-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6499</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-6499" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6499" source="CVE"/>
	<description>
	The js_dtoa function in Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 overwrites memory instead of exiting when the floating point precision is reduced, which allows remote attackers to cause a denial of service via any plugins that reduce the precision.
	</description>
 </metadata>
<!-- 5f62b1276a8877510b3124f13b3c3b27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031040" comment="MozillaFirefox-translations less than 1.5.0.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031041" comment="MozillaFirefox less than 1.5.0.9-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6500</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-6500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6500" source="CVE"/>
	<description>
	Heap-based buffer overflow in Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by setting the CSS cursor to certain images that cause an incorrect size calculation when converting to a Windows bitmap.
	</description>
 </metadata>
<!-- 5f62b1276a8877510b3124f13b3c3b27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031040" comment="MozillaFirefox-translations less than 1.5.0.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031041" comment="MozillaFirefox less than 1.5.0.9-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6501</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-6501" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6501" source="CVE"/>
	<description>
	Unspecified vulnerability in Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 allows remote attackers to gain privileges and install malicious code via the watch Javascript function.
	</description>
 </metadata>
<!-- 5f62b1276a8877510b3124f13b3c3b27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031040" comment="MozillaFirefox-translations less than 1.5.0.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031041" comment="MozillaFirefox less than 1.5.0.9-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6502</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-6502" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6502" source="CVE"/>
	<description>
	Use-after-free vulnerability in the LiveConnect bridge code for Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 allows remote attackers to cause a denial of service (crash) via unknown vectors.
	</description>
 </metadata>
<!-- 5f62b1276a8877510b3124f13b3c3b27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031040" comment="MozillaFirefox-translations less than 1.5.0.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031041" comment="MozillaFirefox less than 1.5.0.9-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6503</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-6503" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6503" source="CVE"/>
	<description>
	Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 allows remote attackers to bypass cross-site scripting (XSS) protection by changing the src attribute of an IMG element to a javascript: URI.
	</description>
 </metadata>
<!-- 5f62b1276a8877510b3124f13b3c3b27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031040" comment="MozillaFirefox-translations less than 1.5.0.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031041" comment="MozillaFirefox less than 1.5.0.9-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6504</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-6504" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6504" source="CVE"/>
	<description>
	Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, and SeaMonkey before 1.0.7 allows remote attackers to execute arbitrary code by appending an SVG comment DOM node to another type of document, which triggers memory corruption.
	</description>
 </metadata>
<!-- 5f62b1276a8877510b3124f13b3c3b27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031040" comment="MozillaFirefox-translations less than 1.5.0.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031041" comment="MozillaFirefox less than 1.5.0.9-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6505</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-6505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6505" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in Mozilla Thunderbird before 1.5.0.9 and SeaMonkey before 1.0.7 allow remote attackers to execute arbitrary code via (1) external message modies with long Content-Type headers or (2) long RFC2047-encoded (MIME non-ASCII) headers.
	</description>
 </metadata>
<!-- 5f62b1276a8877510b3124f13b3c3b27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031040" comment="MozillaFirefox-translations less than 1.5.0.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031041" comment="MozillaFirefox less than 1.5.0.9-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6506</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-6506" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6506" source="CVE"/>
	<description>
	The "Feed Preview" feature in Mozilla Firefox 2.0 before 2.0.0.1 sends the URL of the feed when requesting favicon.ico icons, which results in a privacy leak that might allow feed viewing services to determine browsing habits.
	</description>
 </metadata>
<!-- 5f62b1276a8877510b3124f13b3c3b27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031040" comment="MozillaFirefox-translations less than 1.5.0.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031041" comment="MozillaFirefox less than 1.5.0.9-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6507</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-6507" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6507" source="CVE"/>
	<description>
	Mozilla Firefox 2.0 before 2.0.0.1 allows remote attackers to bypass Cross-Site Scripting (XSS) protection via vectors related to a Function.prototype regression error.
	</description>
 </metadata>
<!-- 5f62b1276a8877510b3124f13b3c3b27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031040" comment="MozillaFirefox-translations less than 1.5.0.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031041" comment="MozillaFirefox less than 1.5.0.9-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6535</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-6535" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6535" source="CVE"/>
	<description>
	The dev_queue_xmit function in Linux kernel 2.6 can fail before calling the local_bh_disable function, which could lead to data corruption and "node lockups."  NOTE: it is not clear whether this issue is exploitable.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4309006ed78370b6a442ab18e97609c1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- bd16f566b869a29489f5fbc7c16bddd0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030858" comment="kernel-bigsmp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6731</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-6731" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6731" source="CVE"/>
	<description>
	Multiple buffer overflows in Sun Java Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 7 and earlier, Java System Development Kit (SDK) and JRE 1.4.2_12 and earlier 1.4.x versions, and SDK and JRE 1.3.1_18 and earlier allow attackers to develop Java applets that read, write, or execute local files, possibly related to (1) integer overflows in the Java_sun_awt_image_ImagingLib_convolveBI, awt_parseRaster, and awt_parseColorModel functions; (2) a stack overflow in the Java_sun_awt_image_ImagingLib_lookupByteRaster function; and (3) improper handling of certain negative values in the Java_sun_font_SunLayoutEngine_nativeLayout function.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- b61d3cf1f87c35751e465d9d7a361d47 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031042" comment="java2-jre less than 1.4.2-129.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031043" comment="java2 less than 1.4.2-129.27"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6736</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-6736" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6736" source="CVE"/>
	<description>
	Unspecified vulnerability in Sun Java Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 6 and earlier, Java System Development Kit (SDK) and JRE 1.4.2_12 and earlier 1.4.x versions, and SDK and JRE 1.3.1_18 and earlier allows attackers to use untrusted applets to "access data in other applets," aka "The second issue."
	</description>
 </metadata>
<!-- b61d3cf1f87c35751e465d9d7a361d47 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031042" comment="java2-jre less than 1.4.2-129.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031043" comment="java2 less than 1.4.2-129.27"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6737</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-6737" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6737" source="CVE"/>
	<description>
	Unspecified vulnerability in Sun Java Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 5 and earlier, Java System Development Kit (SDK) and JRE 1.4.2_10 and earlier 1.4.x versions, and SDK and JRE 1.3.1_18 and earlier allows attackers to use untrusted applets to "access data in other applets," aka "The first issue."
	</description>
 </metadata>
<!-- b61d3cf1f87c35751e465d9d7a361d47 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031042" comment="java2-jre less than 1.4.2-129.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031043" comment="java2 less than 1.4.2-129.27"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6745</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-6745" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6745" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Sun Java Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 7 and earlier, and Java System Development Kit (SDK) and JRE 1.4.2_12 and earlier 1.4.x versions, allow attackers to develop Java applets or applications that are able to gain privileges, related to serialization in JRE.
	</description>
 </metadata>
<!-- b61d3cf1f87c35751e465d9d7a361d47 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031042" comment="java2-jre less than 1.4.2-129.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031043" comment="java2 less than 1.4.2-129.27"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6772</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-6772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6772" source="CVE"/>
	<description>
	Format string vulnerability in the inputAnswer function in file.c in w3m before 0.5.2, when run with the dump or backend option, allows remote attackers to execute arbitrary code via format string specifiers in the Common Name (CN) field of an SSL certificate associated with an https URL.
	</description>
 </metadata>
<!-- 68d7a138079c9fa4fa2b1defabd0c5ab -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031044" comment="w3m less than 0.4.1_m17n_20030308-201.3"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20067203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-7203</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-7203" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7203" source="CVE"/>
	<description>
	The compat_sys_mount function in fs/compat.c in Linux kernel 2.6.20 and earlier allows local users to cause a denial of service (NULL pointer dereference and oops) by mounting a smbfs file system in compatibility mode ("mount -t smbfs").
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4309006ed78370b6a442ab18e97609c1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- bd16f566b869a29489f5fbc7c16bddd0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030858" comment="kernel-bigsmp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20067224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-7224</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-7224" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7224" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2006-7227, CVE-2005-4872, CVE-2006-7228.  Reason: this candidate was SPLIT into other identifiers in order to reflect different affected versions and distinct vendor fixes.  Notes: All CVE users should consult CVE-2006-7227, CVE-2005-4872, and CVE-2006-7228 to determine which ID is appropriate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 02ba535f3b526c99b9b5525f2fcfac3d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031045" comment="pcre-32bit less than 9-200711150229"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031046" comment="pcre-devel less than 4.4-109.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031047" comment="pcre less than 4.4-109.8"/>
		</criteria>
	</criteria>
	<!-- f1255e10262bd8b24adcb137ab61417e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031048" comment="mod_php4-core less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031049" comment="php4-bcmath less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031050" comment="php4-bz2 less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031051" comment="php4-calendar less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031052" comment="php4-ctype less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031053" comment="php4-curl less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031054" comment="php4-dba less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031055" comment="php4-dbase less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031056" comment="php4-devel less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031057" comment="php4-domxml less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031058" comment="php4-exif less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031059" comment="php4-fastcgi less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031060" comment="php4-filepro less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031061" comment="php4-ftp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031062" comment="php4-gd less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031063" comment="php4-gettext less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031064" comment="php4-gmp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031065" comment="php4-iconv less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031066" comment="php4-imap less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031067" comment="php4-ldap less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031068" comment="php4-mbstring less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031069" comment="php4-mcal less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031070" comment="php4-mcrypt less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031071" comment="php4-mhash less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031072" comment="php4-mime_magic less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031073" comment="php4-mysql less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031074" comment="php4-pear less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031075" comment="php4-pgsql less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031076" comment="php4-qtdom less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031077" comment="php4-readline less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031078" comment="php4-recode less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031079" comment="php4-servlet less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031080" comment="php4-session less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031081" comment="php4-shmop less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031082" comment="php4-snmp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031083" comment="php4-sockets less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031084" comment="php4-swf less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031085" comment="php4-sysvsem less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031086" comment="php4-sysvshm less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031087" comment="php4-unixODBC less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031088" comment="php4-wddx less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031089" comment="php4-xslt less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031090" comment="php4-yp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031091" comment="php4-zlib less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031092" comment="php4 less than 4.3.4-43.85"/>
		</criteria>
	</criteria>
	<!-- f3cf1435d12b7ef88a846de203195e0c -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031093" comment="libapr0 less than 2.0.59-1.6"/>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009031094" comment="apache2-devel less than 2.0.59-1.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031095" comment="apache2-prefork less than 2.0.59-1.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031096" comment="apache2-worker less than 2.0.59-1.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031097" comment="apache2 less than 2.0.59-1.6"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20067225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-7225</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-7225" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7225" source="CVE"/>
	<description>
	Perl-Compatible Regular Expression (PCRE) library before 6.7 allows context-dependent attackers to cause a denial of service (error or crash) via a regular expression that involves a "malformed POSIX character class", as demonstrated via an invalid character after a [[ sequence.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 02ba535f3b526c99b9b5525f2fcfac3d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031045" comment="pcre-32bit less than 9-200711150229"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031046" comment="pcre-devel less than 4.4-109.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031047" comment="pcre less than 4.4-109.8"/>
		</criteria>
	</criteria>
	<!-- f1255e10262bd8b24adcb137ab61417e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031048" comment="mod_php4-core less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031049" comment="php4-bcmath less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031050" comment="php4-bz2 less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031051" comment="php4-calendar less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031052" comment="php4-ctype less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031053" comment="php4-curl less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031054" comment="php4-dba less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031055" comment="php4-dbase less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031056" comment="php4-devel less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031057" comment="php4-domxml less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031058" comment="php4-exif less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031059" comment="php4-fastcgi less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031060" comment="php4-filepro less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031061" comment="php4-ftp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031062" comment="php4-gd less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031063" comment="php4-gettext less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031064" comment="php4-gmp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031065" comment="php4-iconv less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031066" comment="php4-imap less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031067" comment="php4-ldap less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031068" comment="php4-mbstring less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031069" comment="php4-mcal less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031070" comment="php4-mcrypt less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031071" comment="php4-mhash less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031072" comment="php4-mime_magic less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031073" comment="php4-mysql less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031074" comment="php4-pear less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031075" comment="php4-pgsql less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031076" comment="php4-qtdom less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031077" comment="php4-readline less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031078" comment="php4-recode less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031079" comment="php4-servlet less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031080" comment="php4-session less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031081" comment="php4-shmop less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031082" comment="php4-snmp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031083" comment="php4-sockets less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031084" comment="php4-swf less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031085" comment="php4-sysvsem less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031086" comment="php4-sysvshm less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031087" comment="php4-unixODBC less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031088" comment="php4-wddx less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031089" comment="php4-xslt less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031090" comment="php4-yp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031091" comment="php4-zlib less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031092" comment="php4 less than 4.3.4-43.85"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20067226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-7226</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-7226" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7226" source="CVE"/>
	<description>
	Perl-Compatible Regular Expression (PCRE) library before 6.7 does not properly calculate the compiled memory allocation for regular expressions that involve a quantified "subpattern containing a named recursion or subroutine reference," which allows context-dependent attackers to cause a denial of service (error or crash).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 02ba535f3b526c99b9b5525f2fcfac3d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031045" comment="pcre-32bit less than 9-200711150229"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031046" comment="pcre-devel less than 4.4-109.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031047" comment="pcre less than 4.4-109.8"/>
		</criteria>
	</criteria>
	<!-- f1255e10262bd8b24adcb137ab61417e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031048" comment="mod_php4-core less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031049" comment="php4-bcmath less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031050" comment="php4-bz2 less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031051" comment="php4-calendar less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031052" comment="php4-ctype less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031053" comment="php4-curl less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031054" comment="php4-dba less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031055" comment="php4-dbase less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031056" comment="php4-devel less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031057" comment="php4-domxml less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031058" comment="php4-exif less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031059" comment="php4-fastcgi less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031060" comment="php4-filepro less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031061" comment="php4-ftp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031062" comment="php4-gd less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031063" comment="php4-gettext less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031064" comment="php4-gmp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031065" comment="php4-iconv less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031066" comment="php4-imap less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031067" comment="php4-ldap less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031068" comment="php4-mbstring less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031069" comment="php4-mcal less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031070" comment="php4-mcrypt less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031071" comment="php4-mhash less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031072" comment="php4-mime_magic less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031073" comment="php4-mysql less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031074" comment="php4-pear less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031075" comment="php4-pgsql less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031076" comment="php4-qtdom less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031077" comment="php4-readline less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031078" comment="php4-recode less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031079" comment="php4-servlet less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031080" comment="php4-session less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031081" comment="php4-shmop less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031082" comment="php4-snmp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031083" comment="php4-sockets less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031084" comment="php4-swf less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031085" comment="php4-sysvsem less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031086" comment="php4-sysvshm less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031087" comment="php4-unixODBC less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031088" comment="php4-wddx less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031089" comment="php4-xslt less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031090" comment="php4-yp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031091" comment="php4-zlib less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031092" comment="php4 less than 4.3.4-43.85"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20067228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-7228</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-7228" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7228" source="CVE"/>
	<description>
	Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 might allow context-dependent attackers to execute arbitrary code via a regular expression that involves large (1) min, (2) max, or (3) duplength values that cause an incorrect length calculation and trigger a buffer overflow, a different vulnerability than CVE-2006-7227.  NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.
	</description>
 </metadata>
<!-- b5ee8d570837e8d054b4dc0125fb4447 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030647" comment="python-32bit less than 9-200712110030"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030648" comment="python-curses less than 2.3.3-88.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030649" comment="python-demo less than 2.3.3-88.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030650" comment="python-devel less than 2.3.3-88.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030651" comment="python-doc-pdf less than 2.3.3-88.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030652" comment="python-doc less than 2.3.3-88.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030653" comment="python-gdbm less than 2.3.3-88.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030654" comment="python-idle less than 2.3.3-88.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030655" comment="python-mpz less than 2.3.3-88.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030656" comment="python-tk less than 2.3.3-88.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030657" comment="python-xml less than 2.3.3-88.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030658" comment="python less than 2.3.3-88.18"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20067230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-7230</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-7230" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7230" source="CVE"/>
	<description>
	Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate the amount of memory needed for a compiled regular expression pattern when the (1) -x or (2) -i UTF-8 options change within the pattern, which allows context-dependent attackers to cause a denial of service (PCRE or glibc crash) via crafted regular expressions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 73795549f9a608bace82f0cf345b3a42 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031098" comment="pcre-32bit less than 9-200711270035"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031099" comment="pcre-devel less than 4.4-109.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031100" comment="pcre less than 4.4-109.12"/>
		</criteria>
	</criteria>
	<!-- 9992478cea3704f6f2c2f7741f3e12e2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031101" comment="pcre-32bit less than 9-200711192343"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031102" comment="pcre-devel less than 4.4-109.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031103" comment="pcre less than 4.4-109.10"/>
		</criteria>
	</criteria>
	<!-- f1255e10262bd8b24adcb137ab61417e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031048" comment="mod_php4-core less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031049" comment="php4-bcmath less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031050" comment="php4-bz2 less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031051" comment="php4-calendar less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031052" comment="php4-ctype less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031053" comment="php4-curl less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031054" comment="php4-dba less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031055" comment="php4-dbase less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031056" comment="php4-devel less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031057" comment="php4-domxml less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031058" comment="php4-exif less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031059" comment="php4-fastcgi less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031060" comment="php4-filepro less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031061" comment="php4-ftp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031062" comment="php4-gd less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031063" comment="php4-gettext less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031064" comment="php4-gmp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031065" comment="php4-iconv less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031066" comment="php4-imap less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031067" comment="php4-ldap less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031068" comment="php4-mbstring less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031069" comment="php4-mcal less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031070" comment="php4-mcrypt less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031071" comment="php4-mhash less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031072" comment="php4-mime_magic less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031073" comment="php4-mysql less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031074" comment="php4-pear less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031075" comment="php4-pgsql less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031076" comment="php4-qtdom less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031077" comment="php4-readline less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031078" comment="php4-recode less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031079" comment="php4-servlet less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031080" comment="php4-session less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031081" comment="php4-shmop less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031082" comment="php4-snmp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031083" comment="php4-sockets less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031084" comment="php4-swf less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031085" comment="php4-sysvsem less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031086" comment="php4-sysvshm less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031087" comment="php4-unixODBC less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031088" comment="php4-wddx less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031089" comment="php4-xslt less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031090" comment="php4-yp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031091" comment="php4-zlib less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031092" comment="php4 less than 4.3.4-43.85"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20067232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-7232</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-7232" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7232" source="CVE"/>
	<description>
	sql_select.cc in MySQL 5.0.x before 5.0.32 and 5.1.x before 5.1.14 allows remote authenticated users to cause a denial of service (crash) via an EXPLAIN SELECT FROM on the INFORMATION_SCHEMA table, as originally demonstrated using ORDER BY.
	</description>
 </metadata>
<!-- 30a5e3996d30fa92e0adac8c1dafa7ee -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031104" comment="mysql-Max less than 4.0.18-32.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031105" comment="mysql-bench less than 4.0.18-32.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031106" comment="mysql-client less than 4.0.18-32.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031107" comment="mysql-devel less than 4.0.18-32.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031108" comment="mysql-shared less than 4.0.18-32.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031109" comment="mysql less than 4.0.18-32.35"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20067234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-7234</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2006-7234" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7234" source="CVE"/>
	<description>
	Untrusted search path vulnerability in Lynx before 2.8.6rel.4 allows local users to execute arbitrary code via malicious (1) .mailcap and (2) mime.types files in the current working directory.
	</description>
 </metadata>
<!-- 5411df1b613a6a69bdfd1a60aa1f2dcb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031110" comment="lynx less than 2.8.5-30.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0002</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-0002" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0002" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in WordPerfect Document importer/exporter (libwpd) before 0.8.9 allow user-assisted remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted WordPerfect file in which values to loop counters are not properly handled in the (1) WP3TablesGroup::_readContents and (2) WP5DefinitionGroup_DefineTablesSubGroup::WP5DefinitionGroup_DefineTablesSubGroup functions.  NOTE: the integer overflow has been split into CVE-2007-1466.
	</description>
 </metadata>
<!-- bf6a5b58f07ccb9ee5cb194c18620d9f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031111" comment="OpenOffice_org-ar less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031112" comment="OpenOffice_org-ca less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031113" comment="OpenOffice_org-cs less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031114" comment="OpenOffice_org-da less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031115" comment="OpenOffice_org-de less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031116" comment="OpenOffice_org-el less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031117" comment="OpenOffice_org-en less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031118" comment="OpenOffice_org-es less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031119" comment="OpenOffice_org-et less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031120" comment="OpenOffice_org-fi less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031121" comment="OpenOffice_org-fr less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031122" comment="OpenOffice_org-gnome less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031123" comment="OpenOffice_org-hu less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031124" comment="OpenOffice_org-it less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031125" comment="OpenOffice_org-ja less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031126" comment="OpenOffice_org-kde less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031127" comment="OpenOffice_org-ko less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031128" comment="OpenOffice_org-nl less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031129" comment="OpenOffice_org-pl less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031130" comment="OpenOffice_org-pt-BR less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031131" comment="OpenOffice_org-pt less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031132" comment="OpenOffice_org-ru less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031133" comment="OpenOffice_org-sk less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031134" comment="OpenOffice_org-sl less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031135" comment="OpenOffice_org-sv less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031136" comment="OpenOffice_org-tr less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031137" comment="OpenOffice_org-zh-CN less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031138" comment="OpenOffice_org-zh-TW less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031139" comment="OpenOffice_org less than 1.1.5-0.16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0008</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-0008" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0008" source="CVE"/>
	<description>
	Integer underflow in the SSLv2 support in Mozilla Network Security Services (NSS) before 3.11.5, as used by Firefox before 1.5.0.10 and 2.x before 2.0.0.2, SeaMonkey before 1.0.8, Thunderbird before 1.5.0.10, and certain Sun Java System server products before 20070611, allows remote attackers to execute arbitrary code via a crafted SSLv2 server message containing a public key that is too short to encrypt the "Master Secret", which results in a heap-based overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 66969064f4a01b40dabf533d22cb76ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031022" comment="MozillaFirefox-translations less than 1.5.0.10-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031023" comment="MozillaFirefox less than 1.5.0.10-0.2"/>
		</criteria>
	</criteria>
	<!-- adf5cccb9b0cfb2f9cb649652f793fdc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031024" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031025" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031026" comment="mozilla-devel less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031027" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031028" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031029" comment="mozilla-irc less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031030" comment="mozilla-lib64 less than 1.6-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031031" comment="mozilla-mail less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031032" comment="mozilla-venkman less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031033" comment="mozilla less than 1.8_seamonkey_1.0.8-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0009</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-0009" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0009" source="CVE"/>
	<description>
	Stack-based buffer overflow in the SSLv2 support in Mozilla Network Security Services (NSS) before 3.11.5, as used by Firefox before 1.5.0.10 and 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, SeaMonkey before 1.0.8, and certain Sun Java System server products before 20070611, allows remote attackers to execute arbitrary code via invalid "Client Master Key" length values.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 66969064f4a01b40dabf533d22cb76ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031022" comment="MozillaFirefox-translations less than 1.5.0.10-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031023" comment="MozillaFirefox less than 1.5.0.10-0.2"/>
		</criteria>
	</criteria>
	<!-- adf5cccb9b0cfb2f9cb649652f793fdc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031024" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031025" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031026" comment="mozilla-devel less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031027" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031028" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031029" comment="mozilla-irc less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031030" comment="mozilla-lib64 less than 1.6-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031031" comment="mozilla-mail less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031032" comment="mozilla-venkman less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031033" comment="mozilla less than 1.8_seamonkey_1.0.8-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0010</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-0010" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0010" source="CVE"/>
	<description>
	The GdkPixbufLoader function in GIMP ToolKit (GTK+) in GTK 2 (gtk2) before 2.4.13 allows context-dependent attackers to cause a denial of service (crash) via a malformed image file.
	</description>
 </metadata>
<!-- 386ec98ac7b826625ed55a4d3b4d0f8e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031140" comment="gtk2-32bit less than 9-200701182000"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031141" comment="gtk2-devel less than 2.4.14-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031142" comment="gtk2-doc less than 2.4.14-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031143" comment="gtk2 less than 2.4.14-0.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0017</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-0017" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0017" source="CVE"/>
	<description>
	Multiple format string vulnerabilities in (1) the cdio_log_handler function in modules/access/cdda/access.c in the CDDA (libcdda_plugin) plugin, and the (2) cdio_log_handler and (3) vcd_log_handler functions in modules/access/vcdx/access.c in the VCDX (libvcdx_plugin) plugin, in VideoLAN VLC 0.7.0 through 0.8.6 allow user-assisted remote attackers to execute arbitrary code via format string specifiers in an invalid URI, as demonstrated by a udp://-- URI in an M3U file.
	</description>
 </metadata>
<!-- 83e9f6974ae023d8033eb47e927fd08a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031144" comment="xine-lib-32bit less than 9-200701161730"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031145" comment="xine-lib less than 0.99.rc3a-106.36"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0044</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-0044" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0044" source="CVE"/>
	<description>
	Adobe Acrobat Reader Plugin before 8.0.0 for the Firefox, Internet Explorer, and Opera web browsers allows remote attackers to force the browser to make unauthorized requests to other web sites via a URL in the (1) FDF, (2) xml, and (3) xfdf AJAX request parameters, following the # (hash) character, aka "Universal CSRF and session riding."
	</description>
 </metadata>
<!-- e4aa9329743e7c8bb35f09a113da0938 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030972" comment="acroread less than 7.0.9-2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0045</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-0045" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0045" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in Adobe Acrobat Reader Plugin before 8.0.0, and possibly the plugin distributed with Adobe Reader 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2, for Mozilla Firefox, Microsoft Internet Explorer 6 SP1, Google Chrome, Opera 8.5.4 build 770, and Opera 9.10.8679 on Windows allow remote attackers to inject arbitrary JavaScript and conduct other attacks via a .pdf URL with a javascript: or res: URI with (1) FDF, (2) XML, and (3) XFDF AJAX parameters, or (4) an arbitrarily named name=URI anchor identifier, aka "Universal XSS (UXSS)."
	</description>
 </metadata>
<!-- e4aa9329743e7c8bb35f09a113da0938 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030972" comment="acroread less than 7.0.9-2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0046</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-0046" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0046" source="CVE"/>
	<description>
	Double free vulnerability in the Adobe Acrobat Reader Plugin before 8.0.0, as used in Mozilla Firefox 1.5.0.7, allows remote attackers to execute arbitrary code by causing an error via a javascript: URI call to document.write in the (1) FDF, (2) XML, or (3) XFDF AJAX request parameters.
	</description>
 </metadata>
<!-- e4aa9329743e7c8bb35f09a113da0938 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030972" comment="acroread less than 7.0.9-2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0047</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-0047" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0047" source="CVE"/>
	<description>
	CRLF injection vulnerability in Adobe Acrobat Reader Plugin before 8.0.0, when used with the Microsoft.XMLHTTP ActiveX object in Internet Explorer, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the javascript: URI in the (1) FDF, (2) XML, or (3) XFDF AJAX request parameters.
	</description>
 </metadata>
<!-- e4aa9329743e7c8bb35f09a113da0938 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030972" comment="acroread less than 7.0.9-2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0048</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-0048" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0048" source="CVE"/>
	<description>
	Adobe Acrobat Reader Plugin before 8.0.0, and possibly the plugin distributed with Adobe Reader 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2, when used with Internet Explorer, Google Chrome, or Opera, allows remote attackers to cause a denial of service (memory consumption) via a long sequence of # (hash) characters appended to a PDF URL, related to a "cross-site scripting issue."
	</description>
 </metadata>
<!-- e4aa9329743e7c8bb35f09a113da0938 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030972" comment="acroread less than 7.0.9-2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0062</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-0062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0062" source="CVE"/>
	<description>
	Integer overflow in the ISC dhcpd 3.0.x before 3.0.7 and 3.1.x before 3.1.1; and the DHCP server in EMC VMware Workstation before 5.5.5 Build 56455 and 6.x before 6.0.1 Build 55017, Player before 1.0.5 Build 56455 and Player 2 before 2.0.1 Build 55017, ACE before 1.0.3 Build 54075 and ACE 2 before 2.0.1 Build 55017, and Server before 1.0.4 Build 56528; allows remote attackers to cause a denial of service (daemon crash) or execute arbitrary code via a malformed DHCP packet with a large dhcp-max-message-size that triggers a stack-based buffer overflow, related to servers configured to send many DHCP options to clients.
	</description>
 </metadata>
<!-- 8aa275881d1d7b1a245784e2927facfe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031146" comment="dhcp-client less than 3.0.1rc13-28.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031147" comment="dhcp-devel less than 3.0.1rc13-28.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031148" comment="dhcp-server less than 3.0.1rc13-28.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031149" comment="dhcp less than 3.0.1rc13-28.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0071</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-0071" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0071" source="CVE"/>
	<description>
	Integer overflow in Adobe Flash Player 9.0.115.0 and earlier, and 8.0.39.0 and earlier, allows remote attackers to execute arbitrary code via a crafted SWF file with a negative Scene Count value, which passes a signed comparison, is used as an offset of a NULL pointer, and triggers a buffer overflow.
	</description>
 </metadata>
<!-- bf0bfd1ab7b4dfb4cb1cd0bf88a5fb58 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031150" comment="flash-player less than 9.0.124.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0104</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-0104" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0104" source="CVE"/>
	<description>
	The Adobe PDF specification 1.3, as implemented by (a) xpdf 3.0.1 patch 2, (b) kpdf in KDE before 3.5.5, (c) poppler before 0.5.4, and other products, allows remote attackers to have an unknown impact, possibly including denial of service (infinite loop), arbitrary code execution, or memory corruption, via a PDF file with a (1) crafted catalog dictionary or (2) a crafted Pages attribute that references an invalid page tree node.
	</description>
 </metadata>
<!-- 0dcf9e4dc102ecae87adf32d49e1f209 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031151" comment="cups-client less than 1.1.20-108.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031152" comment="cups-devel less than 1.1.20-108.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031153" comment="cups-libs-32bit less than 9-200701262020"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031154" comment="cups-libs less than 1.1.20-108.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031155" comment="cups less than 1.1.20-108.35"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0234</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-0234" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0234" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2007-0243.  Reason: This candidate is a duplicate of CVE-2007-0243.  Notes: All CVE users should reference CVE-2007-0243 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
<!-- b61d3cf1f87c35751e465d9d7a361d47 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031042" comment="java2-jre less than 1.4.2-129.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031043" comment="java2 less than 1.4.2-129.27"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0235</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-0235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0235" source="CVE"/>
	<description>
	Stack-based buffer overflow in the glibtop_get_proc_map_s function in libgtop before 2.14.6 (libgtop2) allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a process with a long filename that is mapped in its address space, which triggers the overflow in gnome-system-monitor.
	</description>
 </metadata>
<!-- c802127d6a5504c08d748f33989907ae -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031156" comment="libgtop-devel less than 2.5.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031157" comment="libgtop less than 2.5.2-2.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0238</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-0238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0238" source="CVE"/>
	<description>
	Stack-based buffer overflow in filter\starcalc\scflt.cxx in the StarCalc parser in OpenOffice.org (OOo) Office Suite before 2.2, and 1.x before 1.1.5 Patch, allows user-assisted remote attackers to execute arbitrary code via a document with a long Note.
	</description>
 </metadata>
<!-- bf6a5b58f07ccb9ee5cb194c18620d9f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031111" comment="OpenOffice_org-ar less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031112" comment="OpenOffice_org-ca less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031113" comment="OpenOffice_org-cs less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031114" comment="OpenOffice_org-da less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031115" comment="OpenOffice_org-de less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031116" comment="OpenOffice_org-el less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031117" comment="OpenOffice_org-en less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031118" comment="OpenOffice_org-es less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031119" comment="OpenOffice_org-et less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031120" comment="OpenOffice_org-fi less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031121" comment="OpenOffice_org-fr less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031122" comment="OpenOffice_org-gnome less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031123" comment="OpenOffice_org-hu less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031124" comment="OpenOffice_org-it less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031125" comment="OpenOffice_org-ja less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031126" comment="OpenOffice_org-kde less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031127" comment="OpenOffice_org-ko less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031128" comment="OpenOffice_org-nl less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031129" comment="OpenOffice_org-pl less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031130" comment="OpenOffice_org-pt-BR less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031131" comment="OpenOffice_org-pt less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031132" comment="OpenOffice_org-ru less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031133" comment="OpenOffice_org-sk less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031134" comment="OpenOffice_org-sl less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031135" comment="OpenOffice_org-sv less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031136" comment="OpenOffice_org-tr less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031137" comment="OpenOffice_org-zh-CN less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031138" comment="OpenOffice_org-zh-TW less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031139" comment="OpenOffice_org less than 1.1.5-0.16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0239</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-0239" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0239" source="CVE"/>
	<description>
	OpenOffice.org (OOo) Office Suite allows user-assisted remote attackers to execute arbitrary commands via shell metacharacters in a prepared link in a crafted document.
	</description>
 </metadata>
<!-- bf6a5b58f07ccb9ee5cb194c18620d9f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031111" comment="OpenOffice_org-ar less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031112" comment="OpenOffice_org-ca less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031113" comment="OpenOffice_org-cs less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031114" comment="OpenOffice_org-da less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031115" comment="OpenOffice_org-de less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031116" comment="OpenOffice_org-el less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031117" comment="OpenOffice_org-en less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031118" comment="OpenOffice_org-es less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031119" comment="OpenOffice_org-et less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031120" comment="OpenOffice_org-fi less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031121" comment="OpenOffice_org-fr less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031122" comment="OpenOffice_org-gnome less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031123" comment="OpenOffice_org-hu less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031124" comment="OpenOffice_org-it less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031125" comment="OpenOffice_org-ja less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031126" comment="OpenOffice_org-kde less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031127" comment="OpenOffice_org-ko less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031128" comment="OpenOffice_org-nl less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031129" comment="OpenOffice_org-pl less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031130" comment="OpenOffice_org-pt-BR less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031131" comment="OpenOffice_org-pt less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031132" comment="OpenOffice_org-ru less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031133" comment="OpenOffice_org-sk less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031134" comment="OpenOffice_org-sl less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031135" comment="OpenOffice_org-sv less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031136" comment="OpenOffice_org-tr less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031137" comment="OpenOffice_org-zh-CN less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031138" comment="OpenOffice_org-zh-TW less than 1.1.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031139" comment="OpenOffice_org less than 1.1.5-0.16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0240</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-0240" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0240" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Zope 2.10.2 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors in a HTTP GET request.
	</description>
 </metadata>
<!-- ad05b0ff094c11ae1e3d22ded785b441 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031158" comment="zope less than 2.7.7-0.13"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0242</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-0242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0242" source="CVE"/>
	<description>
	The UTF-8 decoder in codecs/qutfcodec.cpp in Qt 3.3.8 and 4.2.3 does not reject long UTF-8 sequences as required by the standard, which allows remote attackers to conduct cross-site scripting (XSS) and directory traversal attacks via long sequences that decode to dangerous metacharacters.
	</description>
 </metadata>
<!-- d4960c566fc2d6cc52d9e79c8619cb09 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031159" comment="qt3-32bit less than 9-200704031835"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031160" comment="qt3-devel-32bit less than 9-200704031835"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031161" comment="qt3-devel less than 3.3.1-36.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031162" comment="qt3-non-mt less than 3.3.1-41.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031163" comment="qt3 less than 3.3.1-36.27"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0243</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-0243" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0243" source="CVE"/>
	<description>
	Buffer overflow in Sun JDK and Java Runtime Environment (JRE) 5.0 Update 9 and earlier, SDK and JRE 1.4.2_12 and earlier, and SDK and JRE 1.3.1_18 and earlier allows applets to gain privileges via a GIF image with a block with a 0 width field, which triggers memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 90864743019d987b918e58f9bba908b8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031164" comment="java2-jre less than 1.4.2-129.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031165" comment="java2 less than 1.4.2-129.30"/>
		</criteria>
	</criteria>
	<!-- b61d3cf1f87c35751e465d9d7a361d47 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031042" comment="java2-jre less than 1.4.2-129.27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031043" comment="java2 less than 1.4.2-129.27"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0245</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-0245" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0245" source="CVE"/>
	<description>
	Heap-based buffer overflow in OpenOffice.org (OOo) 2.2.1 and earlier allows remote attackers to execute arbitrary code via a RTF file with a crafted prtdata tag with a length parameter inconsistency, which causes vtable entries to be overwritten.
	</description>
 </metadata>
<!-- 572ad014bcb9bd7a3a8b6d695fbc1fc9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031166" comment="OpenOffice_org-ar less than 1.1.5-0.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031167" comment="OpenOffice_org-ca less than 1.1.5-0.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031168" comment="OpenOffice_org-cs less than 1.1.5-0.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031169" comment="OpenOffice_org-da less than 1.1.5-0.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031170" comment="OpenOffice_org-de less than 1.1.5-0.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031171" comment="OpenOffice_org-el less than 1.1.5-0.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031172" comment="OpenOffice_org-en less than 1.1.5-0.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031173" comment="OpenOffice_org-es less than 1.1.5-0.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031174" comment="OpenOffice_org-et less than 1.1.5-0.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031175" comment="OpenOffice_org-fi less than 1.1.5-0.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031176" comment="OpenOffice_org-fr less than 1.1.5-0.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031177" comment="OpenOffice_org-gnome less than 1.1.5-0.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031178" comment="OpenOffice_org-hu less than 1.1.5-0.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031179" comment="OpenOffice_org-it less than 1.1.5-0.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031180" comment="OpenOffice_org-ja less than 1.1.5-0.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031181" comment="OpenOffice_org-kde less than 1.1.5-0.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031182" comment="OpenOffice_org-ko less than 1.1.5-0.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031183" comment="OpenOffice_org-nl less than 1.1.5-0.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031184" comment="OpenOffice_org-pl less than 1.1.5-0.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031185" comment="OpenOffice_org-pt-BR less than 1.1.5-0.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031186" comment="OpenOffice_org-pt less than 1.1.5-0.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031187" comment="OpenOffice_org-ru less than 1.1.5-0.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031188" comment="OpenOffice_org-sk less than 1.1.5-0.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031189" comment="OpenOffice_org-sl less than 1.1.5-0.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031190" comment="OpenOffice_org-sv less than 1.1.5-0.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031191" comment="OpenOffice_org-tr less than 1.1.5-0.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031192" comment="OpenOffice_org-zh-CN less than 1.1.5-0.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031193" comment="OpenOffice_org-zh-TW less than 1.1.5-0.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031194" comment="OpenOffice_org less than 1.1.5-0.18"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0452</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-0452" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0452" source="CVE"/>
	<description>
	smbd in Samba 3.0.6 through 3.0.23d allows remote authenticated users to cause a denial of service (memory and CPU exhaustion) by renaming a file in a way that prevents a request from being removed from the deferred open queue, which triggers an infinite loop.
	</description>
 </metadata>
<!-- 75665d46b2b2dc409e252b880a1ad2f4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031195" comment="samba less than 3.0.20b-3.14"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0537</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-0537" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0537" source="CVE"/>
	<description>
	The KDE HTML library (kdelibs), as used by Konqueror 3.5.5, does not properly parse HTML comments, which allows remote attackers to conduct cross-site scripting (XSS) attacks and bypass some XSS protection schemes by embedding certain HTML tags within a comment in a title tag, a related issue to CVE-2007-0478.
	</description>
 </metadata>
<!-- bf7f3f26a29a4c24de3b8f0e3e664432 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031196" comment="kdelibs3-32bit less than 9-200704031835"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031197" comment="kdelibs3-devel less than 3.2.1-44.69"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031198" comment="kdelibs3 less than 3.2.1-44.69"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0555</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-0555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0555" source="CVE"/>
	<description>
	PostgreSQL 7.3 before 7.3.13, 7.4 before 7.4.16, 8.0 before 8.0.11, 8.1 before 8.1.7, and 8.2 before 8.2.2 allows attackers to disable certain checks for the data types of SQL function arguments, which allows remote authenticated users to cause a denial of service (server crash) and possibly access database content.
	</description>
 </metadata>
<!-- a683ebb4ed6958b81e0e01344558249f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031199" comment="postgresql-contrib less than 7.4.17-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031200" comment="postgresql-devel less than 7.4.17-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031201" comment="postgresql-docs less than 7.4.17-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031202" comment="postgresql-libs-32bit less than 9-200704271846"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031203" comment="postgresql-libs less than 7.4.17-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031204" comment="postgresql-pl less than 7.4.17-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031205" comment="postgresql-server less than 7.4.17-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031206" comment="postgresql less than 7.4.17-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0556</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-0556" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0556" source="CVE"/>
	<description>
	The query planner in PostgreSQL before 8.0.11, 8.1 before 8.1.7, and 8.2 before 8.2.2 does not verify that a table is compatible with a "previously made query plan," which allows remote authenticated users to cause a denial of service (server crash) and possibly access database content via an "ALTER COLUMN TYPE" SQL statement, which can be leveraged to read arbitrary memory from the server.
	</description>
 </metadata>
<!-- a683ebb4ed6958b81e0e01344558249f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031199" comment="postgresql-contrib less than 7.4.17-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031200" comment="postgresql-devel less than 7.4.17-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031201" comment="postgresql-docs less than 7.4.17-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031202" comment="postgresql-libs-32bit less than 9-200704271846"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031203" comment="postgresql-libs less than 7.4.17-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031204" comment="postgresql-pl less than 7.4.17-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031205" comment="postgresql-server less than 7.4.17-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031206" comment="postgresql less than 7.4.17-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0653</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-0653" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0653" source="CVE"/>
	<description>
	Integer overflow in X MultiMedia System (xmms) 1.2.10, and possibly other versions, allows user-assisted remote attackers to execute arbitrary code via crafted header information in a skin bitmap image, which triggers memory corruption.
	</description>
 </metadata>
<!-- a9975f4c9780721d3c9f87a1e55dd600 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031207" comment="xmms-32bit less than 9-200704052143"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031208" comment="xmms less than 1.2.10-44.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0654</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-0654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0654" source="CVE"/>
	<description>
	Integer underflow in X MultiMedia System (xmms) 1.2.10 allows user-assisted remote attackers to execute arbitrary code via crafted header information in a skin bitmap image, which results in a stack-based buffer overflow.
	</description>
 </metadata>
<!-- a9975f4c9780721d3c9f87a1e55dd600 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031207" comment="xmms-32bit less than 9-200704052143"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031208" comment="xmms less than 1.2.10-44.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0720</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-0720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0720" source="CVE"/>
	<description>
	The CUPS service on multiple platforms allows remote attackers to cause a denial of service (service hang) via a "partially-negotiated" SSL connection, which prevents other requests from being accepted.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 63f447c280c4a933229d8fa0dfe924a3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031209" comment="cups-client less than 1.1.20-108.37"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031210" comment="cups-devel less than 1.1.20-108.37"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031211" comment="cups-libs-32bit less than 9-200704210224"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031212" comment="cups-libs less than 1.1.20-108.37"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031213" comment="cups less than 1.1.20-108.37"/>
		</criteria>
	</criteria>
	<!-- cc66bde9358590ba53f1c725ed4a4935 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031214" comment="cups-client less than 1.1.20-108.39"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031215" comment="cups-devel less than 1.1.20-108.39"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031216" comment="cups-libs-32bit less than 9-200706090005"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031217" comment="cups-libs less than 1.1.20-108.39"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031218" comment="cups less than 1.1.20-108.39"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0770</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-0770" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0770" source="CVE"/>
	<description>
	Buffer overflow in GraphicsMagick and ImageMagick allows user-assisted remote attackers to cause a denial of service and possibly execute arbitrary code via a PALM image that is not properly handled by the ReadPALMImage function in coders/palm.c. NOTE: this issue is due to an incomplete patch for CVE-2006-5456.
	</description>
 </metadata>
<!-- 790f86a305698341c2124b89f6630259 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030949" comment="ImageMagick-devel less than 5.5.7-225.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030950" comment="ImageMagick less than 5.5.7-225.33"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0775</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-0775" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0775" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the layout engine in Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, and SeaMonkey before 1.0.8 allow remote attackers to cause a denial of service (crash) and potentially execute arbitrary code via certain vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 66969064f4a01b40dabf533d22cb76ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031022" comment="MozillaFirefox-translations less than 1.5.0.10-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031023" comment="MozillaFirefox less than 1.5.0.10-0.2"/>
		</criteria>
	</criteria>
	<!-- adf5cccb9b0cfb2f9cb649652f793fdc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031024" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031025" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031026" comment="mozilla-devel less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031027" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031028" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031029" comment="mozilla-irc less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031030" comment="mozilla-lib64 less than 1.6-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031031" comment="mozilla-mail less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031032" comment="mozilla-venkman less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031033" comment="mozilla less than 1.8_seamonkey_1.0.8-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0776</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-0776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0776" source="CVE"/>
	<description>
	Heap-based buffer overflow in the _cairo_pen_init function in Mozilla Firefox 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, and SeaMonkey before 1.0.8 allows remote attackers to execute arbitrary code via a large stroke-width attribute in the clipPath element in an SVG file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 66969064f4a01b40dabf533d22cb76ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031022" comment="MozillaFirefox-translations less than 1.5.0.10-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031023" comment="MozillaFirefox less than 1.5.0.10-0.2"/>
		</criteria>
	</criteria>
	<!-- adf5cccb9b0cfb2f9cb649652f793fdc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031024" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031025" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031026" comment="mozilla-devel less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031027" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031028" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031029" comment="mozilla-irc less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031030" comment="mozilla-lib64 less than 1.6-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031031" comment="mozilla-mail less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031032" comment="mozilla-venkman less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031033" comment="mozilla less than 1.8_seamonkey_1.0.8-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0777</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-0777" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0777" source="CVE"/>
	<description>
	The JavaScript engine in Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, and SeaMonkey before 1.0.8 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain vectors that trigger memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 66969064f4a01b40dabf533d22cb76ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031022" comment="MozillaFirefox-translations less than 1.5.0.10-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031023" comment="MozillaFirefox less than 1.5.0.10-0.2"/>
		</criteria>
	</criteria>
	<!-- adf5cccb9b0cfb2f9cb649652f793fdc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031024" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031025" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031026" comment="mozilla-devel less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031027" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031028" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031029" comment="mozilla-irc less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031030" comment="mozilla-lib64 less than 1.6-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031031" comment="mozilla-mail less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031032" comment="mozilla-venkman less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031033" comment="mozilla less than 1.8_seamonkey_1.0.8-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0778</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-0778" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0778" source="CVE"/>
	<description>
	The page cache feature in Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 can generate hash collisions that cause page data to be appended to the wrong page cache, which allows remote attackers to obtain sensitive information or enable further attack vectors when the target page is reloaded from the cache.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 66969064f4a01b40dabf533d22cb76ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031022" comment="MozillaFirefox-translations less than 1.5.0.10-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031023" comment="MozillaFirefox less than 1.5.0.10-0.2"/>
		</criteria>
	</criteria>
	<!-- adf5cccb9b0cfb2f9cb649652f793fdc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031024" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031025" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031026" comment="mozilla-devel less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031027" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031028" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031029" comment="mozilla-irc less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031030" comment="mozilla-lib64 less than 1.6-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031031" comment="mozilla-mail less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031032" comment="mozilla-venkman less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031033" comment="mozilla less than 1.8_seamonkey_1.0.8-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0779</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-0779" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0779" source="CVE"/>
	<description>
	GUI overlay vulnerability in Mozilla Firefox 1.5.x before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 allows remote attackers to spoof certain user interface elements, such as the host name or security indicators, via the CSS3 hotspot property with a large, transparent, custom cursor.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 66969064f4a01b40dabf533d22cb76ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031022" comment="MozillaFirefox-translations less than 1.5.0.10-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031023" comment="MozillaFirefox less than 1.5.0.10-0.2"/>
		</criteria>
	</criteria>
	<!-- adf5cccb9b0cfb2f9cb649652f793fdc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031024" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031025" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031026" comment="mozilla-devel less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031027" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031028" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031029" comment="mozilla-irc less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031030" comment="mozilla-lib64 less than 1.6-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031031" comment="mozilla-mail less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031032" comment="mozilla-venkman less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031033" comment="mozilla less than 1.8_seamonkey_1.0.8-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0780</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-0780" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0780" source="CVE"/>
	<description>
	browser.js in Mozilla Firefox 1.5.x before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 uses the requesting URI to identify child windows, which allows remote attackers to conduct cross-site scripting (XSS) attacks by opening a blocked popup originating from a javascript: URI in combination with multiple frames having the same data: URI.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 66969064f4a01b40dabf533d22cb76ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031022" comment="MozillaFirefox-translations less than 1.5.0.10-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031023" comment="MozillaFirefox less than 1.5.0.10-0.2"/>
		</criteria>
	</criteria>
	<!-- adf5cccb9b0cfb2f9cb649652f793fdc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031024" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031025" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031026" comment="mozilla-devel less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031027" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031028" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031029" comment="mozilla-irc less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031030" comment="mozilla-lib64 less than 1.6-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031031" comment="mozilla-mail less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031032" comment="mozilla-venkman less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031033" comment="mozilla less than 1.8_seamonkey_1.0.8-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0800</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-0800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0800" source="CVE"/>
	<description>
	Cross-zone vulnerability in Mozilla Firefox 1.5.0.9 considers blocked popups to have an internal zone origin, which allows user-assisted remote attackers to cross zone restrictions and read arbitrary file:// URIs by convincing a user to show a blocked popup.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 66969064f4a01b40dabf533d22cb76ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031022" comment="MozillaFirefox-translations less than 1.5.0.10-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031023" comment="MozillaFirefox less than 1.5.0.10-0.2"/>
		</criteria>
	</criteria>
	<!-- adf5cccb9b0cfb2f9cb649652f793fdc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031024" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031025" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031026" comment="mozilla-devel less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031027" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031028" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031029" comment="mozilla-irc less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031030" comment="mozilla-lib64 less than 1.6-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031031" comment="mozilla-mail less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031032" comment="mozilla-venkman less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031033" comment="mozilla less than 1.8_seamonkey_1.0.8-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0855</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-0855" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0855" source="CVE"/>
	<description>
	Stack-based buffer overflow in RARLabs Unrar, as packaged in WinRAR and possibly other products, allows user-assisted remote attackers to execute arbitrary code via a crafted, password-protected archive.
	</description>
 </metadata>
<!-- 225dedd68b61946239752b49ae93f181 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031219" comment="unrar less than 3.3.6-28.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0981</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-0981" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0981" source="CVE"/>
	<description>
	Mozilla based browsers, including Firefox before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8, allow remote attackers to bypass the same origin policy, steal cookies, and conduct other attacks by writing a URI with a null byte to the hostname (location.hostname) DOM property, due to interactions with DNS resolver code.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 66969064f4a01b40dabf533d22cb76ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031022" comment="MozillaFirefox-translations less than 1.5.0.10-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031023" comment="MozillaFirefox less than 1.5.0.10-0.2"/>
		</criteria>
	</criteria>
	<!-- adf5cccb9b0cfb2f9cb649652f793fdc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031024" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031025" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031026" comment="mozilla-devel less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031027" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031028" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031029" comment="mozilla-irc less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031030" comment="mozilla-lib64 less than 1.6-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031031" comment="mozilla-mail less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031032" comment="mozilla-venkman less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031033" comment="mozilla less than 1.8_seamonkey_1.0.8-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0995</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-0995" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0995" source="CVE"/>
	<description>
	Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 ignores trailing invalid HTML characters in attribute names, which allows remote attackers to bypass content filters that use regular expressions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 66969064f4a01b40dabf533d22cb76ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031022" comment="MozillaFirefox-translations less than 1.5.0.10-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031023" comment="MozillaFirefox less than 1.5.0.10-0.2"/>
		</criteria>
	</criteria>
	<!-- adf5cccb9b0cfb2f9cb649652f793fdc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031024" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031025" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031026" comment="mozilla-devel less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031027" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031028" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031029" comment="mozilla-irc less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031030" comment="mozilla-lib64 less than 1.6-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031031" comment="mozilla-mail less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031032" comment="mozilla-venkman less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031033" comment="mozilla less than 1.8_seamonkey_1.0.8-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0996</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-0996" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0996" source="CVE"/>
	<description>
	The child frames in Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 inherit the default charset from the parent window, which allows remote attackers to conduct cross-site scripting (XSS) attacks, as demonstrated using the UTF-7 character set.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 66969064f4a01b40dabf533d22cb76ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031022" comment="MozillaFirefox-translations less than 1.5.0.10-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031023" comment="MozillaFirefox less than 1.5.0.10-0.2"/>
		</criteria>
	</criteria>
	<!-- adf5cccb9b0cfb2f9cb649652f793fdc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031024" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031025" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031026" comment="mozilla-devel less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031027" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031028" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031029" comment="mozilla-irc less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031030" comment="mozilla-lib64 less than 1.6-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031031" comment="mozilla-mail less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031032" comment="mozilla-venkman less than 1.8_seamonkey_1.0.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031033" comment="mozilla less than 1.8_seamonkey_1.0.8-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1003</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-1003" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1003" source="CVE"/>
	<description>
	Integer overflow in ALLOCATE_LOCAL in the ProcXCMiscGetXIDList function in the XC-MISC extension in the X.Org X11 server (xserver) 7.1-1.1.0, and other versions before 20070403, allows remote authenticated users to execute arbitrary code via a large expression, which results in memory corruption.
	</description>
 </metadata>
<!-- d02caf41ef1474e8a88dc11ae5b1e0ef -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031220" comment="XFree86-Xnest less than 4.3.99.902-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031221" comment="XFree86-Xprt less than 4.3.99.902-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031222" comment="XFree86-Xvfb less than 4.3.99.902-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031223" comment="XFree86-Xvnc less than 4.3.99.902-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031224" comment="XFree86-libs-32bit less than 9-200704052143"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031225" comment="XFree86-libs less than 4.3.99.902-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031226" comment="XFree86-server less than 4.3.99.902-43.85"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1007</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-1007" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1007" source="CVE"/>
	<description>
	Format string vulnerability in GnomeMeeting 1.0.2 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format strings in the name, which is not properly handled in a call to the gnomemeeting_log_insert function.
	</description>
 </metadata>
<!-- 0da716e6d8dcb650dffe6c0b4697bf70 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031227" comment="gnomemeeting less than 1.0.1-11.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1095</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-1095" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1095" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5 do not properly implement JavaScript onUnload handlers, which allows remote attackers to run certain JavaScript code and access the location DOM hierarchy in the context of the next web site that is visited by a client.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 94e7e87449ed25841acaf9b535567347 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030840" comment="MozillaFirefox-translations less than 1.5.0.12-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030841" comment="MozillaFirefox less than 1.5.0.12-0.5"/>
		</criteria>
	</criteria>
	<!-- bc8dbb4aea45ba7fac544f7e63f7898b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030842" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030843" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030844" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030845" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030846" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030847" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030848" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030849" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030850" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030851" comment="mozilla less than 1.8_seamonkey_1.0.9-1.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1246</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-1246" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1246" source="CVE"/>
	<description>
	The DMO_VideoDecoder_Open function in loader/dmo/DMO_VideoDecoder.c in MPlayer 1.0rc1 and earlier, as used in xine-lib, does not set the biSize before use in a memcpy, which allows user-assisted remote attackers to cause a buffer overflow and possibly execute arbitrary code, a different vulnerability than CVE-2007-1387.
	</description>
 </metadata>
<!-- 2df134dc41cf07417f292a15d2d5a029 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031228" comment="xine-lib-32bit less than 9-200703221214"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031229" comment="xine-lib less than 0.99.rc3a-106.38"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1263</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-1263" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1263" source="CVE"/>
	<description>
	GnuPG 1.4.6 and earlier and GPGME before 1.1.4, when run from the command line, does not visually distinguish signed and unsigned portions of OpenPGP messages with multiple components, which might allow remote attackers to forge the contents of a message without detection.
	</description>
 </metadata>
<!-- 3fafef103902137d0bea93863e650bdb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031230" comment="gpg less than 1.2.4-68.25"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1351</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-1351" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1351" source="CVE"/>
	<description>
	Integer overflow in the bdfReadCharacters function in bdfread.c in (1) X.Org libXfont before 20070403 and (2) freetype 2.3.2 and earlier allows remote authenticated users to execute arbitrary code via crafted BDF fonts, which result in a heap overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8ca868775a8fa10efec1413e9ba8d2d1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031231" comment="freetype2-32bit less than 9-200704052143"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031232" comment="freetype2-devel-32bit less than 9-200704052143"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031233" comment="freetype2-devel less than 2.1.7-53.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031234" comment="freetype2 less than 2.1.7-53.15"/>
		</criteria>
	</criteria>
	<!-- d02caf41ef1474e8a88dc11ae5b1e0ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031220" comment="XFree86-Xnest less than 4.3.99.902-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031221" comment="XFree86-Xprt less than 4.3.99.902-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031222" comment="XFree86-Xvfb less than 4.3.99.902-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031223" comment="XFree86-Xvnc less than 4.3.99.902-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031224" comment="XFree86-libs-32bit less than 9-200704052143"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031225" comment="XFree86-libs less than 4.3.99.902-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031226" comment="XFree86-server less than 4.3.99.902-43.85"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1352</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-1352" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1352" source="CVE"/>
	<description>
	Integer overflow in the FontFileInitTable function in X.Org libXfont before 20070403 allows remote authenticated users to execute arbitrary code via a long first line in the fonts.dir file, which results in a heap overflow.
	</description>
 </metadata>
<!-- d02caf41ef1474e8a88dc11ae5b1e0ef -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031220" comment="XFree86-Xnest less than 4.3.99.902-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031221" comment="XFree86-Xprt less than 4.3.99.902-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031222" comment="XFree86-Xvfb less than 4.3.99.902-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031223" comment="XFree86-Xvnc less than 4.3.99.902-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031224" comment="XFree86-libs-32bit less than 9-200704052143"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031225" comment="XFree86-libs less than 4.3.99.902-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031226" comment="XFree86-server less than 4.3.99.902-43.85"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1353</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-1353" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1353" source="CVE"/>
	<description>
	The setsockopt function in the L2CAP and HCI Bluetooth support in the Linux kernel before 2.4.34.3 allows context-dependent attackers to read kernel memory and obtain sensitive information via unspecified vectors involving the copy_from_user function accessing an uninitialized stack buffer.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4309006ed78370b6a442ab18e97609c1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- bd16f566b869a29489f5fbc7c16bddd0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030858" comment="kernel-bigsmp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1357</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-1357" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1357" source="CVE"/>
	<description>
	The atalk_sum_skb function in AppleTalk for Linux kernel 2.6.x before 2.6.21, and possibly 2.4.x, allows remote attackers to cause a denial of service (crash) via an AppleTalk frame that is shorter than the specified length, which triggers a BUG_ON call when an attempt is made to perform a checksum.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4309006ed78370b6a442ab18e97609c1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- bd16f566b869a29489f5fbc7c16bddd0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030858" comment="kernel-bigsmp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1358</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-1358" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1358" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in certain applications using Apache Tomcat 4.0.0 through 4.0.6 and 4.1.0 through 4.1.34 allows remote attackers to inject arbitrary web script or HTML via crafted "Accept-Language headers that do not conform to RFC 2616".
	</description>
 </metadata>
<!-- 2495ca9e3f4d48cf82846e7b51f4da79 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030716" comment="jakarta-tomcat less than 5.0.19-29.20"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1362</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-1362" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1362" source="CVE"/>
	<description>
	Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2, allows remote attackers to cause a denial of service via (1) a large cookie path parameter, which triggers memory consumption, or (2) an internal delimiter within cookie path or name values, which could trigger a misinterpretation of cookie data, aka "Path Abuse in Cookies."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2b5bd41bb32a85566962cdcd145ebc9c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031235" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031236" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031237" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031238" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031239" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031240" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031241" comment="mozilla-lib64 less than 1.6-0.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031242" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031243" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031244" comment="mozilla less than 1.8_seamonkey_1.0.9-1.2"/>
		</criteria>
	</criteria>
	<!-- f91eb16b534b592433bff9cd13cddd43 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031245" comment="MozillaFirefox-translations less than 1.5.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031246" comment="MozillaFirefox less than 1.5.0.12-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1536</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-1536" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1536" source="CVE"/>
	<description>
	Integer underflow in the file_printf function in the "file" program before 4.20 allows user-assisted attackers to execute arbitrary code via a file that triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 730935e4cb22680a9cd6d34f81857e20 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031247" comment="file-32bit less than 9-200703261521"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031248" comment="file less than 4.09-3.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1558</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-1558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1558" source="CVE"/>
	<description>
	The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions.  NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.
	</description>
 </metadata>
<!-- 2b5bd41bb32a85566962cdcd145ebc9c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031235" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031236" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031237" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031238" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031239" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031240" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031241" comment="mozilla-lib64 less than 1.6-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031242" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031243" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031244" comment="mozilla less than 1.8_seamonkey_1.0.9-1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1562</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-1562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1562" source="CVE"/>
	<description>
	The FTP protocol implementation in Mozilla Firefox before 1.5.0.11 and 2.x before 2.0.0.3 allows remote attackers to force the client to connect to other servers, perform a proxied port scan, or obtain sensitive information by specifying an alternate server address in an FTP PASV response.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2b5bd41bb32a85566962cdcd145ebc9c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031235" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031236" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031237" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031238" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031239" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031240" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031241" comment="mozilla-lib64 less than 1.6-0.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031242" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031243" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031244" comment="mozilla less than 1.8_seamonkey_1.0.9-1.2"/>
		</criteria>
	</criteria>
	<!-- f91eb16b534b592433bff9cd13cddd43 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031245" comment="MozillaFirefox-translations less than 1.5.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031246" comment="MozillaFirefox less than 1.5.0.12-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1564</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-1564" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1564" source="CVE"/>
	<description>
	The FTP protocol implementation in Konqueror 3.5.5 allows remote servers to force the client to connect to other servers, perform a proxied port scan, or obtain sensitive information by specifying an alternate server address in an FTP PASV response.
	</description>
 </metadata>
<!-- bf7f3f26a29a4c24de3b8f0e3e664432 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031196" comment="kdelibs3-32bit less than 9-200704031835"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031197" comment="kdelibs3-devel less than 3.2.1-44.69"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031198" comment="kdelibs3 less than 3.2.1-44.69"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1592</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-1592" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1592" source="CVE"/>
	<description>
	net/ipv6/tcp_ipv6.c in Linux kernel 2.6.x up to 2.6.21-rc3 inadvertently copies the ipv6_fl_socklist from a listening TCP socket to child sockets, which allows local users to cause a denial of service (OOPS) or double free by opening a listening IPv6 socket, attaching a flow label, and connecting to that socket.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4309006ed78370b6a442ab18e97609c1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- bd16f566b869a29489f5fbc7c16bddd0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030858" comment="kernel-bigsmp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1659</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-1659" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1659" source="CVE"/>
	<description>
	Perl-Compatible Regular Expression (PCRE) library before 7.3 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via regex patterns containing unmatched "\Q\E" sequences with orphan "\E" codes.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 73795549f9a608bace82f0cf345b3a42 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031098" comment="pcre-32bit less than 9-200711270035"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031099" comment="pcre-devel less than 4.4-109.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031100" comment="pcre less than 4.4-109.12"/>
		</criteria>
	</criteria>
	<!-- 9992478cea3704f6f2c2f7741f3e12e2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031101" comment="pcre-32bit less than 9-200711192343"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031102" comment="pcre-devel less than 4.4-109.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031103" comment="pcre less than 4.4-109.10"/>
		</criteria>
	</criteria>
	<!-- f1255e10262bd8b24adcb137ab61417e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031048" comment="mod_php4-core less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031049" comment="php4-bcmath less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031050" comment="php4-bz2 less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031051" comment="php4-calendar less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031052" comment="php4-ctype less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031053" comment="php4-curl less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031054" comment="php4-dba less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031055" comment="php4-dbase less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031056" comment="php4-devel less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031057" comment="php4-domxml less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031058" comment="php4-exif less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031059" comment="php4-fastcgi less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031060" comment="php4-filepro less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031061" comment="php4-ftp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031062" comment="php4-gd less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031063" comment="php4-gettext less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031064" comment="php4-gmp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031065" comment="php4-iconv less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031066" comment="php4-imap less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031067" comment="php4-ldap less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031068" comment="php4-mbstring less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031069" comment="php4-mcal less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031070" comment="php4-mcrypt less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031071" comment="php4-mhash less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031072" comment="php4-mime_magic less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031073" comment="php4-mysql less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031074" comment="php4-pear less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031075" comment="php4-pgsql less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031076" comment="php4-qtdom less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031077" comment="php4-readline less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031078" comment="php4-recode less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031079" comment="php4-servlet less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031080" comment="php4-session less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031081" comment="php4-shmop less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031082" comment="php4-snmp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031083" comment="php4-sockets less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031084" comment="php4-swf less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031085" comment="php4-sysvsem less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031086" comment="php4-sysvshm less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031087" comment="php4-unixODBC less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031088" comment="php4-wddx less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031089" comment="php4-xslt less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031090" comment="php4-yp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031091" comment="php4-zlib less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031092" comment="php4 less than 4.3.4-43.85"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1660</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-1660" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1660" source="CVE"/>
	<description>
	Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate sizes for unspecified "multiple forms of character class", which triggers a buffer overflow that allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 02ba535f3b526c99b9b5525f2fcfac3d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031045" comment="pcre-32bit less than 9-200711150229"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031046" comment="pcre-devel less than 4.4-109.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031047" comment="pcre less than 4.4-109.8"/>
		</criteria>
	</criteria>
	<!-- f1255e10262bd8b24adcb137ab61417e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031048" comment="mod_php4-core less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031049" comment="php4-bcmath less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031050" comment="php4-bz2 less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031051" comment="php4-calendar less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031052" comment="php4-ctype less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031053" comment="php4-curl less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031054" comment="php4-dba less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031055" comment="php4-dbase less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031056" comment="php4-devel less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031057" comment="php4-domxml less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031058" comment="php4-exif less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031059" comment="php4-fastcgi less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031060" comment="php4-filepro less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031061" comment="php4-ftp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031062" comment="php4-gd less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031063" comment="php4-gettext less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031064" comment="php4-gmp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031065" comment="php4-iconv less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031066" comment="php4-imap less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031067" comment="php4-ldap less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031068" comment="php4-mbstring less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031069" comment="php4-mcal less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031070" comment="php4-mcrypt less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031071" comment="php4-mhash less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031072" comment="php4-mime_magic less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031073" comment="php4-mysql less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031074" comment="php4-pear less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031075" comment="php4-pgsql less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031076" comment="php4-qtdom less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031077" comment="php4-readline less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031078" comment="php4-recode less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031079" comment="php4-servlet less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031080" comment="php4-session less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031081" comment="php4-shmop less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031082" comment="php4-snmp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031083" comment="php4-sockets less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031084" comment="php4-swf less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031085" comment="php4-sysvsem less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031086" comment="php4-sysvshm less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031087" comment="php4-unixODBC less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031088" comment="php4-wddx less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031089" comment="php4-xslt less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031090" comment="php4-yp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031091" comment="php4-zlib less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031092" comment="php4 less than 4.3.4-43.85"/>
		</criteria>
	</criteria>
	<!-- f3cf1435d12b7ef88a846de203195e0c -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031093" comment="libapr0 less than 2.0.59-1.6"/>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009031094" comment="apache2-devel less than 2.0.59-1.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031095" comment="apache2-prefork less than 2.0.59-1.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031096" comment="apache2-worker less than 2.0.59-1.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031097" comment="apache2 less than 2.0.59-1.6"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1667</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-1667" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1667" source="CVE"/>
	<description>
	Multiple integer overflows in (1) the XGetPixel function in ImUtil.c in X.Org libx11 before 1.0.3, and (2) XInitImage function in xwd.c for ImageMagick, allow user-assisted remote attackers to cause a denial of service (crash) or obtain sensitive information via crafted images with large or negative values that trigger a buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 028a8bd0a4241254e8a82d0d372fcbb2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031249" comment="ImageMagick-devel less than 5.5.7-225.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031250" comment="ImageMagick less than 5.5.7-225.35"/>
		</criteria>
	</criteria>
	<!-- d02caf41ef1474e8a88dc11ae5b1e0ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031220" comment="XFree86-Xnest less than 4.3.99.902-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031221" comment="XFree86-Xprt less than 4.3.99.902-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031222" comment="XFree86-Xvfb less than 4.3.99.902-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031223" comment="XFree86-Xvnc less than 4.3.99.902-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031224" comment="XFree86-libs-32bit less than 9-200704052143"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031225" comment="XFree86-libs less than 4.3.99.902-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031226" comment="XFree86-server less than 4.3.99.902-43.85"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1797</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-1797" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1797" source="CVE"/>
	<description>
	Multiple integer overflows in ImageMagick before 6.3.3-5 allow remote attackers to execute arbitrary code via (1) a crafted DCM image, which results in a heap-based overflow in the ReadDCMImage function, or (2) the (a) colors or (b) comments field in a crafted XWD image, which results in a heap-based overflow in the ReadXWDImage function, different issues than CVE-2007-1667.
	</description>
 </metadata>
<!-- 028a8bd0a4241254e8a82d0d372fcbb2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031249" comment="ImageMagick-devel less than 5.5.7-225.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031250" comment="ImageMagick less than 5.5.7-225.35"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1841</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-1841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1841" source="CVE"/>
	<description>
	The isakmp_info_recv function in src/racoon/isakmp_inf.c in racoon in Ipsec-tools before 0.6.7 allows remote attackers to cause a denial of service (tunnel crash) via crafted (1) DELETE (ISAKMP_NPTYPE_D) and (2) NOTIFY (ISAKMP_NPTYPE_N) messages.
	</description>
 </metadata>
<!-- 888cafa59377f07fba0b7773bc65da92 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031251" comment="ipsec-tools less than 0.3.3-1.12"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1858</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-1858" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1858" source="CVE"/>
	<description>
	The default SSL cipher configuration in Apache Tomcat 4.1.28 through 4.1.31, 5.0.0 through 5.0.30, and 5.5.0 through 5.5.17 uses certain insecure ciphers, including the anonymous cipher, which allows remote attackers to obtain sensitive information or have other, unspecified impacts.
	</description>
 </metadata>
<!-- 9ad93d9cf0cbff51419c9761a5fc4cdd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031252" comment="jakarta-tomcat less than 5.0.19-29.13"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1859</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-1859" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1859" source="CVE"/>
	<description>
	XScreenSaver 4.10, when using a remote directory service for credentials, does not properly handle the results from the getpwuid function in drivers/lock.c when there is no network connectivity, which causes XScreenSaver to crash and unlock the screen and allows local users to bypass authentication.
	</description>
 </metadata>
<!-- 79a3eeb2e0ca986fd0c5d61d1d917f67 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031253" comment="xscreensaver less than 4.16-2.28"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1860</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-1860" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1860" source="CVE"/>
	<description>
	mod_jk in Apache Tomcat JK Web Server Connector 1.2.x before 1.2.23 decodes request URLs within the Apache HTTP Server before passing the URL to Tomcat, which allows remote attackers to access protected pages via a crafted prefix JkMount, possibly involving double-encoded .. (dot dot) sequences and directory traversal, a related issue to CVE-2007-0450.
	</description>
 </metadata>
<!-- 315ff7a101fca9aabbfab11879f31212 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030636" comment="jakarta-tomcat less than 5.0.19-29.11"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1863</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-1863" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1863" source="CVE"/>
	<description>
	cache_util.c in the mod_cache module in Apache HTTP Server (httpd), when caching is enabled and a threaded Multi-Processing Module (MPM) is used, allows remote attackers to cause a denial of service (child processing handler crash) via a request with the (1) s-maxage, (2) max-age, (3) min-fresh, or (4) max-stale Cache-Control headers without a value.
	</description>
 </metadata>
<!-- a5b67777faf570a7e001c677784ac7c7 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030963" comment="libapr0 less than 2.0.59-1.4"/>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030964" comment="apache2-devel less than 2.0.59-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030965" comment="apache2-prefork less than 2.0.59-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030966" comment="apache2-worker less than 2.0.59-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030967" comment="apache2 less than 2.0.59-1.4"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2022</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-2022" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2022" source="CVE"/>
	<description>
	Adobe Macromedia Flash Player 7 and 9, when used with Opera before 9.20 or Konqueror before 20070613, allows remote attackers to obtain sensitive information (browser keystrokes), which are leaked to the Flash Player applet.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 11185d1d77c266319dacb704d254fd94 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031254" comment="flash-player less than 7.0.70.0-0.1"/>
	</criteria>
	<!-- a329d00d1ffda74b527ad3f526ff8e62 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031255" comment="kdebase3-32bit less than 9-200705221253"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031256" comment="kdebase3 less than 3.2.1-68.59"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2052</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-2052" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2052" source="CVE"/>
	<description>
	Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.
	</description>
 </metadata>
<!-- 74ea95d7621db0dbcf832e3be84300de -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031257" comment="python-32bit less than 9-200705260110"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031258" comment="python-devel less than 2.3.3-88.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031259" comment="python less than 2.3.3-88.16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2292</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-2292" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2292" source="CVE"/>
	<description>
	CRLF injection vulnerability in the Digest Authentication support for Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5 allows remote attackers to conduct HTTP request splitting attacks via LF (%0a) bytes in the username attribute.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 94e7e87449ed25841acaf9b535567347 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030840" comment="MozillaFirefox-translations less than 1.5.0.12-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030841" comment="MozillaFirefox less than 1.5.0.12-0.5"/>
		</criteria>
	</criteria>
	<!-- bc8dbb4aea45ba7fac544f7e63f7898b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030842" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030843" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030844" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030845" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030846" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030847" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030848" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030849" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030850" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030851" comment="mozilla less than 1.8_seamonkey_1.0.9-1.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2356</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-2356" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2356" source="CVE"/>
	<description>
	Stack-based buffer overflow in the set_color_table function in sunras.c in the SUNRAS plugin in Gimp 2.2.14 allows user-assisted remote attackers to execute arbitrary code via a crafted RAS file.
	</description>
 </metadata>
<!-- 4f8aa522a473bf83afea80f45c2e6b1e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031260" comment="gimp less than 2.0.2-1.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2445</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-2445" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2445" source="CVE"/>
	<description>
	The png_handle_tRNS function in pngrutil.c in libpng before 1.0.25 and 1.2.x before 1.2.17 allows remote attackers to cause a denial of service (application crash) via a grayscale PNG image with a bad tRNS chunk CRC value.
	</description>
 </metadata>
<!-- 46bf07db17204012a69d1c67caf92ee4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031261" comment="libpng-32bit less than 9-200705260110"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031262" comment="libpng-devel less than 1.2.5-182.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031263" comment="libpng less than 1.2.5-182.14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2446</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-2446" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2446" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in the NDR parsing in smbd in Samba 3.0.0 through 3.0.25rc3 allow remote attackers to execute arbitrary code via crafted MS-RPC requests involving (1) DFSEnum (netdfs_io_dfs_EnumInfo_d), (2) RFNPCNEX (smb_io_notify_option_type_data), (3) LsarAddPrivilegesToAccount (lsa_io_privilege_set), (4) NetSetFileSecurity (sec_io_acl), or (5) LsarLookupSids/LsarLookupSids2 (lsa_io_trans_names).
	</description>
 </metadata>
<!-- d2956ba1a85d7a27cc6a91e7693a737c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031264" comment="libsmbclient-32bit less than 9-200705181249"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031265" comment="libsmbclient-devel less than 3.0.20b-3.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031266" comment="libsmbclient less than 3.0.20b-3.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031267" comment="samba-client less than 3.0.20b-3.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031268" comment="samba-doc less than 3.0.20b-3.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031269" comment="samba-pdb less than 3.0.20b-3.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031270" comment="samba-python less than 3.0.20b-3.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031271" comment="samba-vscan less than 0.3.6b-0.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031272" comment="samba-winbind less than 3.0.20b-3.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031273" comment="samba less than 3.0.20b-3.17"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2447</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-2447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2447" source="CVE"/>
	<description>
	The MS-RPC functionality in smbd in Samba 3.0.0 through 3.0.25rc3 allows remote attackers to execute arbitrary commands via shell metacharacters involving the (1) SamrChangePassword function, when the "username map script" smb.conf option is enabled, and allows remote authenticated users to execute commands via shell metacharacters involving other MS-RPC functions in the (2) remote printer and (3) file share management.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 030f92e97ede6166fdaf8c9603ef87be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031274" comment="ldapsmb less than 1.33-6.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031275" comment="libsmbclient-32bit less than 9-200706251737"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031276" comment="libsmbclient-devel less than 3.0.20b-3.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031277" comment="libsmbclient less than 3.0.20b-3.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031278" comment="samba-client less than 3.0.20b-3.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031279" comment="samba-doc less than 3.0.20b-3.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031280" comment="samba-pdb less than 3.0.20b-3.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031281" comment="samba-python less than 3.0.20b-3.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031282" comment="samba-vscan less than 0.3.6b-0.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031283" comment="samba-winbind less than 3.0.20b-3.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031284" comment="samba less than 3.0.20b-3.21"/>
		</criteria>
	</criteria>
	<!-- d2956ba1a85d7a27cc6a91e7693a737c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031264" comment="libsmbclient-32bit less than 9-200705181249"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031265" comment="libsmbclient-devel less than 3.0.20b-3.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031266" comment="libsmbclient less than 3.0.20b-3.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031267" comment="samba-client less than 3.0.20b-3.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031268" comment="samba-doc less than 3.0.20b-3.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031269" comment="samba-pdb less than 3.0.20b-3.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031270" comment="samba-python less than 3.0.20b-3.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031271" comment="samba-vscan less than 0.3.6b-0.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031272" comment="samba-winbind less than 3.0.20b-3.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031273" comment="samba less than 3.0.20b-3.17"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2449</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-2449" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2449" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in certain JSP files in the examples web application in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.24, and 6.0.0 through 6.0.13 allow remote attackers to inject arbitrary web script or HTML via the portion of the URI after the ';' character, as demonstrated by a URI containing a "snp/snoop.jsp;" sequence.
	</description>
 </metadata>
<!-- 9ad93d9cf0cbff51419c9761a5fc4cdd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031252" comment="jakarta-tomcat less than 5.0.19-29.13"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2450</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-2450" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2450" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in the (1) Manager and (2) Host Manager web applications in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.24, and 6.0.0 through 6.0.13 allow remote authenticated users to inject arbitrary web script or HTML via a parameter name to manager/html/upload, and other unspecified vectors.
	</description>
 </metadata>
<!-- 9ad93d9cf0cbff51419c9761a5fc4cdd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031252" comment="jakarta-tomcat less than 5.0.19-29.13"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2525</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-2525" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2525" source="CVE"/>
	<description>
	Memory leak in the PPP over Ethernet (PPPoE) socket implementation in the Linux kernel before 2.6.21-git8 allows local users to cause a denial of service (memory consumption) by creating a socket using connect, and releasing it before the PPPIOCGCHAN ioctl is initialized.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 353a84ed7b2f4d437e90169112757674 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031285" comment="kernel-bigsmp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031287" comment="kernel-smp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- 615785e3ad7b9994c5088545f0cfc2b5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031287" comment="kernel-smp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2583</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-2583" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2583" source="CVE"/>
	<description>
	The in_decimal::set function in item_cmpfunc.cc in MySQL before 5.0.40, and 5.1 before 5.1.18-beta, allows context-dependent attackers to cause a denial of service (crash) via a crafted IF clause that results in a divide-by-zero error and a NULL pointer dereference.
	</description>
 </metadata>
<!-- 7cb80eb2033195041bfb93aa6b99a517 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031290" comment="mysql-Max less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031291" comment="mysql-bench less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031292" comment="mysql-client less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031293" comment="mysql-devel less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031294" comment="mysql-shared less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031295" comment="mysql less than 4.0.18-32.32"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2645</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-2645" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2645" source="CVE"/>
	<description>
	Integer overflow in the exif_data_load_data_entry function in exif-data.c in libexif before 0.6.14 allows user-assisted remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted EXIF data, involving the (1) doff or (2) s variable.
	</description>
 </metadata>
<!-- d2186e8218d131e17a5524c43a27b841 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031296" comment="libexif-32bit less than 9-200706190007"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031297" comment="libexif less than 0.5.12-118.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2654</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-2654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2654" source="CVE"/>
	<description>
	xfs_fsr in xfsdump creates a .fsr temporary directory with insecure permissions, which allows local users to read or overwrite arbitrary files on xfs filesystems.
	</description>
 </metadata>
<!-- b78e89dbf7667b5a3b5c860694ddbd85 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031298" comment="xfsdump less than 2.2.25-0.13"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2691</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-2691" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2691" source="CVE"/>
	<description>
	MySQL before 4.1.23, 5.0.x before 5.0.42, and 5.1.x before 5.1.18 does not require the DROP privilege for RENAME TABLE statements, which allows remote authenticated users to rename arbitrary tables.
	</description>
 </metadata>
<!-- 7cb80eb2033195041bfb93aa6b99a517 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031290" comment="mysql-Max less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031291" comment="mysql-bench less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031292" comment="mysql-client less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031293" comment="mysql-devel less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031294" comment="mysql-shared less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031295" comment="mysql less than 4.0.18-32.32"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2692</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-2692" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2692" source="CVE"/>
	<description>
	The mysql_change_db function in MySQL 5.0.x before 5.0.40 and 5.1.x before 5.1.18 does not restore THD::db_access privileges when returning from SQL SECURITY INVOKER stored routines, which allows remote authenticated users to gain privileges.
	</description>
 </metadata>
<!-- 7cb80eb2033195041bfb93aa6b99a517 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031290" comment="mysql-Max less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031291" comment="mysql-bench less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031292" comment="mysql-client less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031293" comment="mysql-devel less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031294" comment="mysql-shared less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031295" comment="mysql less than 4.0.18-32.32"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2741</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-2741" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2741" source="CVE"/>
	<description>
	Stack-based buffer overflow in Little CMS (lcms) before 1.15 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted ICC profile in a JPG file.
	</description>
 </metadata>
<!-- 8ecfa3a9060b31eeb24652f5e49ba619 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031299" comment="liblcms-32bit less than 9-200711060115"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031300" comment="liblcms-devel less than 1.12-55.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031301" comment="liblcms less than 1.12-55.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2754</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-2754" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2754" source="CVE"/>
	<description>
	Integer signedness error in truetype/ttgload.c in Freetype 2.3.4 and earlier might allow remote attackers to execute arbitrary code via a crafted TTF image with a negative n_points value, which leads to an integer overflow and heap-based buffer overflow.
	</description>
 </metadata>
<!-- 21c9a243dbedc0b6b97f4bf9e8e2d3f9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031302" comment="freetype2-32bit less than 9-200706182342"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031303" comment="freetype2-devel-32bit less than 9-200706182342"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031304" comment="freetype2-devel less than 2.1.7-53.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031305" comment="freetype2 less than 2.1.7-53.17"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2788</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-2788" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2788" source="CVE"/>
	<description>
	Integer overflow in the embedded ICC profile image parser in Sun Java Development Kit (JDK) before 1.5.0_11-b03 and 1.6.x before 1.6.0_01-b06, and Sun Java Runtime Environment in JDK and JRE 6, JDK and JRE 5.0 Update 10 and earlier, SDK and JRE 1.4.2_14 and earlier, and SDK and JRE 1.3.1_20 and earlier, allows remote attackers to execute arbitrary code or cause a denial of service (JVM crash) via a crafted JPEG or BMP file that triggers a buffer overflow.
	</description>
 </metadata>
<!-- 90864743019d987b918e58f9bba908b8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031164" comment="java2-jre less than 1.4.2-129.30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031165" comment="java2 less than 1.4.2-129.30"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2789</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-2789" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2789" source="CVE"/>
	<description>
	The BMP image parser in Sun Java Development Kit (JDK) before 1.5.0_11-b03 and 1.6.x before 1.6.0_01-b06, and Sun Java Runtime Environment in JDK and JRE 6, JDK and JRE 5.0 Update 10 and earlier, SDK and JRE 1.4.2_14 and earlier, and SDK and JRE 1.3.1_19 and earlier, when running on Unix/Linux systems, allows remote attackers to cause a denial of service (JVM hang) via untrusted applets or applications that open arbitrary local files via a crafted BMP file, such as /dev/tty.
	</description>
 </metadata>
<!-- 90864743019d987b918e58f9bba908b8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031164" comment="java2-jre less than 1.4.2-129.30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031165" comment="java2 less than 1.4.2-129.30"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2834</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-2834" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2834" source="CVE"/>
	<description>
	Integer overflow in the TIFF parser in OpenOffice.org (OOo) before 2.3; and Sun StarOffice 6, 7, and 8 Office Suite (StarSuite); allows remote attackers to execute arbitrary code via a TIFF file with crafted values of unspecified length fields, which triggers allocation of an incorrect amount of memory, resulting in a heap-based buffer overflow.
	</description>
 </metadata>
<!-- f06d1e55c8e342f5cdd05749c53217ca -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031306" comment="OpenOffice_org-ar less than 1.1.5-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031307" comment="OpenOffice_org-ca less than 1.1.5-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031308" comment="OpenOffice_org-cs less than 1.1.5-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031309" comment="OpenOffice_org-da less than 1.1.5-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031310" comment="OpenOffice_org-de less than 1.1.5-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031311" comment="OpenOffice_org-el less than 1.1.5-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031312" comment="OpenOffice_org-en-help less than 1.1.5-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031313" comment="OpenOffice_org-en less than 1.1.5-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031314" comment="OpenOffice_org-es less than 1.1.5-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031315" comment="OpenOffice_org-et less than 1.1.5-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031316" comment="OpenOffice_org-fi less than 1.1.5-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031317" comment="OpenOffice_org-fr less than 1.1.5-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031318" comment="OpenOffice_org-gnome less than 1.1.5-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031319" comment="OpenOffice_org-hu less than 1.1.5-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031320" comment="OpenOffice_org-it less than 1.1.5-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031321" comment="OpenOffice_org-ja less than 1.1.5-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031322" comment="OpenOffice_org-kde less than 1.1.5-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031323" comment="OpenOffice_org-ko less than 1.1.5-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031324" comment="OpenOffice_org-nl less than 1.1.5-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031325" comment="OpenOffice_org-pl less than 1.1.5-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031326" comment="OpenOffice_org-pt-BR less than 1.1.5-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031327" comment="OpenOffice_org-pt less than 1.1.5-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031328" comment="OpenOffice_org-ru less than 1.1.5-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031329" comment="OpenOffice_org-sk less than 1.1.5-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031330" comment="OpenOffice_org-sl less than 1.1.5-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031331" comment="OpenOffice_org-sv less than 1.1.5-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031332" comment="OpenOffice_org-tr less than 1.1.5-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031333" comment="OpenOffice_org-zh-CN less than 1.1.5-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031334" comment="OpenOffice_org-zh-TW less than 1.1.5-0.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031335" comment="OpenOffice_org less than 1.1.5-0.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2867</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-2867" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2867" source="CVE"/>
	<description>
	Multiple vulnerabilities in the layout engine for Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, Thunderbird 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2 allow remote attackers to cause a denial of service (crash) via vectors related to dangling pointers, heap corruption, signed/unsigned, and other issues.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2b5bd41bb32a85566962cdcd145ebc9c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031235" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031236" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031237" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031238" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031239" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031240" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031241" comment="mozilla-lib64 less than 1.6-0.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031242" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031243" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031244" comment="mozilla less than 1.8_seamonkey_1.0.9-1.2"/>
		</criteria>
	</criteria>
	<!-- f91eb16b534b592433bff9cd13cddd43 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031245" comment="MozillaFirefox-translations less than 1.5.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031246" comment="MozillaFirefox less than 1.5.0.12-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2868</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-2868" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2868" source="CVE"/>
	<description>
	Multiple vulnerabilities in the JavaScript engine for Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, Thunderbird 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors that trigger memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2b5bd41bb32a85566962cdcd145ebc9c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031235" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031236" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031237" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031238" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031239" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031240" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031241" comment="mozilla-lib64 less than 1.6-0.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031242" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031243" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031244" comment="mozilla less than 1.8_seamonkey_1.0.9-1.2"/>
		</criteria>
	</criteria>
	<!-- f91eb16b534b592433bff9cd13cddd43 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031245" comment="MozillaFirefox-translations less than 1.5.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031246" comment="MozillaFirefox less than 1.5.0.12-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2869</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-2869" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2869" source="CVE"/>
	<description>
	The form autocomplete feature in Mozilla Firefox 1.5.x before 1.5.0.12, 2.x before 2.0.0.4, and possibly earlier versions, allows remote attackers to cause a denial of service (persistent temporary CPU consumption) via a large number of characters in a submitted form.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2b5bd41bb32a85566962cdcd145ebc9c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031235" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031236" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031237" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031238" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031239" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031240" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031241" comment="mozilla-lib64 less than 1.6-0.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031242" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031243" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031244" comment="mozilla less than 1.8_seamonkey_1.0.9-1.2"/>
		</criteria>
	</criteria>
	<!-- f91eb16b534b592433bff9cd13cddd43 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031245" comment="MozillaFirefox-translations less than 1.5.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031246" comment="MozillaFirefox less than 1.5.0.12-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2870</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-2870" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2870" source="CVE"/>
	<description>
	Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2, allows remote attackers to bypass the same-origin policy and conduct cross-site scripting (XSS) and other attacks by using the addEventListener method to add an event listener for a site, which is executed in the context of that site.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2b5bd41bb32a85566962cdcd145ebc9c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031235" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031236" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031237" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031238" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031239" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031240" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031241" comment="mozilla-lib64 less than 1.6-0.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031242" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031243" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031244" comment="mozilla less than 1.8_seamonkey_1.0.9-1.2"/>
		</criteria>
	</criteria>
	<!-- f91eb16b534b592433bff9cd13cddd43 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031245" comment="MozillaFirefox-translations less than 1.5.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031246" comment="MozillaFirefox less than 1.5.0.12-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2871</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-2871" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2871" source="CVE"/>
	<description>
	Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2, allows remote attackers to spoof or hide the browser chrome, such as the location bar, by placing XUL popups outside of the browser's content pane.  NOTE: this issue can be leveraged for phishing and other attacks.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2b5bd41bb32a85566962cdcd145ebc9c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031235" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031236" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031237" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031238" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031239" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031240" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031241" comment="mozilla-lib64 less than 1.6-0.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031242" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031243" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031244" comment="mozilla less than 1.8_seamonkey_1.0.9-1.2"/>
		</criteria>
	</criteria>
	<!-- f91eb16b534b592433bff9cd13cddd43 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031245" comment="MozillaFirefox-translations less than 1.5.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031246" comment="MozillaFirefox less than 1.5.0.12-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2872</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-2872" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2872" source="CVE"/>
	<description>
	Multiple integer overflows in the chunk_split function in PHP 5 before 5.2.3 and PHP 4 before 4.4.8 allow remote attackers to cause a denial of service (crash) or execute arbitrary code via the (1) chunks, (2) srclen, and (3) chunklen arguments.
	</description>
 </metadata>
<!-- f1255e10262bd8b24adcb137ab61417e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031048" comment="mod_php4-core less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031049" comment="php4-bcmath less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031050" comment="php4-bz2 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031051" comment="php4-calendar less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031052" comment="php4-ctype less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031053" comment="php4-curl less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031054" comment="php4-dba less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031055" comment="php4-dbase less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031056" comment="php4-devel less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031057" comment="php4-domxml less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031058" comment="php4-exif less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031059" comment="php4-fastcgi less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031060" comment="php4-filepro less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031061" comment="php4-ftp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031062" comment="php4-gd less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031063" comment="php4-gettext less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031064" comment="php4-gmp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031065" comment="php4-iconv less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031066" comment="php4-imap less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031067" comment="php4-ldap less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031068" comment="php4-mbstring less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031069" comment="php4-mcal less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031070" comment="php4-mcrypt less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031071" comment="php4-mhash less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031072" comment="php4-mime_magic less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031073" comment="php4-mysql less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031074" comment="php4-pear less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031075" comment="php4-pgsql less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031076" comment="php4-qtdom less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031077" comment="php4-readline less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031078" comment="php4-recode less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031079" comment="php4-servlet less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031080" comment="php4-session less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031081" comment="php4-shmop less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031082" comment="php4-snmp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031083" comment="php4-sockets less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031084" comment="php4-swf less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031085" comment="php4-sysvsem less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031086" comment="php4-sysvshm less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031087" comment="php4-unixODBC less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031088" comment="php4-wddx less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031089" comment="php4-xslt less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031090" comment="php4-yp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031091" comment="php4-zlib less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031092" comment="php4 less than 4.3.4-43.85"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2876</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-2876" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2876" source="CVE"/>
	<description>
	The sctp_new function in (1) ip_conntrack_proto_sctp.c and (2) nf_conntrack_proto_sctp.c in Netfilter in Linux kernel 2.6 before 2.6.20.13, and 2.6.21.x before 2.6.21.4, allows remote attackers to cause a denial of service by causing certain invalid states that trigger a NULL pointer dereference.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 353a84ed7b2f4d437e90169112757674 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031285" comment="kernel-bigsmp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031287" comment="kernel-smp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- 615785e3ad7b9994c5088545f0cfc2b5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031287" comment="kernel-smp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2926</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-2926" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2926" source="CVE"/>
	<description>
	ISC BIND 9 through 9.5.0a5 uses a weak random number generator during generation of DNS query ids when answering resolver questions or sending NOTIFY messages to slave name servers, which makes it easier for remote attackers to guess the next query id and perform DNS cache poisoning.
	</description>
 </metadata>
<!-- c9ea0bc14d84824dc2e54f71907d6322 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031336" comment="bind-devel less than 9.2.3-76.34"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031337" comment="bind-utils-32bit less than 9-200707301447"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031338" comment="bind-utils less than 9.2.3-76.34"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031339" comment="bind less than 9.2.3-76.34"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2949</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-2949" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2949" source="CVE"/>
	<description>
	Integer overflow in the seek_to_and_unpack_pixeldata function in the psd.c plugin in Gimp 2.2.15 allows remote attackers to execute arbitrary code via a crafted PSD file that contains a large (1) width or (2) height value.
	</description>
 </metadata>
<!-- b9e7c4039054756c151b18025fe84624 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031340" comment="gimp-devel less than 2.0.2-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031341" comment="gimp less than 2.0.2-1.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2953</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-2953" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2953" source="CVE"/>
	<description>
	Format string vulnerability in the helptags_one function in src/ex_cmds.c in Vim 6.4 and earlier, and 7.x up to 7.1, allows user-assisted remote attackers to execute arbitrary code via format string specifiers in a help-tags tag in a help file, related to the helptags command.
	</description>
 </metadata>
<!-- a2f66f84efb210e33202eedc43e1e606 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031342" comment="gvim less than 6.2-235.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3004</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-3004" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3004" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2007-2788.  Reason: This candidate is a duplicate of CVE-2007-2788.  Notes: All CVE users should reference CVE-2007-2788 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
<!-- 90864743019d987b918e58f9bba908b8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031164" comment="java2-jre less than 1.4.2-129.30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031165" comment="java2 less than 1.4.2-129.30"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3005</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-3005" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3005" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2007-2789.  Reason: This candidate is a duplicate of CVE-2007-2789.  Notes: All CVE users should reference CVE-2007-2789 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
<!-- 90864743019d987b918e58f9bba908b8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031164" comment="java2-jre less than 1.4.2-129.30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031165" comment="java2 less than 1.4.2-129.30"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3089</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-3089" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3089" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.5 does not prevent use of document.write to replace an IFRAME (1) during the load stage or (2) in the case of an about:blank frame, which allows remote attackers to display arbitrary HTML or execute certain JavaScript code, as demonstrated by code that intercepts keystroke values from window.event, aka the "promiscuous IFRAME access bug," a related issue to CVE-2006-4568.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 975911e840a1ef54b4b939009daa4a70 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031343" comment="MozillaFirefox-translations less than 1.5.0.12-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031344" comment="MozillaFirefox less than 1.5.0.12-0.3"/>
		</criteria>
	</criteria>
	<!-- d91b73c3c1e2666666b5dd6d36be8cbf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031345" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031346" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031347" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031348" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031349" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031350" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031351" comment="mozilla-lib64 less than 1.6-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031352" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031353" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031354" comment="mozilla less than 1.8_seamonkey_1.0.9-1.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3105</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-3105" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3105" source="CVE"/>
	<description>
	Stack-based buffer overflow in the random number generator (RNG) implementation in the Linux kernel before 2.6.22 might allow local root users to cause a denial of service or gain privileges by setting the default wakeup threshold to a value greater than the output pool size, which triggers writing random numbers to the stack by the pool transfer function involving "bound check ordering".  NOTE: this issue might only cross privilege boundaries in environments that have granular assignment of privileges for root.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 353a84ed7b2f4d437e90169112757674 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031285" comment="kernel-bigsmp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031287" comment="kernel-smp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- 615785e3ad7b9994c5088545f0cfc2b5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031287" comment="kernel-smp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3106</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-3106" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3106" source="CVE"/>
	<description>
	lib/info.c in libvorbis 1.1.2, and possibly other versions before 1.2.0, allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via invalid (1) blocksize_0 and (2) blocksize_1 values, which trigger a "heap overwrite" in the _01inverse function in res0.c.  NOTE: this issue has been RECAST so that CVE-2007-4029 handles additional vectors.
	</description>
 </metadata>
<!-- 4698cefcb7095f1da9b8e80af41f9954 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031355" comment="libvorbis-32bit less than 9-200707091633"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031356" comment="libvorbis-devel less than 1.0.1-56.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031357" comment="libvorbis less than 1.0.1-56.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073257" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3257</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-3257" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3257" source="CVE"/>
	<description>
	Camel (camel-imap-folder.c) in the mailer component for Evolution Data Server 1.11 allows remote IMAP servers to execute arbitrary code via a negative SEQUENCE value in GData, which is used as an array index.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 49ddc1710da25d618b1e7a9a8b2194b5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031358" comment="evolution-devel less than 2.0.4-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031359" comment="evolution-pilot less than 2.0.4-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031360" comment="evolution less than 2.0.4-0.8"/>
		</criteria>
	</criteria>
	<!-- f03ae653e5ae1dfedf20f17e01e266e1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031361" comment="evolution-devel less than 2.0.4-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031362" comment="evolution-pilot less than 2.0.4-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031363" comment="evolution less than 2.0.4-0.10"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3285</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-3285" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3285" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.5, when run on Windows, allows remote attackers to bypass file type checks and possibly execute programs via a (1) file:/// or (2) resource: URI with a dangerous extension, followed by a NULL byte (%00) and a safer extension, which causes Firefox to treat the requested file differently than Windows would.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 975911e840a1ef54b4b939009daa4a70 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031343" comment="MozillaFirefox-translations less than 1.5.0.12-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031344" comment="MozillaFirefox less than 1.5.0.12-0.3"/>
		</criteria>
	</criteria>
	<!-- d91b73c3c1e2666666b5dd6d36be8cbf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031345" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031346" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031347" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031348" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031349" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031350" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031351" comment="mozilla-lib64 less than 1.6-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031352" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031353" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031354" comment="mozilla less than 1.8_seamonkey_1.0.9-1.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3304</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-3304" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3304" source="CVE"/>
	<description>
	Apache httpd 1.3.37, 2.0.59, and 2.2.4 with the Prefork MPM module, allows local users to cause a denial of service by modifying the worker_score and process_score arrays to reference an arbitrary process ID, which is sent a SIGUSR1 signal from the master process, aka "SIGUSR1 killer."
	</description>
 </metadata>
<!-- a5b67777faf570a7e001c677784ac7c7 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030963" comment="libapr0 less than 2.0.59-1.4"/>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030964" comment="apache2-devel less than 2.0.59-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030965" comment="apache2-prefork less than 2.0.59-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030966" comment="apache2-worker less than 2.0.59-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030967" comment="apache2 less than 2.0.59-1.4"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3377</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-3377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3377" source="CVE"/>
	<description>
	Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.
	</description>
 </metadata>
<!-- a7dbc8f043cc91ce48289ac7a197a582 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031364" comment="perl-Net-DNS less than 0.46-27.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3382</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-3382" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3382" source="CVE"/>
	<description>
	Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 treats single quotes ("'") as delimiters in cookies, which might cause sensitive information such as session IDs to be leaked and allow remote attackers to conduct session hijacking attacks.
	</description>
 </metadata>
<!-- 315ff7a101fca9aabbfab11879f31212 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030636" comment="jakarta-tomcat less than 5.0.19-29.11"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3385</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-3385" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3385" source="CVE"/>
	<description>
	Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 does not properly handle the \" character sequence in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks.
	</description>
 </metadata>
<!-- 315ff7a101fca9aabbfab11879f31212 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030636" comment="jakarta-tomcat less than 5.0.19-29.11"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3387</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-3387" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387" source="CVE"/>
	<description>
	Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function.
	</description>
 </metadata>
<!-- 16009a293ca600db0c864de5b3fab847 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031365" comment="cups-client less than 1.1.20-108.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031366" comment="cups-devel less than 1.1.20-108.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031367" comment="cups-libs-32bit less than 9-200708071552"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031368" comment="cups-libs less than 1.1.20-108.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031369" comment="cups less than 1.1.20-108.41"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3388</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-3388" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3388" source="CVE"/>
	<description>
	Multiple format string vulnerabilities in (1) qtextedit.cpp, (2) qdatatable.cpp, (3) qsqldatabase.cpp, (4) qsqlindex.cpp, (5) qsqlrecord.cpp, (6) qglobal.cpp, and (7) qsvgdevice.cpp in QTextEdit in Trolltech Qt 3 before 3.3.8 20070727 allow remote attackers to execute arbitrary code via format string specifiers in text used to compose an error message.
	</description>
 </metadata>
<!-- eac35f375ac5bb22efa8b828b221e0bf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031370" comment="qt3-32bit less than 9-200707170221"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031371" comment="qt3-devel-32bit less than 9-200707170221"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031372" comment="qt3-devel less than 3.3.1-36.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031373" comment="qt3-non-mt less than 3.3.1-41.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031374" comment="qt3 less than 3.3.1-36.29"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3389</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-3389" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3389" source="CVE"/>
	<description>
	Wireshark before 0.99.6 allows remote attackers to cause a denial of service (crash) via a crafted chunked encoding in an HTTP response, possibly related to a zero-length payload.
	</description>
 </metadata>
<!-- 254e16f8849045414f4aad7942b25e58 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031375" comment="ethereal less than 0.10.13-2.27"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3390</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-3390" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3390" source="CVE"/>
	<description>
	Wireshark 0.99.5 and 0.10.x up to 0.10.14, when running on certain systems, allows remote attackers to cause a denial of service (crash) via crafted iSeries capture files that trigger a SIGTRAP.
	</description>
 </metadata>
<!-- 254e16f8849045414f4aad7942b25e58 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031375" comment="ethereal less than 0.10.13-2.27"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3391</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-3391" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3391" source="CVE"/>
	<description>
	Wireshark 0.99.5 allows remote attackers to cause a denial of service (memory consumption) via a malformed DCP ETSI packet that triggers an infinite loop.
	</description>
 </metadata>
<!-- 254e16f8849045414f4aad7942b25e58 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031375" comment="ethereal less than 0.10.13-2.27"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3392</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-3392" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3392" source="CVE"/>
	<description>
	Wireshark before 0.99.6 allows remote attackers to cause a denial of service via malformed (1) SSL or (2) MMS packets that trigger an infinite loop.
	</description>
 </metadata>
<!-- 254e16f8849045414f4aad7942b25e58 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031375" comment="ethereal less than 0.10.13-2.27"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3393</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-3393" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3393" source="CVE"/>
	<description>
	Off-by-one error in the DHCP/BOOTP dissector in Wireshark before 0.99.6 allows remote attackers to cause a denial of service (crash) via crafted DHCP-over-DOCSIS packets.
	</description>
 </metadata>
<!-- 254e16f8849045414f4aad7942b25e58 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031375" comment="ethereal less than 0.10.13-2.27"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3409</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-3409" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3409" source="CVE"/>
	<description>
	Net::DNS before 0.60, a Perl module, allows remote attackers to cause a denial of service (stack consumption) via a malformed compressed DNS packet with self-referencing pointers, which triggers an infinite loop.
	</description>
 </metadata>
<!-- a7dbc8f043cc91ce48289ac7a197a582 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031364" comment="perl-Net-DNS less than 0.46-27.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3456</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-3456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3456" source="CVE"/>
	<description>
	Integer overflow in Adobe Flash Player 9.0.45.0 and earlier might allow remote attackers to execute arbitrary code via a large length value for a (1) Long string or (2) XML variable type in a crafted (a) FLV or (b) SWF file, related to an "input validation error," including a signed comparison of values that are assumed to be non-negative.
	</description>
 </metadata>
<!-- 11185d1d77c266319dacb704d254fd94 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031254" comment="flash-player less than 7.0.70.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3457</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-3457" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3457" source="CVE"/>
	<description>
	Adobe Flash Player 8.0.34.0 and earlier insufficiently validates HTTP Referer headers, which might allow remote attackers to conduct a CSRF attack via a crafted SWF file.
	</description>
 </metadata>
<!-- 11185d1d77c266319dacb704d254fd94 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031254" comment="flash-player less than 7.0.70.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3511</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-3511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3511" source="CVE"/>
	<description>
	The focus handling for the onkeydown event in Mozilla Firefox 1.5.0.12, 2.0.0.4 and other versions before 2.0.0.8, and SeaMonkey before 1.1.5 allows remote attackers to change field focus and copy keystrokes via the "for" attribute in a label, which bypasses the focus prevention, as demonstrated by changing focus from a textarea to a file upload field.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 94e7e87449ed25841acaf9b535567347 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030840" comment="MozillaFirefox-translations less than 1.5.0.12-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030841" comment="MozillaFirefox less than 1.5.0.12-0.5"/>
		</criteria>
	</criteria>
	<!-- bc8dbb4aea45ba7fac544f7e63f7898b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030842" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030843" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030844" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030845" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030846" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030847" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030848" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030849" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030850" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030851" comment="mozilla less than 1.8_seamonkey_1.0.9-1.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3656</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-3656" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3656" source="CVE"/>
	<description>
	Mozilla Firefox before 1.8.0.13 and 1.8.1.x before 1.8.1.5 does not perform a security zone check when processing a wyciwyg URI, which allows remote attackers to obtain sensitive information, poison the browser cache, and possibly enable further attack vectors via (1) HTTP 302 redirect controls, (2) XMLHttpRequest, or (3) view-source URIs.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 975911e840a1ef54b4b939009daa4a70 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031343" comment="MozillaFirefox-translations less than 1.5.0.12-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031344" comment="MozillaFirefox less than 1.5.0.12-0.3"/>
		</criteria>
	</criteria>
	<!-- d91b73c3c1e2666666b5dd6d36be8cbf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031345" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031346" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031347" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031348" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031349" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031350" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031351" comment="mozilla-lib64 less than 1.6-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031352" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031353" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031354" comment="mozilla less than 1.8_seamonkey_1.0.9-1.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3670</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-3670" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3670" source="CVE"/>
	<description>
	Argument injection vulnerability in Microsoft Internet Explorer, when running on systems with Firefox installed and certain URIs registered, allows remote attackers to conduct cross-browser scripting attacks and execute arbitrary commands via shell metacharacters in a (1) FirefoxURL or (2) FirefoxHTML URI, which are inserted into the command line that is created when invoking firefox.exe.  NOTE: it has been debated as to whether the issue is in Internet Explorer or Firefox. As of 20070711, it is CVE's opinion that IE appears to be failing to properly delimit the URL argument when invoking Firefox, and this issue could arise with other protocol handlers in IE as well. However, Mozilla has stated that it will address the issue with a "defense in depth" fix that will "prevent IE from sending Firefox malicious data."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 975911e840a1ef54b4b939009daa4a70 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031343" comment="MozillaFirefox-translations less than 1.5.0.12-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031344" comment="MozillaFirefox less than 1.5.0.12-0.3"/>
		</criteria>
	</criteria>
	<!-- d91b73c3c1e2666666b5dd6d36be8cbf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031345" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031346" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031347" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031348" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031349" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031350" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031351" comment="mozilla-lib64 less than 1.6-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031352" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031353" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031354" comment="mozilla less than 1.8_seamonkey_1.0.9-1.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3734</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-3734" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3734" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 2.0.0.5 and Thunderbird before 2.0.0.5 allow remote attackers to cause a denial of service (crash) via unspecified vectors that trigger memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 975911e840a1ef54b4b939009daa4a70 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031343" comment="MozillaFirefox-translations less than 1.5.0.12-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031344" comment="MozillaFirefox less than 1.5.0.12-0.3"/>
		</criteria>
	</criteria>
	<!-- d91b73c3c1e2666666b5dd6d36be8cbf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031345" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031346" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031347" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031348" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031349" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031350" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031351" comment="mozilla-lib64 less than 1.6-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031352" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031353" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031354" comment="mozilla less than 1.8_seamonkey_1.0.9-1.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3735</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-3735" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3735" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox before 2.0.0.5 and Thunderbird before 2.0.0.5 allow remote attackers to cause a denial of service (crash) via unspecified vectors that trigger memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 975911e840a1ef54b4b939009daa4a70 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031343" comment="MozillaFirefox-translations less than 1.5.0.12-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031344" comment="MozillaFirefox less than 1.5.0.12-0.3"/>
		</criteria>
	</criteria>
	<!-- d91b73c3c1e2666666b5dd6d36be8cbf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031345" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031346" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031347" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031348" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031349" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031350" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031351" comment="mozilla-lib64 less than 1.6-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031352" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031353" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031354" comment="mozilla less than 1.8_seamonkey_1.0.9-1.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3736</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-3736" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3736" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 2.0.0.5 allows remote attackers to inject arbitrary web script "into another site's context" via a "timing issue" involving the (1) addEventListener or (2) setTimeout function, probably by setting events that activate after the context has changed.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 975911e840a1ef54b4b939009daa4a70 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031343" comment="MozillaFirefox-translations less than 1.5.0.12-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031344" comment="MozillaFirefox less than 1.5.0.12-0.3"/>
		</criteria>
	</criteria>
	<!-- d91b73c3c1e2666666b5dd6d36be8cbf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031345" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031346" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031347" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031348" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031349" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031350" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031351" comment="mozilla-lib64 less than 1.6-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031352" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031353" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031354" comment="mozilla less than 1.8_seamonkey_1.0.9-1.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3737</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-3737" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3737" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.5 allows remote attackers to execute arbitrary code with chrome privileges by calling an event handler from an unspecified "element outside of a document."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 975911e840a1ef54b4b939009daa4a70 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031343" comment="MozillaFirefox-translations less than 1.5.0.12-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031344" comment="MozillaFirefox less than 1.5.0.12-0.3"/>
		</criteria>
	</criteria>
	<!-- d91b73c3c1e2666666b5dd6d36be8cbf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031345" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031346" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031347" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031348" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031349" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031350" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031351" comment="mozilla-lib64 less than 1.6-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031352" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031353" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031354" comment="mozilla less than 1.8_seamonkey_1.0.9-1.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3738</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-3738" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3738" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.5 allow remote attackers to execute arbitrary code via a crafted XPCNativeWrapper.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 975911e840a1ef54b4b939009daa4a70 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031343" comment="MozillaFirefox-translations less than 1.5.0.12-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031344" comment="MozillaFirefox less than 1.5.0.12-0.3"/>
		</criteria>
	</criteria>
	<!-- d91b73c3c1e2666666b5dd6d36be8cbf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031345" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031346" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031347" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031348" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031349" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031350" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031351" comment="mozilla-lib64 less than 1.6-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031352" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031353" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031354" comment="mozilla less than 1.8_seamonkey_1.0.9-1.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3798</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-3798" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3798" source="CVE"/>
	<description>
	Integer overflow in print-bgp.c in the BGP dissector in tcpdump 3.9.6 and earlier allows remote attackers to execute arbitrary code via crafted TLVs in a BGP packet, related to an unchecked return value.
	</description>
 </metadata>
<!-- cb0a4294e031a1d8cbe15085dd6e88eb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031376" comment="tcpdump less than 3.8.1-49.10"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3844</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-3844" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3844" source="CVE"/>
	<description>
	Mozilla Firefox 2.0.0.5, Thunderbird 2.0.0.5 and before 1.5.0.13, and SeaMonkey 1.1.3 allows remote attackers to conduct cross-site scripting (XSS) attacks with chrome privileges via an addon that inserts a (1) javascript: or (2) data: link into an about:blank document loaded by chrome via (a) the window.open function or (b) a content.location assignment, aka "Cross Context Scripting." NOTE: this issue is caused by a CVE-2007-3089 regression.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 94e7e87449ed25841acaf9b535567347 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030840" comment="MozillaFirefox-translations less than 1.5.0.12-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030841" comment="MozillaFirefox less than 1.5.0.12-0.5"/>
		</criteria>
	</criteria>
	<!-- bc8dbb4aea45ba7fac544f7e63f7898b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030842" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030843" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030844" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030845" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030846" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030847" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030848" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030849" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030850" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030851" comment="mozilla less than 1.8_seamonkey_1.0.9-1.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3845</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-3845" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3845" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.6, Thunderbird before 1.5.0.13 and 2.x before 2.0.0.6, and SeaMonkey before 1.1.4 allow remote attackers to execute arbitrary commands via certain vectors associated with launching "a file handling program based on the file extension at the end of the URI," a variant of CVE-2007-4041.  NOTE: the vendor states that "it is still possible to launch a filetype handler based on extension rather than the registered protocol handler."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 94e7e87449ed25841acaf9b535567347 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030840" comment="MozillaFirefox-translations less than 1.5.0.12-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030841" comment="MozillaFirefox less than 1.5.0.12-0.5"/>
		</criteria>
	</criteria>
	<!-- bc8dbb4aea45ba7fac544f7e63f7898b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030842" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030843" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030844" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030845" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030846" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030847" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030848" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030849" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030850" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030851" comment="mozilla less than 1.8_seamonkey_1.0.9-1.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3847</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-3847" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3847" source="CVE"/>
	<description>
	The date handling code in modules/proxy/proxy_util.c (mod_proxy) in Apache 2.3.0, when using a threaded MPM, allows remote origin servers to cause a denial of service (caching forward proxy process crash) via crafted date headers that trigger a buffer over-read.
	</description>
 </metadata>
<!-- a5b67777faf570a7e001c677784ac7c7 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030963" comment="libapr0 less than 2.0.59-1.4"/>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030964" comment="apache2-devel less than 2.0.59-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030965" comment="apache2-prefork less than 2.0.59-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030966" comment="apache2-worker less than 2.0.59-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030967" comment="apache2 less than 2.0.59-1.4"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3848</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-3848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3848" source="CVE"/>
	<description>
	Linux kernel 2.4.35 and other versions allows local users to send arbitrary signals to a child process that is running at higher privileges by causing a setuid-root parent process to die, which delivers an attacker-controlled parent process death signal (PR_SET_PDEATHSIG).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 353a84ed7b2f4d437e90169112757674 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031285" comment="kernel-bigsmp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031287" comment="kernel-smp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- 615785e3ad7b9994c5088545f0cfc2b5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031287" comment="kernel-smp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- aab836528f99df07c43db5dd38e62ad0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031377" comment="kernel-bigsmp less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031378" comment="kernel-default less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031379" comment="kernel-smp less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031380" comment="kernel-source less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031381" comment="kernel-syms less than 2.6.5-7.311"/>
		</criteria>
	</criteria>
	<!-- b6d5f6e00bbd43399d33b9d8b687ee37 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031378" comment="kernel-default less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031379" comment="kernel-smp less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031380" comment="kernel-source less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031381" comment="kernel-syms less than 2.6.5-7.311"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3996</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-3996" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3996" source="CVE"/>
	<description>
	Multiple integer overflows in libgd in PHP before 5.2.4 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large (1) srcW or (2) srcH value to the (a) gdImageCopyResized function, or a large (3) sy (height) or (4) sx (width) value to the (b) gdImageCreate or the (c) gdImageCreateTrueColor function.
	</description>
 </metadata>
<!-- f1255e10262bd8b24adcb137ab61417e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031048" comment="mod_php4-core less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031049" comment="php4-bcmath less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031050" comment="php4-bz2 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031051" comment="php4-calendar less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031052" comment="php4-ctype less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031053" comment="php4-curl less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031054" comment="php4-dba less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031055" comment="php4-dbase less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031056" comment="php4-devel less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031057" comment="php4-domxml less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031058" comment="php4-exif less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031059" comment="php4-fastcgi less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031060" comment="php4-filepro less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031061" comment="php4-ftp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031062" comment="php4-gd less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031063" comment="php4-gettext less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031064" comment="php4-gmp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031065" comment="php4-iconv less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031066" comment="php4-imap less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031067" comment="php4-ldap less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031068" comment="php4-mbstring less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031069" comment="php4-mcal less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031070" comment="php4-mcrypt less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031071" comment="php4-mhash less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031072" comment="php4-mime_magic less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031073" comment="php4-mysql less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031074" comment="php4-pear less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031075" comment="php4-pgsql less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031076" comment="php4-qtdom less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031077" comment="php4-readline less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031078" comment="php4-recode less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031079" comment="php4-servlet less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031080" comment="php4-session less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031081" comment="php4-shmop less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031082" comment="php4-snmp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031083" comment="php4-sockets less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031084" comment="php4-swf less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031085" comment="php4-sysvsem less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031086" comment="php4-sysvshm less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031087" comment="php4-unixODBC less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031088" comment="php4-wddx less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031089" comment="php4-xslt less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031090" comment="php4-yp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031091" comment="php4-zlib less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031092" comment="php4 less than 4.3.4-43.85"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3998</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-3998" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3998" source="CVE"/>
	<description>
	The wordwrap function in PHP 4 before 4.4.8, and PHP 5 before 5.2.4, does not properly use the breakcharlen variable, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash, or infinite loop) via certain arguments, as demonstrated by a 'chr(0), 0, ""' argument set.
	</description>
 </metadata>
<!-- f1255e10262bd8b24adcb137ab61417e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031048" comment="mod_php4-core less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031049" comment="php4-bcmath less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031050" comment="php4-bz2 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031051" comment="php4-calendar less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031052" comment="php4-ctype less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031053" comment="php4-curl less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031054" comment="php4-dba less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031055" comment="php4-dbase less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031056" comment="php4-devel less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031057" comment="php4-domxml less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031058" comment="php4-exif less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031059" comment="php4-fastcgi less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031060" comment="php4-filepro less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031061" comment="php4-ftp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031062" comment="php4-gd less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031063" comment="php4-gettext less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031064" comment="php4-gmp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031065" comment="php4-iconv less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031066" comment="php4-imap less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031067" comment="php4-ldap less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031068" comment="php4-mbstring less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031069" comment="php4-mcal less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031070" comment="php4-mcrypt less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031071" comment="php4-mhash less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031072" comment="php4-mime_magic less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031073" comment="php4-mysql less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031074" comment="php4-pear less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031075" comment="php4-pgsql less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031076" comment="php4-qtdom less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031077" comment="php4-readline less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031078" comment="php4-recode less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031079" comment="php4-servlet less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031080" comment="php4-session less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031081" comment="php4-shmop less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031082" comment="php4-snmp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031083" comment="php4-sockets less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031084" comment="php4-swf less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031085" comment="php4-sysvsem less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031086" comment="php4-sysvshm less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031087" comment="php4-unixODBC less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031088" comment="php4-wddx less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031089" comment="php4-xslt less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031090" comment="php4-yp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031091" comment="php4-zlib less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031092" comment="php4 less than 4.3.4-43.85"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4029</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-4029" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4029" source="CVE"/>
	<description>
	libvorbis 1.1.2, and possibly other versions before 1.2.0, allows context-dependent attackers to cause a denial of service via (1) an invalid mapping type, which triggers an out-of-bounds read in the vorbis_info_clear function in info.c, and (2) invalid blocksize values that trigger a segmentation fault in the read function in block.c.
	</description>
 </metadata>
<!-- e1de20bb0558a2ef6763e74cbebc9de3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031382" comment="libvorbis-32bit less than 9-200710221440"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031383" comment="libvorbis-devel less than 1.0.1-56.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031384" comment="libvorbis less than 1.0.1-56.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4033</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-4033" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4033" source="CVE"/>
	<description>
	Buffer overflow in the intT1_EnvGetCompletePath function in lib/t1lib/t1env.c in t1lib 5.1.1 allows context-dependent attackers to execute arbitrary code via a long FileName parameter.  NOTE: this issue was originally reported to be in the imagepsloadfont function in php_gd2.dll in the gd (PHP_GD2) extension in PHP 5.2.3.
	</description>
 </metadata>
<!-- b97ae6426accea9a0d680150de023a25 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031385" comment="t1lib-devel less than 1.3.1-569.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031386" comment="t1lib less than 1.3.1-569.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4065</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-4065" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4065" source="CVE"/>
	<description>
	lib/vorbisfile.c in libvorbisfile in Xiph.Org libvorbis before 1.2.0 allows context-dependent attackers to cause a denial of service (infinite loop) via a crafted OGG file, aka trac Changeset 13217.
	</description>
 </metadata>
<!-- e1de20bb0558a2ef6763e74cbebc9de3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031382" comment="libvorbis-32bit less than 9-200710221440"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031383" comment="libvorbis-devel less than 1.0.1-56.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031384" comment="libvorbis less than 1.0.1-56.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4066</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-4066" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4066" source="CVE"/>
	<description>
	Multiple buffer overflows in Xiph.Org libvorbis before 1.2.0 allow context-dependent attackers to cause a denial of service or have other unspecified impact via a crafted OGG file, aka trac Changesets 13162, 13168, 13169, 13170, 13172, 13211, and 13215, as demonstrated by an overflow in oggenc.exe related to the _psy_noiseguards_8 array.
	</description>
 </metadata>
<!-- e1de20bb0558a2ef6763e74cbebc9de3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031382" comment="libvorbis-32bit less than 9-200710221440"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031383" comment="libvorbis-devel less than 1.0.1-56.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031384" comment="libvorbis less than 1.0.1-56.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4091</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-4091" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4091" source="CVE"/>
	<description>
	Multiple off-by-one errors in the sender.c in rsync 2.6.9 might allow remote attackers to execute arbitrary code via directory names that are not properly handled when calling the f_name function.
	</description>
 </metadata>
<!-- 3e5d0b448dcfa1c79607fd3bf6cf58f4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031387" comment="rsync less than 2.6.2-8.23.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4131</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-4131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4131" source="CVE"/>
	<description>
	Directory traversal vulnerability in the contains_dot_dot function in src/names.c in GNU tar allows user-assisted remote attackers to overwrite arbitrary files via certain //.. (slash slash dot dot) sequences in directory symlinks in a TAR archive.
	</description>
 </metadata>
<!-- 2506227b7bd914b11632b5701384104a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030401" comment="tar less than 1.13.25-325.10"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4137</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-4137" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4137" source="CVE"/>
	<description>
	Off-by-one error in the QUtf8Decoder::toUnicode function in Trolltech Qt 3 allows context-dependent attackers to cause a denial of service (crash) via a crafted Unicode string that triggers a heap-based buffer overflow.  NOTE: Qt 4 has the same error in the QUtf8Codec::convertToUnicode function, but it is not exploitable.
	</description>
 </metadata>
<!-- e953098cefc9c539cc1334bb9447cb0a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031388" comment="qt3-32bit less than 9-200709191359"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031389" comment="qt3-devel-32bit less than 9-200709191359"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031390" comment="qt3-devel-doc less than 3.3.1-36.31"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031391" comment="qt3-devel-tools less than 3.3.1-35.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031392" comment="qt3-devel less than 3.3.1-36.31"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031393" comment="qt3-non-mt less than 3.3.1-41.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031394" comment="qt3 less than 3.3.1-36.31"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4224</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-4224" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4224" source="CVE"/>
	<description>
	KDE Konqueror 3.5.7 allows remote attackers to spoof the URL address bar by calling setInterval with a small interval and changing the window.location property.
	</description>
 </metadata>
<!-- 8218149bb971b488abdce21b4d34da2e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031395" comment="kdelibs3-32bit less than 9-200709251619"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031396" comment="kdelibs3-devel-doc less than 3.2.1-44.71.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031397" comment="kdelibs3-devel less than 3.2.1-44.71.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031398" comment="kdelibs3 less than 3.2.1-44.71.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4308</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-4308" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4308" source="CVE"/>
	<description>
	The (1) aac_cfg_open and (2) aac_compat_ioctl functions in the SCSI layer ioctl path in aacraid in the Linux kernel before 2.6.23-rc2 do not check permissions for ioctls, which might allow local users to cause a denial of service or gain privileges.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- aab836528f99df07c43db5dd38e62ad0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031377" comment="kernel-bigsmp less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031378" comment="kernel-default less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031379" comment="kernel-smp less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031380" comment="kernel-source less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031381" comment="kernel-syms less than 2.6.5-7.311"/>
		</criteria>
	</criteria>
	<!-- b6d5f6e00bbd43399d33b9d8b687ee37 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031378" comment="kernel-default less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031379" comment="kernel-smp less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031380" comment="kernel-source less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031381" comment="kernel-syms less than 2.6.5-7.311"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4324</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-4324" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4324" source="CVE"/>
	<description>
	ActionScript 3 (AS3) in Adobe Flash Player 9.0.47.0, and other versions and other 9.0.124.0 and earlier versions, allows remote attackers to bypass the Security Sandbox Model, obtain sensitive information, and port scan arbitrary hosts via a Flash (SWF) movie that specifies a connection to make, then uses timing discrepancies from the SecurityErrorEvent error to determine whether a port is open or not.  NOTE: 9.0.115.0 introduces support for a workaround, but does not fix the vulnerability.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- abac03d3ea3f90145ddbc82fdd20aebd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031399" comment="flash-player less than 9.0.48.0-4.4"/>
	</criteria>
	<!-- da23b892b7b8f9906bc126fad5902356 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031400" comment="flash-player less than 9.0.115.0-0.2"/>
	</criteria>
	<!-- edd13d7bde2f2ca4007725ec6281d6bd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031401" comment="flash-player less than 9.0.151.0-0.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4352</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-4352" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4352" source="CVE"/>
	<description>
	Array index error in the DCTStream::readProgressiveDataUnit method in xpdf/Stream.cc in Xpdf 3.02pl1, as used in poppler, teTeX, KDE, KOffice, CUPS, and other products, allows remote attackers to trigger memory corruption and execute arbitrary code via a crafted PDF file.
	</description>
 </metadata>
<!-- f83e024a65d69ebc810d2117815b940d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031402" comment="cups-client less than 1.1.20-108.44"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031403" comment="cups-devel less than 1.1.20-108.44"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031404" comment="cups-libs-32bit less than 9-200711080439"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031405" comment="cups-libs less than 1.1.20-108.44"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031406" comment="cups less than 1.1.20-108.44"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4394</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-4394" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4394" source="CVE"/>
	<description>
	Unspecified vulnerability in a "core clean" cron job created by the findutils-locate package on SUSE Linux 10.0 and 10.1 and Enterprise Server 9 and 10 before 20070810 allows local users to delete of arbitrary files via unknown vectors.
	</description>
 </metadata>
<!-- 2b7ce958bc22c722e60a72673ad2f50b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031407" comment="findutils-locate less than 4.1.7-860.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4460</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-4460" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4460" source="CVE"/>
	<description>
	The RenderV2ToFile function in tag_file.cpp in id3lib (aka libid3) 3.8.3 allows local users to overwrite arbitrary files via a symlink attack on a temporary file whose name is constructed from the name of a file being tagged.
	</description>
 </metadata>
<!-- a7900f71ab69d5511012653b1457c53a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031408" comment="id3lib-devel less than 3.8.3-86.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031409" comment="id3lib-examples less than 3.8.3-86.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031410" comment="id3lib less than 3.8.3-86.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4465</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-4465" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4465" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in mod_autoindex.c in the Apache HTTP Server before 2.2.6, when the charset on a server-generated page is not defined, allows remote attackers to inject arbitrary web script or HTML via the P parameter using the UTF-7 charset.  NOTE: it could be argued that this issue is due to a design limitation of browsers that attempt to perform automatic content type detection.
	</description>
 </metadata>
<!-- a5b67777faf570a7e001c677784ac7c7 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030963" comment="libapr0 less than 2.0.59-1.4"/>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030964" comment="apache2-devel less than 2.0.59-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030965" comment="apache2-prefork less than 2.0.59-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030966" comment="apache2-worker less than 2.0.59-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030967" comment="apache2 less than 2.0.59-1.4"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4476</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-4476" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4476" source="CVE"/>
	<description>
	Buffer overflow in the safer_name_suffix function in GNU tar has unspecified attack vectors and impact, resulting in a "crashing stack."
	</description>
 </metadata>
<!-- 96b722df6f467f951ea7e8580a0fc612 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031411" comment="cpio less than 2.5-324.15.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4565</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-4565" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4565" source="CVE"/>
	<description>
	sink.c in fetchmail before 6.3.9 allows context-dependent attackers to cause a denial of service (NULL dereference and application crash) by refusing certain warning messages that are sent over SMTP.
	</description>
 </metadata>
<!-- b648a8bc16c65f5f2ec8b36c5886aa3b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031412" comment="fetchmail less than 6.2.5-49.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031413" comment="fetchmailconf less than 6.2.5-49.17"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4571</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-4571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4571" source="CVE"/>
	<description>
	The snd_mem_proc_read function in sound/core/memalloc.c in the Advanced Linux Sound Architecture (ALSA) in the Linux kernel before 2.6.22.8 does not return the correct write size, which allows local users to obtain sensitive information (kernel memory contents) via a small count argument, as demonstrated by multiple reads of /proc/driver/snd-page-alloc.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 353a84ed7b2f4d437e90169112757674 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031285" comment="kernel-bigsmp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031287" comment="kernel-smp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- 615785e3ad7b9994c5088545f0cfc2b5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031287" comment="kernel-smp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4572</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-4572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4572" source="CVE"/>
	<description>
	Stack-based buffer overflow in nmbd in Samba 3.0.0 through 3.0.26a, when configured as a Primary or Backup Domain controller, allows remote attackers to have an unknown impact via crafted GETDC mailslot requests, related to handling of GETDC logon server requests.
	</description>
 </metadata>
<!-- a8a615405c62005f443b3e34d922d381 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031414" comment="ldapsmb less than 1.33-6.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031415" comment="libsmbclient-32bit less than 9-200711231829"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031416" comment="libsmbclient-devel less than 3.0.20b-3.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031417" comment="libsmbclient less than 3.0.20b-3.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031418" comment="samba-32bit less than 9-200711231829"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031419" comment="samba-client-32bit less than 9-200711231829"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031420" comment="samba-client less than 3.0.20b-3.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031421" comment="samba-doc less than 3.0.20b-3.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031422" comment="samba-pdb less than 3.0.20b-3.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031423" comment="samba-python less than 3.0.20b-3.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031424" comment="samba-vscan less than 0.3.6b-0.26.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031425" comment="samba-winbind-32bit less than 9-200711231829"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031426" comment="samba-winbind less than 3.0.20b-3.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031427" comment="samba less than 3.0.20b-3.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4573</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-4573" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4573" source="CVE"/>
	<description>
	The IA32 system call emulation functionality in Linux kernel 2.4.x and 2.6.x before 2.6.22.7, when running on the x86_64 architecture, does not zero extend the eax register after the 32bit entry path to ptrace is used, which might allow local users to gain privileges by triggering an out-of-bounds access to the system call table using the %RAX register.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 353a84ed7b2f4d437e90169112757674 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031285" comment="kernel-bigsmp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031287" comment="kernel-smp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- 615785e3ad7b9994c5088545f0cfc2b5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031287" comment="kernel-smp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4619</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-4619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4619" source="CVE"/>
	<description>
	Multiple integer overflows in Free Lossless Audio Codec (FLAC) libFLAC before 1.2.1, as used in Winamp before 5.5 and other products, allow user-assisted remote attackers to execute arbitrary code via a malformed FLAC file that triggers improper memory allocation, resulting in a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 68c46df4dfedb4dfc618cd7476f1b446 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031428" comment="flac-32bit less than 9-200710182357"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031429" comment="flac-devel less than 1.1.0-387.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031430" comment="flac less than 1.1.0-387.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4658</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-4658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4658" source="CVE"/>
	<description>
	The money_format function in PHP 5 before 5.2.4, and PHP 4 before 4.4.8, permits multiple (1) %i and (2) %n tokens, which has unknown impact and attack vectors, possibly related to a format string vulnerability.
	</description>
 </metadata>
<!-- f1255e10262bd8b24adcb137ab61417e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031048" comment="mod_php4-core less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031049" comment="php4-bcmath less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031050" comment="php4-bz2 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031051" comment="php4-calendar less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031052" comment="php4-ctype less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031053" comment="php4-curl less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031054" comment="php4-dba less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031055" comment="php4-dbase less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031056" comment="php4-devel less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031057" comment="php4-domxml less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031058" comment="php4-exif less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031059" comment="php4-fastcgi less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031060" comment="php4-filepro less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031061" comment="php4-ftp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031062" comment="php4-gd less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031063" comment="php4-gettext less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031064" comment="php4-gmp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031065" comment="php4-iconv less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031066" comment="php4-imap less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031067" comment="php4-ldap less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031068" comment="php4-mbstring less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031069" comment="php4-mcal less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031070" comment="php4-mcrypt less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031071" comment="php4-mhash less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031072" comment="php4-mime_magic less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031073" comment="php4-mysql less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031074" comment="php4-pear less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031075" comment="php4-pgsql less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031076" comment="php4-qtdom less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031077" comment="php4-readline less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031078" comment="php4-recode less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031079" comment="php4-servlet less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031080" comment="php4-session less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031081" comment="php4-shmop less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031082" comment="php4-snmp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031083" comment="php4-sockets less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031084" comment="php4-swf less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031085" comment="php4-sysvsem less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031086" comment="php4-sysvshm less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031087" comment="php4-unixODBC less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031088" comment="php4-wddx less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031089" comment="php4-xslt less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031090" comment="php4-yp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031091" comment="php4-zlib less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031092" comment="php4 less than 4.3.4-43.85"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4661</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-4661" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4661" source="CVE"/>
	<description>
	The chunk_split function in string.c in PHP 5.2.3 does not properly calculate the needed buffer size due to precision loss when performing integer arithmetic with floating point numbers, which has unknown attack vectors and impact, possibly resulting in a heap-based buffer overflow.  NOTE: this is due to an incomplete fix for CVE-2007-2872.
	</description>
 </metadata>
<!-- f1255e10262bd8b24adcb137ab61417e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031048" comment="mod_php4-core less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031049" comment="php4-bcmath less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031050" comment="php4-bz2 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031051" comment="php4-calendar less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031052" comment="php4-ctype less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031053" comment="php4-curl less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031054" comment="php4-dba less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031055" comment="php4-dbase less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031056" comment="php4-devel less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031057" comment="php4-domxml less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031058" comment="php4-exif less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031059" comment="php4-fastcgi less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031060" comment="php4-filepro less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031061" comment="php4-ftp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031062" comment="php4-gd less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031063" comment="php4-gettext less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031064" comment="php4-gmp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031065" comment="php4-iconv less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031066" comment="php4-imap less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031067" comment="php4-ldap less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031068" comment="php4-mbstring less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031069" comment="php4-mcal less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031070" comment="php4-mcrypt less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031071" comment="php4-mhash less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031072" comment="php4-mime_magic less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031073" comment="php4-mysql less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031074" comment="php4-pear less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031075" comment="php4-pgsql less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031076" comment="php4-qtdom less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031077" comment="php4-readline less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031078" comment="php4-recode less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031079" comment="php4-servlet less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031080" comment="php4-session less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031081" comment="php4-shmop less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031082" comment="php4-snmp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031083" comment="php4-sockets less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031084" comment="php4-swf less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031085" comment="php4-sysvsem less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031086" comment="php4-sysvshm less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031087" comment="php4-unixODBC less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031088" comment="php4-wddx less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031089" comment="php4-xslt less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031090" comment="php4-yp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031091" comment="php4-zlib less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031092" comment="php4 less than 4.3.4-43.85"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4752</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-4752" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4752" source="CVE"/>
	<description>
	ssh in OpenSSH before 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted X11 cookie instead, which allows attackers to violate intended policy and gain privileges by causing an X client to be treated as trusted.
	</description>
 </metadata>
<!-- 6b2d209e0f58a6056558133b78463be9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031431" comment="openssh-askpass less than 4.1p1-11.40"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031432" comment="openssh less than 4.1p1-11.40"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4768</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-4768" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4768" source="CVE"/>
	<description>
	Heap-based buffer overflow in Perl-Compatible Regular Expression (PCRE) library before 7.3 allows context-dependent attackers to execute arbitrary code via a singleton Unicode sequence in a character class in a regex pattern, which is incorrectly optimized.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- abac03d3ea3f90145ddbc82fdd20aebd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031399" comment="flash-player less than 9.0.48.0-4.4"/>
	</criteria>
	<!-- da23b892b7b8f9906bc126fad5902356 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031400" comment="flash-player less than 9.0.115.0-0.2"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4769</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-4769" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4769" source="CVE"/>
	<description>
	The regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows remote authenticated users to cause a denial of service (backend crash) via an out-of-bounds backref number.
	</description>
 </metadata>
<!-- b923c74e6ff969e6dca94231c2d4e667 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031433" comment="postgresql-contrib less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031434" comment="postgresql-devel less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031435" comment="postgresql-docs less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031436" comment="postgresql-libs-32bit less than 9-200801312100"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031437" comment="postgresql-libs less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031438" comment="postgresql-pl less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031439" comment="postgresql-server less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031440" comment="postgresql less than 7.4.19-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4770</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-4770" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4770" source="CVE"/>
	<description>
	libicu in International Components for Unicode (ICU) 3.8.1 and earlier attempts to process backreferences to the nonexistent capture group zero (aka \0), which might allow context-dependent attackers to read from, or write to, out-of-bounds memory locations, related to corruption of REStackFrames.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 08168f6330c0bb39905acabed49fa491 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009031441" comment="icu-data less than 2.6.2-2.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031442" comment="icu-i18ndata less than 2.6.2-2.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031443" comment="icu less than 2.6.2-2.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031444" comment="libicu-devel less than 2.6.2-2.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031445" comment="libicu26-32bit less than 9-200802280045"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031446" comment="libicu26 less than 2.6.2-2.9"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009031441" comment="icu-data less than 2.6.2-2.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031442" comment="icu-i18ndata less than 2.6.2-2.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031443" comment="icu less than 2.6.2-2.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031444" comment="libicu-devel less than 2.6.2-2.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031446" comment="libicu26 less than 2.6.2-2.9"/>
			</criteria>
		</criteria></criteria>
	<!-- f6a476d94870d717c3a93c69ce56d196 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031447" comment="OpenOffice_org-ar less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031448" comment="OpenOffice_org-ca less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031449" comment="OpenOffice_org-cs less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031450" comment="OpenOffice_org-da less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031451" comment="OpenOffice_org-de less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031452" comment="OpenOffice_org-el less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031453" comment="OpenOffice_org-en-help less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031454" comment="OpenOffice_org-en less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031455" comment="OpenOffice_org-es less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031456" comment="OpenOffice_org-et less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031457" comment="OpenOffice_org-fi less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031458" comment="OpenOffice_org-fr less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031459" comment="OpenOffice_org-gnome less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031460" comment="OpenOffice_org-hu less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031461" comment="OpenOffice_org-it less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031462" comment="OpenOffice_org-ja less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031463" comment="OpenOffice_org-kde less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031464" comment="OpenOffice_org-ko less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031465" comment="OpenOffice_org-nl less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031466" comment="OpenOffice_org-pl less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031467" comment="OpenOffice_org-pt-BR less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031468" comment="OpenOffice_org-pt less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031469" comment="OpenOffice_org-ru less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031470" comment="OpenOffice_org-sk less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031471" comment="OpenOffice_org-sl less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031472" comment="OpenOffice_org-sv less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031473" comment="OpenOffice_org-tr less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031474" comment="OpenOffice_org-zh-CN less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031475" comment="OpenOffice_org-zh-TW less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031476" comment="OpenOffice_org less than 1.1.5-0.22"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4771</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-4771" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4771" source="CVE"/>
	<description>
	Heap-based buffer overflow in the doInterval function in regexcmp.cpp in libicu in International Components for Unicode (ICU) 3.8.1 and earlier allows context-dependent attackers to cause a denial of service (memory consumption) and possibly have unspecified other impact via a regular expression that writes a large amount of data to the backtracking stack.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 08168f6330c0bb39905acabed49fa491 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009031441" comment="icu-data less than 2.6.2-2.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031442" comment="icu-i18ndata less than 2.6.2-2.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031443" comment="icu less than 2.6.2-2.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031444" comment="libicu-devel less than 2.6.2-2.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031445" comment="libicu26-32bit less than 9-200802280045"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031446" comment="libicu26 less than 2.6.2-2.9"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009031441" comment="icu-data less than 2.6.2-2.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031442" comment="icu-i18ndata less than 2.6.2-2.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031443" comment="icu less than 2.6.2-2.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031444" comment="libicu-devel less than 2.6.2-2.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031446" comment="libicu26 less than 2.6.2-2.9"/>
			</criteria>
		</criteria></criteria>
	<!-- f6a476d94870d717c3a93c69ce56d196 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031447" comment="OpenOffice_org-ar less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031448" comment="OpenOffice_org-ca less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031449" comment="OpenOffice_org-cs less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031450" comment="OpenOffice_org-da less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031451" comment="OpenOffice_org-de less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031452" comment="OpenOffice_org-el less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031453" comment="OpenOffice_org-en-help less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031454" comment="OpenOffice_org-en less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031455" comment="OpenOffice_org-es less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031456" comment="OpenOffice_org-et less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031457" comment="OpenOffice_org-fi less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031458" comment="OpenOffice_org-fr less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031459" comment="OpenOffice_org-gnome less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031460" comment="OpenOffice_org-hu less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031461" comment="OpenOffice_org-it less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031462" comment="OpenOffice_org-ja less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031463" comment="OpenOffice_org-kde less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031464" comment="OpenOffice_org-ko less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031465" comment="OpenOffice_org-nl less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031466" comment="OpenOffice_org-pl less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031467" comment="OpenOffice_org-pt-BR less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031468" comment="OpenOffice_org-pt less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031469" comment="OpenOffice_org-ru less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031470" comment="OpenOffice_org-sk less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031471" comment="OpenOffice_org-sl less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031472" comment="OpenOffice_org-sv less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031473" comment="OpenOffice_org-tr less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031474" comment="OpenOffice_org-zh-CN less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031475" comment="OpenOffice_org-zh-TW less than 1.1.5-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031476" comment="OpenOffice_org less than 1.1.5-0.22"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4772</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-4772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4772" source="CVE"/>
	<description>
	The regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows context-dependent attackers to cause a denial of service (infinite loop) via a crafted regular expression.
	</description>
 </metadata>
<!-- b923c74e6ff969e6dca94231c2d4e667 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031433" comment="postgresql-contrib less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031434" comment="postgresql-devel less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031435" comment="postgresql-docs less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031436" comment="postgresql-libs-32bit less than 9-200801312100"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031437" comment="postgresql-libs less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031438" comment="postgresql-pl less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031439" comment="postgresql-server less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031440" comment="postgresql less than 7.4.19-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4782</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-4782" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4782" source="CVE"/>
	<description>
	PHP before 5.2.3 allows context-dependent attackers to cause a denial of service (application crash) via (1) a long string in the pattern parameter to the glob function; or (2) a long string in the string parameter to the fnmatch function, accompanied by a pattern parameter value with undefined characteristics, as demonstrated by a "*[1]e" value.  NOTE: this might not be a vulnerability in most web server environments that support multiple threads, unless these issues can be demonstrated for code execution.
	</description>
 </metadata>
<!-- f1255e10262bd8b24adcb137ab61417e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031048" comment="mod_php4-core less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031049" comment="php4-bcmath less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031050" comment="php4-bz2 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031051" comment="php4-calendar less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031052" comment="php4-ctype less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031053" comment="php4-curl less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031054" comment="php4-dba less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031055" comment="php4-dbase less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031056" comment="php4-devel less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031057" comment="php4-domxml less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031058" comment="php4-exif less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031059" comment="php4-fastcgi less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031060" comment="php4-filepro less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031061" comment="php4-ftp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031062" comment="php4-gd less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031063" comment="php4-gettext less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031064" comment="php4-gmp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031065" comment="php4-iconv less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031066" comment="php4-imap less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031067" comment="php4-ldap less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031068" comment="php4-mbstring less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031069" comment="php4-mcal less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031070" comment="php4-mcrypt less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031071" comment="php4-mhash less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031072" comment="php4-mime_magic less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031073" comment="php4-mysql less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031074" comment="php4-pear less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031075" comment="php4-pgsql less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031076" comment="php4-qtdom less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031077" comment="php4-readline less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031078" comment="php4-recode less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031079" comment="php4-servlet less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031080" comment="php4-session less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031081" comment="php4-shmop less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031082" comment="php4-snmp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031083" comment="php4-sockets less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031084" comment="php4-swf less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031085" comment="php4-sysvsem less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031086" comment="php4-sysvshm less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031087" comment="php4-unixODBC less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031088" comment="php4-wddx less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031089" comment="php4-xslt less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031090" comment="php4-yp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031091" comment="php4-zlib less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031092" comment="php4 less than 4.3.4-43.85"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4784</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-4784" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4784" source="CVE"/>
	<description>
	The setlocale function in PHP before 5.2.4 allows context-dependent attackers to cause a denial of service (application crash) via a long string in the locale parameter.  NOTE: this might not be a vulnerability in most web server environments that support multiple threads, unless this issue can be demonstrated for code execution.
	</description>
 </metadata>
<!-- f1255e10262bd8b24adcb137ab61417e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031048" comment="mod_php4-core less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031049" comment="php4-bcmath less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031050" comment="php4-bz2 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031051" comment="php4-calendar less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031052" comment="php4-ctype less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031053" comment="php4-curl less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031054" comment="php4-dba less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031055" comment="php4-dbase less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031056" comment="php4-devel less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031057" comment="php4-domxml less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031058" comment="php4-exif less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031059" comment="php4-fastcgi less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031060" comment="php4-filepro less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031061" comment="php4-ftp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031062" comment="php4-gd less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031063" comment="php4-gettext less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031064" comment="php4-gmp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031065" comment="php4-iconv less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031066" comment="php4-imap less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031067" comment="php4-ldap less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031068" comment="php4-mbstring less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031069" comment="php4-mcal less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031070" comment="php4-mcrypt less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031071" comment="php4-mhash less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031072" comment="php4-mime_magic less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031073" comment="php4-mysql less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031074" comment="php4-pear less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031075" comment="php4-pgsql less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031076" comment="php4-qtdom less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031077" comment="php4-readline less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031078" comment="php4-recode less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031079" comment="php4-servlet less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031080" comment="php4-session less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031081" comment="php4-shmop less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031082" comment="php4-snmp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031083" comment="php4-sockets less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031084" comment="php4-swf less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031085" comment="php4-sysvsem less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031086" comment="php4-sysvshm less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031087" comment="php4-unixODBC less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031088" comment="php4-wddx less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031089" comment="php4-xslt less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031090" comment="php4-yp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031091" comment="php4-zlib less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031092" comment="php4 less than 4.3.4-43.85"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4825</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-4825" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4825" source="CVE"/>
	<description>
	Directory traversal vulnerability in PHP 5.2.4 and earlier allows attackers to bypass open_basedir restrictions and possibly execute arbitrary code via a .. (dot dot) in the dl function.
	</description>
 </metadata>
<!-- f1255e10262bd8b24adcb137ab61417e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031048" comment="mod_php4-core less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031049" comment="php4-bcmath less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031050" comment="php4-bz2 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031051" comment="php4-calendar less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031052" comment="php4-ctype less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031053" comment="php4-curl less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031054" comment="php4-dba less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031055" comment="php4-dbase less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031056" comment="php4-devel less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031057" comment="php4-domxml less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031058" comment="php4-exif less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031059" comment="php4-fastcgi less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031060" comment="php4-filepro less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031061" comment="php4-ftp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031062" comment="php4-gd less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031063" comment="php4-gettext less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031064" comment="php4-gmp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031065" comment="php4-iconv less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031066" comment="php4-imap less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031067" comment="php4-ldap less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031068" comment="php4-mbstring less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031069" comment="php4-mcal less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031070" comment="php4-mcrypt less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031071" comment="php4-mhash less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031072" comment="php4-mime_magic less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031073" comment="php4-mysql less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031074" comment="php4-pear less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031075" comment="php4-pgsql less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031076" comment="php4-qtdom less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031077" comment="php4-readline less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031078" comment="php4-recode less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031079" comment="php4-servlet less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031080" comment="php4-session less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031081" comment="php4-shmop less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031082" comment="php4-snmp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031083" comment="php4-sockets less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031084" comment="php4-swf less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031085" comment="php4-sysvsem less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031086" comment="php4-sysvshm less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031087" comment="php4-unixODBC less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031088" comment="php4-wddx less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031089" comment="php4-xslt less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031090" comment="php4-yp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031091" comment="php4-zlib less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031092" comment="php4 less than 4.3.4-43.85"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4840</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-4840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4840" source="CVE"/>
	<description>
	PHP 5.2.4 and earlier allows context-dependent attackers to cause a denial of service (application crash) via (1) a long string in the out_charset parameter to the iconv function; or a long string in the charset parameter to the (2) iconv_mime_decode_headers, (3) iconv_mime_decode, or (4) iconv_strlen function.  NOTE: this might not be a vulnerability in most web server environments that support multiple threads, unless these issues can be demonstrated for code execution.
	</description>
 </metadata>
<!-- f1255e10262bd8b24adcb137ab61417e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031048" comment="mod_php4-core less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031049" comment="php4-bcmath less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031050" comment="php4-bz2 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031051" comment="php4-calendar less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031052" comment="php4-ctype less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031053" comment="php4-curl less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031054" comment="php4-dba less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031055" comment="php4-dbase less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031056" comment="php4-devel less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031057" comment="php4-domxml less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031058" comment="php4-exif less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031059" comment="php4-fastcgi less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031060" comment="php4-filepro less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031061" comment="php4-ftp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031062" comment="php4-gd less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031063" comment="php4-gettext less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031064" comment="php4-gmp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031065" comment="php4-iconv less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031066" comment="php4-imap less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031067" comment="php4-ldap less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031068" comment="php4-mbstring less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031069" comment="php4-mcal less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031070" comment="php4-mcrypt less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031071" comment="php4-mhash less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031072" comment="php4-mime_magic less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031073" comment="php4-mysql less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031074" comment="php4-pear less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031075" comment="php4-pgsql less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031076" comment="php4-qtdom less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031077" comment="php4-readline less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031078" comment="php4-recode less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031079" comment="php4-servlet less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031080" comment="php4-session less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031081" comment="php4-shmop less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031082" comment="php4-snmp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031083" comment="php4-sockets less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031084" comment="php4-swf less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031085" comment="php4-sysvsem less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031086" comment="php4-sysvshm less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031087" comment="php4-unixODBC less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031088" comment="php4-wddx less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031089" comment="php4-xslt less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031090" comment="php4-yp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031091" comment="php4-zlib less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031092" comment="php4 less than 4.3.4-43.85"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4841</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-4841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4841" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.8, Thunderbird before 2.0.0.8, and SeaMonkey before 1.1.5 allows remote attackers to execute arbitrary commands via a (1) mailto, (2) nntp, (3) news, or (4) snews URI with invalid "%" encoding, related to improper file type handling on Windows XP with Internet Explorer 7 installed, a variant of CVE-2007-3845.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 94e7e87449ed25841acaf9b535567347 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030840" comment="MozillaFirefox-translations less than 1.5.0.12-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030841" comment="MozillaFirefox less than 1.5.0.12-0.5"/>
		</criteria>
	</criteria>
	<!-- bc8dbb4aea45ba7fac544f7e63f7898b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030842" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030843" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030844" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030845" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030846" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030847" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030848" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030849" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030850" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030851" comment="mozilla less than 1.8_seamonkey_1.0.9-1.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4879</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-4879" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4879" source="CVE"/>
	<description>
	Mozilla Firefox before Firefox 2.0.0.13, and SeaMonkey before 1.1.9, can automatically install TLS client certificates with minimal user interaction, and automatically sends these certificates when requested, which makes it easier for remote web sites to track user activities across domains by requesting the TLS client certificates from other domains.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8e287f4ed038cb8bbf6b06ae8f9ce9e5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031477" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031478" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031479" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031480" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031481" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031482" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031483" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031484" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031485" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031486" comment="mozilla less than 1.8_seamonkey_1.0.9-1.13"/>
		</criteria>
	</criteria>
	<!-- ad3e48b131593041b00e35f46ab10b61 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031487" comment="MozillaFirefox-translations less than 1.5.0.12-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031488" comment="MozillaFirefox less than 1.5.0.12-0.11"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4965</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-4965" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4965" source="CVE"/>
	<description>
	Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.
	</description>
 </metadata>
<!-- 369e3467aeea8b4a9ba9a6578e9a3e7c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031489" comment="python-32bit less than 9-200801101709"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031490" comment="python-curses less than 2.3.3-88.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031491" comment="python-demo less than 2.3.3-88.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031492" comment="python-devel less than 2.3.3-88.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031493" comment="python-doc-pdf less than 2.3.3-88.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031494" comment="python-doc less than 2.3.3-88.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031495" comment="python-gdbm less than 2.3.3-88.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031496" comment="python-idle less than 2.3.3-88.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031497" comment="python-mpz less than 2.3.3-88.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031498" comment="python-tk less than 2.3.3-88.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031499" comment="python-xml less than 2.3.3-88.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031500" comment="python less than 2.3.3-88.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4985</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-4985" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4985" source="CVE"/>
	<description>
	ImageMagick before 6.3.5-9 allows context-dependent attackers to cause a denial of service via a crafted image file that triggers (1) an infinite loop in the ReadDCMImage function, related to ReadBlobByte function calls; or (2) an infinite loop in the ReadXCFImage function, related to ReadBlobMSBLong function calls.
	</description>
 </metadata>
<!-- 11481d618226c175486463aef1f892ac -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031501" comment="ImageMagick-devel less than 5.5.7-225.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031502" comment="ImageMagick less than 5.5.7-225.37"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4986</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-4986" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4986" source="CVE"/>
	<description>
	Multiple integer overflows in ImageMagick before 6.3.5-9 allow context-dependent attackers to execute arbitrary code via a crafted (1) .dcm, (2) .dib, (3) .xbm, (4) .xcf, or (5) .xwd image file, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 11481d618226c175486463aef1f892ac -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031501" comment="ImageMagick-devel less than 5.5.7-225.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031502" comment="ImageMagick less than 5.5.7-225.37"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4987</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-4987" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4987" source="CVE"/>
	<description>
	Off-by-one error in the ReadBlobString function in blob.c in ImageMagick before 6.3.5-9 allows context-dependent attackers to execute arbitrary code via a crafted image file, which triggers the writing of a '\0' character to an out-of-bounds address.
	</description>
 </metadata>
<!-- 11481d618226c175486463aef1f892ac -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031501" comment="ImageMagick-devel less than 5.5.7-225.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031502" comment="ImageMagick less than 5.5.7-225.37"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4988</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-4988" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4988" source="CVE"/>
	<description>
	Sign extension error in the ReadDIBImage function in ImageMagick before 6.3.5-9 allows context-dependent attackers to execute arbitrary code via a crafted width value in an image file, which triggers an integer overflow and a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 11481d618226c175486463aef1f892ac -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031501" comment="ImageMagick-devel less than 5.5.7-225.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031502" comment="ImageMagick less than 5.5.7-225.37"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5000</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5000" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in the (1) mod_imap module in the Apache HTTP Server 1.3.0 through 1.3.39 and 2.0.35 through 2.0.61 and the (2) mod_imagemap module in the Apache HTTP Server 2.2.0 through 2.2.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2c87b234552522821a81df2a63d03f8c -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031503" comment="libapr0 less than 2.0.59-1.8"/>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009031504" comment="apache2-devel less than 2.0.59-1.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031505" comment="apache2-prefork less than 2.0.59-1.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031506" comment="apache2-worker less than 2.0.59-1.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031507" comment="apache2 less than 2.0.59-1.8"/>
			</criteria>
		</criteria></criteria>
	<!-- 484f33da03a9e3e4632f40254c4a96a3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030903" comment="apache-devel less than 1.3.29-71.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030904" comment="apache less than 1.3.29-71.26"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5116</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5116" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5116" source="CVE"/>
	<description>
	Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.
	</description>
 </metadata>
<!-- ac1366b509057e23230d33e9bad84f43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031508" comment="perl-32bit less than 9-200711080056"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031509" comment="perl less than 5.8.3-32.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5135</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5135" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5135" source="CVE"/>
	<description>
	Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 up to 0.9.7l, and 0.9.8 up to 0.9.8f, might allow remote attackers to execute arbitrary code via a crafted packet that triggers a one-byte buffer underflow.  NOTE: this issue was introduced as a result of a fix for CVE-2006-3738.  As of 20071012, it is unknown whether code execution is possible.
	</description>
 </metadata>
<!-- 5ab4f4c02d8fd020226a6cc67e3210f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031510" comment="openssl-32bit less than 9-200710031457"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031511" comment="openssl-devel-32bit less than 9-200710031457"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031512" comment="openssl-devel less than 0.9.7d-15.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031513" comment="openssl-doc less than 0.9.7d-15.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031514" comment="openssl less than 0.9.7d-15.35"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5137</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5137" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5137" source="CVE"/>
	<description>
	Buffer overflow in the ReadImage function in generic/tkImgGIF.c in Tcl (Tcl/Tk) 8.4.13 through 8.4.15 allows remote attackers to execute arbitrary code via multi-frame interlaced GIF files in which later frames are smaller than the first.  NOTE: this issue is due to an incorrect patch for CVE-2007-5378.
	</description>
 </metadata>
<!-- 54704d57e08bced85978b78720ac185c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031515" comment="tk-32bit less than 9-200710031447"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031516" comment="tk-devel less than 8.4.6-41.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031517" comment="tk less than 8.4.6-41.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5232</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5232" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5232" source="CVE"/>
	<description>
	Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when applet caching is enabled, allows remote attackers to violate the security model for an applet's outbound connections via a DNS rebinding attack.
	</description>
 </metadata>
<!-- 9d8cb03291c8cdf9cfec381e38bd6b88 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031518" comment="java2-jre less than 1.4.2-129.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031519" comment="java2 less than 1.4.2-129.32"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5236</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5236" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5236" source="CVE"/>
	<description>
	Java Web Start in Sun JDK and JRE 5.0 Update 12 and earlier, and SDK and JRE 1.4.2_15 and earlier, on Windows does not properly enforce access restrictions for untrusted applications, which allows user-assisted remote attackers to read local files via an untrusted application.
	</description>
 </metadata>
<!-- 9d8cb03291c8cdf9cfec381e38bd6b88 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031518" comment="java2-jre less than 1.4.2-129.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031519" comment="java2 less than 1.4.2-129.32"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5237</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5237" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5237" source="CVE"/>
	<description>
	Java Web Start in Sun JDK and JRE 6 Update 2 and earlier does not properly enforce access restrictions for untrusted applications, which allows user-assisted remote attackers to read and modify local files via an untrusted application, aka "two vulnerabilities."
	</description>
 </metadata>
<!-- 9d8cb03291c8cdf9cfec381e38bd6b88 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031518" comment="java2-jre less than 1.4.2-129.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031519" comment="java2 less than 1.4.2-129.32"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5238</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5238" source="CVE"/>
	<description>
	Java Web Start in Sun JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, and SDK and JRE 1.4.2_15 and earlier does not properly enforce access restrictions for untrusted applications, which allows user-assisted remote attackers to obtain sensitive information (the Java Web Start cache location) via an untrusted application, aka "three vulnerabilities."
	</description>
 </metadata>
<!-- 9d8cb03291c8cdf9cfec381e38bd6b88 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031518" comment="java2-jre less than 1.4.2-129.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031519" comment="java2 less than 1.4.2-129.32"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5239</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5239" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5239" source="CVE"/>
	<description>
	Java Web Start in Sun JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier does not properly enforce access restrictions for untrusted (1) applications and (2) applets, which allows user-assisted remote attackers to copy or rename arbitrary files when local users perform drag-and-drop operations from the untrusted application or applet window onto certain types of desktop applications.
	</description>
 </metadata>
<!-- 9d8cb03291c8cdf9cfec381e38bd6b88 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031518" comment="java2-jre less than 1.4.2-129.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031519" comment="java2 less than 1.4.2-129.32"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5240</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5240" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5240" source="CVE"/>
	<description>
	Visual truncation vulnerability in the Java Runtime Environment in Sun JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier allows remote attackers to circumvent display of the untrusted-code warning banner by creating a window larger than the workstation screen.
	</description>
 </metadata>
<!-- 9d8cb03291c8cdf9cfec381e38bd6b88 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031518" comment="java2-jre less than 1.4.2-129.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031519" comment="java2 less than 1.4.2-129.32"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5269</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5269" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5269" source="CVE"/>
	<description>
	Certain chunk handlers in libpng before 1.0.29 and 1.2.x before 1.2.21 allow remote attackers to cause a denial of service (crash) via crafted (1) pCAL (png_handle_pCAL), (2) sCAL (png_handle_sCAL), (3) tEXt (png_push_read_tEXt), (4) iTXt (png_handle_iTXt), and (5) ztXT (png_handle_ztXt) chunking in PNG images, which trigger out-of-bounds read operations.
	</description>
 </metadata>
<!-- 56605be2584d53da1a8232f1bf454759 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031520" comment="libpng-32bit less than 9-200711060115"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031521" comment="libpng-devel less than 1.2.5-182.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031522" comment="libpng less than 1.2.5-182.16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5273</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5273" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5273" source="CVE"/>
	<description>
	Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when an HTTP proxy server is used, allows remote attackers to violate the security model for an applet's outbound connections via a multi-pin DNS rebinding attack in which the applet download relies on DNS resolution on the proxy server, but the applet's socket operations rely on DNS resolution on the local machine, a different issue than CVE-2007-5274. NOTE: this is similar to CVE-2007-5232.
	</description>
 </metadata>
<!-- 9d8cb03291c8cdf9cfec381e38bd6b88 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031518" comment="java2-jre less than 1.4.2-129.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031519" comment="java2 less than 1.4.2-129.32"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5274</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5274" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5274" source="CVE"/>
	<description>
	Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when Firefox or Opera is used, allows remote attackers to violate the security model for JavaScript outbound connections via a multi-pin DNS rebinding attack dependent on the LiveConnect API, in which JavaScript download relies on DNS resolution by the browser, but JavaScript socket operations rely on separate DNS resolution by a Java Virtual Machine (JVM), a different issue than CVE-2007-5273.  NOTE: this is similar to CVE-2007-5232.
	</description>
 </metadata>
<!-- 9d8cb03291c8cdf9cfec381e38bd6b88 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031518" comment="java2-jre less than 1.4.2-129.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031519" comment="java2 less than 1.4.2-129.32"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5275</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5275" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5275" source="CVE"/>
	<description>
	The Adobe Macromedia Flash 9 plug-in allows remote attackers to cause a victim machine to establish TCP sessions with arbitrary hosts via a Flash (SWF) movie, related to lack of pinning of a hostname to a single IP address after receiving an allow-access-from element in a cross-domain-policy XML document, and the availability of a Flash Socket class that does not use the browser's DNS pins, aka DNS rebinding attacks, a different issue than CVE-2002-1467 and CVE-2007-4324.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- abac03d3ea3f90145ddbc82fdd20aebd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031399" comment="flash-player less than 9.0.48.0-4.4"/>
	</criteria>
	<!-- bf0bfd1ab7b4dfb4cb1cd0bf88a5fb58 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031150" comment="flash-player less than 9.0.124.0-0.1"/>
	</criteria>
	<!-- da23b892b7b8f9906bc126fad5902356 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031400" comment="flash-player less than 9.0.115.0-0.2"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5333</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5333" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5333" source="CVE"/>
	<description>
	Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks.  NOTE: this issue exists because of an incomplete fix for CVE-2007-3385.
	</description>
 </metadata>
<!-- 9ad93d9cf0cbff51419c9761a5fc4cdd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031252" comment="jakarta-tomcat less than 5.0.19-29.13"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5334</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5334" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5334" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5 can hide the window's titlebar when displaying XUL markup language documents, which makes it easier for remote attackers to conduct phishing and spoofing attacks by setting the hidechrome attribute.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 94e7e87449ed25841acaf9b535567347 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030840" comment="MozillaFirefox-translations less than 1.5.0.12-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030841" comment="MozillaFirefox less than 1.5.0.12-0.5"/>
		</criteria>
	</criteria>
	<!-- bc8dbb4aea45ba7fac544f7e63f7898b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030842" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030843" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030844" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030845" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030846" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030847" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030848" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030849" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030850" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030851" comment="mozilla less than 1.8_seamonkey_1.0.9-1.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5337</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5337" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5337" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5, when running on Linux systems with gnome-vfs support, might allow remote attackers to read arbitrary files on SSH/sftp servers that accept key authentication by creating a web page on the target server, in which the web page contains URIs with (1) smb: or (2) sftp: schemes that access other files from the server.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 94e7e87449ed25841acaf9b535567347 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030840" comment="MozillaFirefox-translations less than 1.5.0.12-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030841" comment="MozillaFirefox less than 1.5.0.12-0.5"/>
		</criteria>
	</criteria>
	<!-- bc8dbb4aea45ba7fac544f7e63f7898b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030842" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030843" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030844" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030845" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030846" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030847" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030848" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030849" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030850" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030851" comment="mozilla less than 1.8_seamonkey_1.0.9-1.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5338</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5338" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5338" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5 allow remote attackers to execute arbitrary Javascript with user privileges by using the Script object to modify XPCNativeWrappers in a way that causes the script to be executed when a chrome action is performed.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 94e7e87449ed25841acaf9b535567347 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030840" comment="MozillaFirefox-translations less than 1.5.0.12-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030841" comment="MozillaFirefox less than 1.5.0.12-0.5"/>
		</criteria>
	</criteria>
	<!-- bc8dbb4aea45ba7fac544f7e63f7898b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030842" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030843" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030844" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030845" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030846" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030847" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030848" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030849" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030850" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030851" comment="mozilla less than 1.8_seamonkey_1.0.9-1.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5339</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5339" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5339" source="CVE"/>
	<description>
	Multiple vulnerabilities in Mozilla Firefox before 2.0.0.8, Thunderbird before 2.0.0.8, and SeaMonkey before 1.1.5 allow remote attackers to cause a denial of service (crash) via crafted HTML that triggers memory corruption or assert errors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 94e7e87449ed25841acaf9b535567347 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030840" comment="MozillaFirefox-translations less than 1.5.0.12-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030841" comment="MozillaFirefox less than 1.5.0.12-0.5"/>
		</criteria>
	</criteria>
	<!-- bc8dbb4aea45ba7fac544f7e63f7898b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030842" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030843" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030844" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030845" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030846" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030847" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030848" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030849" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030850" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030851" comment="mozilla less than 1.8_seamonkey_1.0.9-1.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5340</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5340" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5340" source="CVE"/>
	<description>
	Multiple vulnerabilities in the Javascript engine in Mozilla Firefox before 2.0.0.8, Thunderbird before 2.0.0.8, and SeaMonkey before 1.1.5 allow remote attackers to cause a denial of service (crash) via crafted HTML that triggers memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 94e7e87449ed25841acaf9b535567347 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030840" comment="MozillaFirefox-translations less than 1.5.0.12-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030841" comment="MozillaFirefox less than 1.5.0.12-0.5"/>
		</criteria>
	</criteria>
	<!-- bc8dbb4aea45ba7fac544f7e63f7898b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030842" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030843" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030844" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030845" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030846" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030847" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030848" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030849" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030850" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030851" comment="mozilla less than 1.8_seamonkey_1.0.9-1.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5392</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5392" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5392" source="CVE"/>
	<description>
	Integer overflow in the DCTStream::reset method in xpdf/Stream.cc in Xpdf 3.02p11 allows remote attackers to execute arbitrary code via a crafted PDF file, resulting in a heap-based buffer overflow.
	</description>
 </metadata>
<!-- f83e024a65d69ebc810d2117815b940d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031402" comment="cups-client less than 1.1.20-108.44"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031403" comment="cups-devel less than 1.1.20-108.44"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031404" comment="cups-libs-32bit less than 9-200711080439"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031405" comment="cups-libs less than 1.1.20-108.44"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031406" comment="cups less than 1.1.20-108.44"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5393</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5393" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5393" source="CVE"/>
	<description>
	Heap-based buffer overflow in the CCITTFaxStream::lookChar method in xpdf/Stream.cc in Xpdf 3.02p11 allows remote attackers to execute arbitrary code via a PDF file that contains a crafted CCITTFaxDecode filter.
	</description>
 </metadata>
<!-- f83e024a65d69ebc810d2117815b940d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031402" comment="cups-client less than 1.1.20-108.44"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031403" comment="cups-devel less than 1.1.20-108.44"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031404" comment="cups-libs-32bit less than 9-200711080439"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031405" comment="cups-libs less than 1.1.20-108.44"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031406" comment="cups less than 1.1.20-108.44"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5398</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5398" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5398" source="CVE"/>
	<description>
	Stack-based buffer overflow in the reply_netbios_packet function in nmbd/nmbd_packets.c in nmbd in Samba 3.0.0 through 3.0.26a, when operating as a WINS server, allows remote attackers to execute arbitrary code via crafted WINS Name Registration requests followed by a WINS Name Query request.
	</description>
 </metadata>
<!-- a8a615405c62005f443b3e34d922d381 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031414" comment="ldapsmb less than 1.33-6.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031415" comment="libsmbclient-32bit less than 9-200711231829"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031416" comment="libsmbclient-devel less than 3.0.20b-3.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031417" comment="libsmbclient less than 3.0.20b-3.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031418" comment="samba-32bit less than 9-200711231829"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031419" comment="samba-client-32bit less than 9-200711231829"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031420" comment="samba-client less than 3.0.20b-3.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031421" comment="samba-doc less than 3.0.20b-3.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031422" comment="samba-pdb less than 3.0.20b-3.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031423" comment="samba-python less than 3.0.20b-3.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031424" comment="samba-vscan less than 0.3.6b-0.26.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031425" comment="samba-winbind-32bit less than 9-200711231829"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031426" comment="samba-winbind less than 3.0.20b-3.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031427" comment="samba less than 3.0.20b-3.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5400</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5400" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5400" source="CVE"/>
	<description>
	Heap-based buffer overflow in the Shockwave Flash (SWF) frame handling in RealNetworks RealPlayer 10.5 Build 6.0.12.1483 might allow remote attackers to execute arbitrary code via a crafted SWF file.
	</description>
 </metadata>
<!-- 3144dc83e8caa9d02b78c9176d69783b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031523" comment="RealPlayer less than 10.0.9-2.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5461</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5461" source="CVE"/>
	<description>
	Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag.
	</description>
 </metadata>
<!-- 315ff7a101fca9aabbfab11879f31212 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030636" comment="jakarta-tomcat less than 5.0.19-29.11"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5497</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5497" source="CVE"/>
	<description>
	Multiple integer overflows in libext2fs in e2fsprogs before 1.40.3 allow user-assisted remote attackers to execute arbitrary code via a crafted filesystem image.
	</description>
 </metadata>
<!-- 6dd778b3f47ea6338ca94dac88abee05 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031524" comment="e2fsprogs-32bit less than 9-200711231622"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031525" comment="e2fsprogs-devel-32bit less than 9-200711231622"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031526" comment="e2fsprogs-devel less than 1.38-4.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031527" comment="e2fsprogs less than 1.38-4.23.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5745</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5745" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5745" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in OpenOffice.org before 2.4 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Quattro Pro (QPRO) file with crafted (1) Attribute and (2) Font Description records.
	</description>
 </metadata>
<!-- f6a476d94870d717c3a93c69ce56d196 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031447" comment="OpenOffice_org-ar less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031448" comment="OpenOffice_org-ca less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031449" comment="OpenOffice_org-cs less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031450" comment="OpenOffice_org-da less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031451" comment="OpenOffice_org-de less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031452" comment="OpenOffice_org-el less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031453" comment="OpenOffice_org-en-help less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031454" comment="OpenOffice_org-en less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031455" comment="OpenOffice_org-es less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031456" comment="OpenOffice_org-et less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031457" comment="OpenOffice_org-fi less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031458" comment="OpenOffice_org-fr less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031459" comment="OpenOffice_org-gnome less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031460" comment="OpenOffice_org-hu less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031461" comment="OpenOffice_org-it less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031462" comment="OpenOffice_org-ja less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031463" comment="OpenOffice_org-kde less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031464" comment="OpenOffice_org-ko less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031465" comment="OpenOffice_org-nl less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031466" comment="OpenOffice_org-pl less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031467" comment="OpenOffice_org-pt-BR less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031468" comment="OpenOffice_org-pt less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031469" comment="OpenOffice_org-ru less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031470" comment="OpenOffice_org-sk less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031471" comment="OpenOffice_org-sl less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031472" comment="OpenOffice_org-sv less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031473" comment="OpenOffice_org-tr less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031474" comment="OpenOffice_org-zh-CN less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031475" comment="OpenOffice_org-zh-TW less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031476" comment="OpenOffice_org less than 1.1.5-0.22"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5747</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5747" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5747" source="CVE"/>
	<description>
	Integer underflow in OpenOffice.org before 2.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Quattro Pro (QPRO) file with crafted values that trigger an excessive loop and a stack-based buffer overflow.
	</description>
 </metadata>
<!-- f6a476d94870d717c3a93c69ce56d196 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031447" comment="OpenOffice_org-ar less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031448" comment="OpenOffice_org-ca less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031449" comment="OpenOffice_org-cs less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031450" comment="OpenOffice_org-da less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031451" comment="OpenOffice_org-de less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031452" comment="OpenOffice_org-el less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031453" comment="OpenOffice_org-en-help less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031454" comment="OpenOffice_org-en less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031455" comment="OpenOffice_org-es less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031456" comment="OpenOffice_org-et less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031457" comment="OpenOffice_org-fi less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031458" comment="OpenOffice_org-fr less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031459" comment="OpenOffice_org-gnome less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031460" comment="OpenOffice_org-hu less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031461" comment="OpenOffice_org-it less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031462" comment="OpenOffice_org-ja less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031463" comment="OpenOffice_org-kde less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031464" comment="OpenOffice_org-ko less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031465" comment="OpenOffice_org-nl less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031466" comment="OpenOffice_org-pl less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031467" comment="OpenOffice_org-pt-BR less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031468" comment="OpenOffice_org-pt less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031469" comment="OpenOffice_org-ru less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031470" comment="OpenOffice_org-sk less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031471" comment="OpenOffice_org-sl less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031472" comment="OpenOffice_org-sv less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031473" comment="OpenOffice_org-tr less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031474" comment="OpenOffice_org-zh-CN less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031475" comment="OpenOffice_org-zh-TW less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031476" comment="OpenOffice_org less than 1.1.5-0.22"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5760</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5760" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5760" source="CVE"/>
	<description>
	Array index error in the XFree86-Misc extension in X.Org Xserver before 1.4.1 allows context-dependent attackers to execute arbitrary code via a PassMessage request containing a large array index.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 56240f6955337ddf455d2aa23797006a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031528" comment="XFree86-libs-32bit less than 9-200801062003"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031529" comment="XFree86-libs less than 4.3.99.902-43.94"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031530" comment="XFree86-server less than 4.3.99.902-43.94"/>
		</criteria>
	</criteria>
	<!-- 686ed843d1dc7672badd026d1d0712c1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031531" comment="XFree86-Xnest less than 4.3.99.902-43.94"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031532" comment="XFree86-Xvfb less than 4.3.99.902-43.94"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5794</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5794" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5794" source="CVE"/>
	<description>
	Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected.
	</description>
 </metadata>
<!-- 5a8d0489cebefa2727391109050a24c8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031533" comment="nss_ldap-32bit less than 9-200712041546"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031534" comment="nss_ldap less than 215-59.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5846</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5846" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5846" source="CVE"/>
	<description>
	The SNMP agent (snmp_agent.c) in net-snmp before 5.4.1 allows remote attackers to cause a denial of service (CPU and memory consumption) via a GETBULK request with a large max-repeaters value.
	</description>
 </metadata>
<!-- c71f28d1fb2ec0c2488da36c8a98a507 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031535" comment="net-snmp-devel less than 5.1.3.1-0.17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031536" comment="net-snmp less than 5.1.3.1-0.17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031537" comment="perl-SNMP less than 5.1.3.1-0.17.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5848</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5848" source="CVE"/>
	<description>
	Buffer overflow in CUPS in Apple Mac OS X 10.4.11 allows local admin users to execute arbitrary code via a crafted URI to the CUPS service.
	</description>
 </metadata>
<!-- eb37a23ce60ab91ec04f08ea1e3aa56a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031538" comment="cups-client less than 1.1.20-108.46"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031539" comment="cups-devel less than 1.1.20-108.46"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031540" comment="cups-libs-32bit less than 9-200712111651"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031541" comment="cups-libs less than 1.1.20-108.46"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031542" comment="cups less than 1.1.20-108.46"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5898</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5898" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5898" source="CVE"/>
	<description>
	The (1) htmlentities and (2) htmlspecialchars functions in PHP before 5.2.5 accept partial multibyte sequences, which has unknown impact and attack vectors, a different issue than CVE-2006-5465.
	</description>
 </metadata>
<!-- f1255e10262bd8b24adcb137ab61417e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031048" comment="mod_php4-core less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031049" comment="php4-bcmath less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031050" comment="php4-bz2 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031051" comment="php4-calendar less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031052" comment="php4-ctype less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031053" comment="php4-curl less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031054" comment="php4-dba less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031055" comment="php4-dbase less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031056" comment="php4-devel less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031057" comment="php4-domxml less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031058" comment="php4-exif less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031059" comment="php4-fastcgi less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031060" comment="php4-filepro less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031061" comment="php4-ftp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031062" comment="php4-gd less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031063" comment="php4-gettext less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031064" comment="php4-gmp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031065" comment="php4-iconv less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031066" comment="php4-imap less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031067" comment="php4-ldap less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031068" comment="php4-mbstring less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031069" comment="php4-mcal less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031070" comment="php4-mcrypt less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031071" comment="php4-mhash less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031072" comment="php4-mime_magic less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031073" comment="php4-mysql less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031074" comment="php4-pear less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031075" comment="php4-pgsql less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031076" comment="php4-qtdom less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031077" comment="php4-readline less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031078" comment="php4-recode less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031079" comment="php4-servlet less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031080" comment="php4-session less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031081" comment="php4-shmop less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031082" comment="php4-snmp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031083" comment="php4-sockets less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031084" comment="php4-swf less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031085" comment="php4-sysvsem less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031086" comment="php4-sysvshm less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031087" comment="php4-unixODBC less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031088" comment="php4-wddx less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031089" comment="php4-xslt less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031090" comment="php4-yp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031091" comment="php4-zlib less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031092" comment="php4 less than 4.3.4-43.85"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5904</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5904" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5904" source="CVE"/>
	<description>
	Multiple buffer overflows in CIFS VFS in Linux kernel 2.6.23 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long SMB responses that trigger the overflows in the SendReceive function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- aab836528f99df07c43db5dd38e62ad0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031377" comment="kernel-bigsmp less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031378" comment="kernel-default less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031379" comment="kernel-smp less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031380" comment="kernel-source less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031381" comment="kernel-syms less than 2.6.5-7.311"/>
		</criteria>
	</criteria>
	<!-- b6d5f6e00bbd43399d33b9d8b687ee37 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031378" comment="kernel-default less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031379" comment="kernel-smp less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031380" comment="kernel-source less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031381" comment="kernel-syms less than 2.6.5-7.311"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5925</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5925" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5925" source="CVE"/>
	<description>
	The convert_search_mode_to_innobase function in ha_innodb.cc in the InnoDB engine in MySQL 5.1.23-BK and earlier allows remote authenticated users to cause a denial of service (database crash) via a certain CONTAINS operation on an indexed column, which triggers an assertion error.
	</description>
 </metadata>
<!-- 7cb80eb2033195041bfb93aa6b99a517 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031290" comment="mysql-Max less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031291" comment="mysql-bench less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031292" comment="mysql-client less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031293" comment="mysql-devel less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031294" comment="mysql-shared less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031295" comment="mysql less than 4.0.18-32.32"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5935</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5935" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5935" source="CVE"/>
	<description>
	Stack-based buffer overflow in hpc.c in dvips in teTeX and TeXlive 2007 and earlier allows user-assisted attackers to execute arbitrary code via a DVI file with a long href tag.
	</description>
 </metadata>
<!-- e5415bb6339000a029fc7a4b6bb34cb4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031543" comment="te_ams less than 2.0.2-195.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031544" comment="te_cont less than 2.0.2-195.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031545" comment="te_dvilj less than 2.0.2-195.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031546" comment="te_eplai less than 2.0.2-195.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031547" comment="te_etex less than 2.0.2-195.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031548" comment="te_kpath less than 2.0.2-195.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031549" comment="te_latex less than 2.0.2-195.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031550" comment="te_mpost less than 2.0.2-195.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031551" comment="te_omega less than 2.0.2-195.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031552" comment="te_pdf less than 2.0.2-195.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031553" comment="te_ptex less than 2.0.2-195.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031554" comment="te_web less than 2.0.2-195.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031555" comment="tetex less than 2.0.2-195.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5936</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5936" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5936" source="CVE"/>
	<description>
	dvips in teTeX and TeXlive 2007 and earlier allows local users to obtain sensitive information and modify certain data by creating certain temporary files before they are processed by dviljk, which can then be read or modified in place.
	</description>
 </metadata>
<!-- e5415bb6339000a029fc7a4b6bb34cb4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031543" comment="te_ams less than 2.0.2-195.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031544" comment="te_cont less than 2.0.2-195.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031545" comment="te_dvilj less than 2.0.2-195.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031546" comment="te_eplai less than 2.0.2-195.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031547" comment="te_etex less than 2.0.2-195.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031548" comment="te_kpath less than 2.0.2-195.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031549" comment="te_latex less than 2.0.2-195.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031550" comment="te_mpost less than 2.0.2-195.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031551" comment="te_omega less than 2.0.2-195.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031552" comment="te_pdf less than 2.0.2-195.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031553" comment="te_ptex less than 2.0.2-195.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031554" comment="te_web less than 2.0.2-195.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031555" comment="tetex less than 2.0.2-195.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5937</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5937" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5937" source="CVE"/>
	<description>
	Multiple buffer overflows in dvi2xx.c in dviljk in teTeX and TeXlive 2007 and earlier might allow user-assisted attackers to execute arbitrary code via a crafted DVI input file.
	</description>
 </metadata>
<!-- e5415bb6339000a029fc7a4b6bb34cb4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031543" comment="te_ams less than 2.0.2-195.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031544" comment="te_cont less than 2.0.2-195.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031545" comment="te_dvilj less than 2.0.2-195.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031546" comment="te_eplai less than 2.0.2-195.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031547" comment="te_etex less than 2.0.2-195.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031548" comment="te_kpath less than 2.0.2-195.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031549" comment="te_latex less than 2.0.2-195.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031550" comment="te_mpost less than 2.0.2-195.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031551" comment="te_omega less than 2.0.2-195.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031552" comment="te_pdf less than 2.0.2-195.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031553" comment="te_ptex less than 2.0.2-195.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031554" comment="te_web less than 2.0.2-195.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031555" comment="tetex less than 2.0.2-195.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5939</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5939" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5939" source="CVE"/>
	<description>
	The gss_userok function in appl/ftp/ftpd/gss_userok.c in Heimdal 0.7.2 does not allocate memory for the ticketfile pointer before calling free, which allows remote attackers to have an unknown impact via an invalid username.  NOTE: the vulnerability was originally reported for ftpd.c, but this is incorrect.
	</description>
 </metadata>
<!-- f61794701df3f762046f48a83269b763 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031556" comment="heimdal-devel-32bit less than 9-200712111659"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031557" comment="heimdal-devel less than 0.6.1rc3-55.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031558" comment="heimdal-lib-32bit less than 9-200712111659"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031559" comment="heimdal-lib less than 0.6.1rc3-55.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031560" comment="heimdal-tools less than 0.6.1rc3-55.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031561" comment="heimdal less than 0.6.1rc3-55.27"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5947</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5947" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5947" source="CVE"/>
	<description>
	The jar protocol handler in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- cdc4a6a740cfce018bc8945da9156808 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031562" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031563" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031564" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031565" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031566" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031567" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031568" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031569" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031570" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031571" comment="mozilla less than 1.8_seamonkey_1.0.9-1.8"/>
		</criteria>
	</criteria>
	<!-- ebb4ac5e4c7d3403973675c55349d4a0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031572" comment="MozillaFirefox-translations less than 1.5.0.12-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031573" comment="MozillaFirefox less than 1.5.0.12-0.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5958</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5958" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5958" source="CVE"/>
	<description>
	X.Org Xserver before 1.4.1 allows local users to determine the existence of arbitrary files via a filename argument in the -sp option to the X program, which produces different error messages depending on whether the filename exists.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 56240f6955337ddf455d2aa23797006a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031528" comment="XFree86-libs-32bit less than 9-200801062003"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031529" comment="XFree86-libs less than 4.3.99.902-43.94"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031530" comment="XFree86-server less than 4.3.99.902-43.94"/>
		</criteria>
	</criteria>
	<!-- 686ed843d1dc7672badd026d1d0712c1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031531" comment="XFree86-Xnest less than 4.3.99.902-43.94"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031532" comment="XFree86-Xvfb less than 4.3.99.902-43.94"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5959</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5959" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5959" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors that trigger memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- cdc4a6a740cfce018bc8945da9156808 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031562" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031563" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031564" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031565" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031566" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031567" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031568" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031569" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031570" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031571" comment="mozilla less than 1.8_seamonkey_1.0.9-1.8"/>
		</criteria>
	</criteria>
	<!-- ebb4ac5e4c7d3403973675c55349d4a0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031572" comment="MozillaFirefox-translations less than 1.5.0.12-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031573" comment="MozillaFirefox less than 1.5.0.12-0.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5960</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5960" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 sets the Referer header to the window or frame in which script is running, instead of the address of the content that initiated the script, which allows remote attackers to spoof HTTP Referer headers and bypass Referer-based CSRF protection schemes by setting window.location and using a modal alert dialog that causes the wrong Referer to be sent.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- cdc4a6a740cfce018bc8945da9156808 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031562" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031563" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031564" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031565" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031566" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031567" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031568" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031569" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031570" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031571" comment="mozilla less than 1.8_seamonkey_1.0.9-1.8"/>
		</criteria>
	</criteria>
	<!-- ebb4ac5e4c7d3403973675c55349d4a0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031572" comment="MozillaFirefox-translations less than 1.5.0.12-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031573" comment="MozillaFirefox less than 1.5.0.12-0.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5969</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-5969" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5969" source="CVE"/>
	<description>
	MySQL Community Server 5.0.x before 5.0.51, Enterprise Server 5.0.x before 5.0.52, Server 5.1.x before 5.1.23, and Server 6.0.x before 6.0.4, when a table relies on symlinks created through explicit DATA DIRECTORY and INDEX DIRECTORY options, allows remote authenticated users to overwrite system table information and gain privileges via a RENAME TABLE statement that changes the symlink to point to an existing file.
	</description>
 </metadata>
<!-- 7cb80eb2033195041bfb93aa6b99a517 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031290" comment="mysql-Max less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031291" comment="mysql-bench less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031292" comment="mysql-client less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031293" comment="mysql-devel less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031294" comment="mysql-shared less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031295" comment="mysql less than 4.0.18-32.32"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6015</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6015" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6015" source="CVE"/>
	<description>
	Stack-based buffer overflow in the send_mailslot function in nmbd in Samba 3.0.0 through 3.0.27a, when the "domain logons" option is enabled, allows remote attackers to execute arbitrary code via a GETDC mailslot request composed of a long GETDC string following an offset username in a SAMLOGON logon request.
	</description>
 </metadata>
<!-- 62b9c0440dd934e47058664687d5b084 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031574" comment="ldapsmb less than 1.33-6.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031575" comment="libsmbclient-32bit less than 9-200712041731"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031576" comment="libsmbclient-devel less than 3.0.20b-3.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031577" comment="libsmbclient less than 3.0.20b-3.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031578" comment="samba-32bit less than 9-200712041731"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031579" comment="samba-client-32bit less than 9-200712041731"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031580" comment="samba-client less than 3.0.20b-3.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031581" comment="samba-doc less than 3.0.20b-3.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031582" comment="samba-pdb less than 3.0.20b-3.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031583" comment="samba-python less than 3.0.20b-3.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031584" comment="samba-vscan less than 0.3.6b-0.26.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031585" comment="samba-winbind-32bit less than 9-200712041731"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031586" comment="samba-winbind less than 3.0.20b-3.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031587" comment="samba less than 3.0.20b-3.26"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6019</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6019" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6019" source="CVE"/>
	<description>
	Adobe Flash Player 9.0.115.0 and earlier, and 8.0.39.0 and earlier, allows remote attackers to execute arbitrary code via an SWF file with a modified DeclareFunction2 Actionscript tag, which prevents an object from being instantiated properly.
	</description>
 </metadata>
<!-- bf0bfd1ab7b4dfb4cb1cd0bf88a5fb58 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031150" comment="flash-player less than 9.0.124.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6067</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6067" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6067" source="CVE"/>
	<description>
	Algorithmic complexity vulnerability in the regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows remote authenticated users to cause a denial of service (memory consumption) via a crafted "complex" regular expression with doubly-nested states.
	</description>
 </metadata>
<!-- b923c74e6ff969e6dca94231c2d4e667 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031433" comment="postgresql-contrib less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031434" comment="postgresql-devel less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031435" comment="postgresql-docs less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031436" comment="postgresql-libs-32bit less than 9-200801312100"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031437" comment="postgresql-libs less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031438" comment="postgresql-pl less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031439" comment="postgresql-server less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031440" comment="postgresql less than 7.4.19-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6111</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6111" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6111" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Wireshark (formerly Ethereal) allow remote attackers to cause a denial of service (crash) via (1) a crafted MP3 file or (2) unspecified vectors to the NCP dissector.
	</description>
 </metadata>
<!-- aab8a806c000656fefc91ad0e08dc893 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031588" comment="ethereal less than 0.10.13-2.30"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6112</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6112" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6112" source="CVE"/>
	<description>
	Buffer overflow in the PPP dissector Wireshark (formerly Ethereal) 0.99.6 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- aab8a806c000656fefc91ad0e08dc893 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031588" comment="ethereal less than 0.10.13-2.30"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6113</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6113" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6113" source="CVE"/>
	<description>
	Integer signedness error in the DNP3 dissector in Wireshark (formerly Ethereal) 0.10.12 to 0.99.6 allows remote attackers to cause a denial of service (long loop) via a malformed DNP3 packet.
	</description>
 </metadata>
<!-- aab8a806c000656fefc91ad0e08dc893 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031588" comment="ethereal less than 0.10.13-2.30"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6114</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6114" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6114" source="CVE"/>
	<description>
	Multiple buffer overflows in Wireshark (formerly Ethereal) 0.99.0 through 0.99.6 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) the SSL dissector or (2) the iSeries (OS/400) Communication trace file parser.
	</description>
 </metadata>
<!-- aab8a806c000656fefc91ad0e08dc893 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031588" comment="ethereal less than 0.10.13-2.30"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6115</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6115" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6115" source="CVE"/>
	<description>
	Buffer overflow in the ANSI MAP dissector for Wireshark (formerly Ethereal) 0.99.5 to 0.99.6, when running on unspecified platforms, allows remote attackers to cause a denial of service and possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- aab8a806c000656fefc91ad0e08dc893 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031588" comment="ethereal less than 0.10.13-2.30"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6116</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6116" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6116" source="CVE"/>
	<description>
	The Firebird/Interbase dissector in Wireshark (formerly Ethereal) 0.99.6 allows remote attackers to cause a denial of service (infinite loop or crash) via unknown vectors.
	</description>
 </metadata>
<!-- aab8a806c000656fefc91ad0e08dc893 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031588" comment="ethereal less than 0.10.13-2.30"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6117</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6117" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6117" source="CVE"/>
	<description>
	Unspecified vulnerability in the HTTP dissector for Wireshark (formerly Ethereal) 0.10.14 to 0.99.6 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted chunked messages.
	</description>
 </metadata>
<!-- aab8a806c000656fefc91ad0e08dc893 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031588" comment="ethereal less than 0.10.13-2.30"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6118</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6118" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6118" source="CVE"/>
	<description>
	The MEGACO dissector in Wireshark (formerly Ethereal) 0.9.14 to 0.99.6 allows remote attackers to cause a denial of service (long loop and resource consumption) via unknown vectors.
	</description>
 </metadata>
<!-- aab8a806c000656fefc91ad0e08dc893 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031588" comment="ethereal less than 0.10.13-2.30"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6119</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6119" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6119" source="CVE"/>
	<description>
	The DCP ETSI dissector in Wireshark (formerly Ethereal) 0.99.6 allows remote attackers to cause a denial of service (long loop and resource consumption) via unknown vectors.
	</description>
 </metadata>
<!-- aab8a806c000656fefc91ad0e08dc893 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031588" comment="ethereal less than 0.10.13-2.30"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6120</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6120" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6120" source="CVE"/>
	<description>
	The Bluetooth SDP dissector Wireshark (formerly Ethereal) 0.99.2 to 0.99.6 allows remote attackers to cause a denial of service (infinite loop) via unknown vectors.
	</description>
 </metadata>
<!-- aab8a806c000656fefc91ad0e08dc893 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031588" comment="ethereal less than 0.10.13-2.30"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6121</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6121" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6121" source="CVE"/>
	<description>
	Wireshark (formerly Ethereal) 0.8.16 to 0.99.6 allows remote attackers to cause a denial of service (crash) via a malformed RPC Portmap packet.
	</description>
 </metadata>
<!-- aab8a806c000656fefc91ad0e08dc893 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031588" comment="ethereal less than 0.10.13-2.30"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6151</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6151" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6151" source="CVE"/>
	<description>
	The isdn_ioctl function in isdn_common.c in Linux kernel 2.6.23 allows local users to cause a denial of service via a crafted ioctl struct in which iocts is not null terminated, which triggers a buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- aab836528f99df07c43db5dd38e62ad0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031377" comment="kernel-bigsmp less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031378" comment="kernel-default less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031379" comment="kernel-smp less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031380" comment="kernel-source less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031381" comment="kernel-syms less than 2.6.5-7.311"/>
		</criteria>
	</criteria>
	<!-- b6d5f6e00bbd43399d33b9d8b687ee37 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031378" comment="kernel-default less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031379" comment="kernel-smp less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031380" comment="kernel-source less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031381" comment="kernel-syms less than 2.6.5-7.311"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6167</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6167" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6167" source="CVE"/>
	<description>
	Untrusted search path vulnerability in yast2-core in SUSE Linux might allow local users to execute arbitrary code by creating a malicious yast2 module in the current working directory.
	</description>
 </metadata>
<!-- b2b5779b3105842f8b7ea5b6992883ad -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031589" comment="yast2-core-devel less than 2.9.98.1-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031590" comment="yast2-core less than 2.9.98.1-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6199</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6199" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6199" source="CVE"/>
	<description>
	rsync before 3.0.0pre6, when running a writable rsync daemon that is not using chroot, allows remote attackers to access restricted files via unknown vectors that cause rsync to create a symlink that points outside of the module's hierarchy.
	</description>
 </metadata>
<!-- 8b7ab8a915e5a096afe4ffa851d5be91 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031591" comment="rsync less than 2.6.8-53.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6200</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6200" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6200" source="CVE"/>
	<description>
	Unspecified vulnerability in rsync before 3.0.0pre6, when running a writable rsync daemon, allows remote attackers to bypass exclude, exclude_from, and filter and read or write hidden files via (1) symlink, (2) partial-dir, (3) backup-dir, and unspecified (4) dest options.
	</description>
 </metadata>
<!-- 8b7ab8a915e5a096afe4ffa851d5be91 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031591" comment="rsync less than 2.6.8-53.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6203</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6203" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6203" source="CVE"/>
	<description>
	Apache HTTP Server 2.0.x and 2.2.x does not sanitize the HTTP Method specifier header from an HTTP request when it is reflected back in a "413 Request Entity Too Large" error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated via an HTTP request containing an invalid Content-length value, a similar issue to CVE-2006-3918.
	</description>
 </metadata>
<!-- 2c87b234552522821a81df2a63d03f8c -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031503" comment="libapr0 less than 2.0.59-1.8"/>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031504" comment="apache2-devel less than 2.0.59-1.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031505" comment="apache2-prefork less than 2.0.59-1.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031506" comment="apache2-worker less than 2.0.59-1.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031507" comment="apache2 less than 2.0.59-1.8"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6242</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6242" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player 9.0.48.0 and earlier might allow remote attackers to execute arbitrary code via unknown vectors, related to "input validation errors."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- abac03d3ea3f90145ddbc82fdd20aebd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031399" comment="flash-player less than 9.0.48.0-4.4"/>
	</criteria>
	<!-- da23b892b7b8f9906bc126fad5902356 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031400" comment="flash-player less than 9.0.115.0-0.2"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6243</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6243" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6243" source="CVE"/>
	<description>
	Adobe Flash Player 9.x up to 9.0.48.0, 8.x up to 8.0.35.0, and 7.x up to 7.0.70.0 does not sufficiently restrict the interpretation and usage of cross-domain policy files, which makes it easier for remote attackers to conduct cross-domain and cross-site scripting (XSS) attacks.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- abac03d3ea3f90145ddbc82fdd20aebd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031399" comment="flash-player less than 9.0.48.0-4.4"/>
	</criteria>
	<!-- bf0bfd1ab7b4dfb4cb1cd0bf88a5fb58 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031150" comment="flash-player less than 9.0.124.0-0.1"/>
	</criteria>
	<!-- da23b892b7b8f9906bc126fad5902356 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031400" comment="flash-player less than 9.0.115.0-0.2"/>
	</criteria>
	<!-- edd13d7bde2f2ca4007725ec6281d6bd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031401" comment="flash-player less than 9.0.151.0-0.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6244</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6244" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in Adobe Flash Player 9.x up to 9.0.48.0 and 8.x up to 8.0.35.0 allow remote attackers to inject arbitrary web script or HTML via (1) a SWF file that uses the asfunction: protocol or (2) the navigateToURL function when used with the Flash Player ActiveX Control in Internet Explorer.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- abac03d3ea3f90145ddbc82fdd20aebd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031399" comment="flash-player less than 9.0.48.0-4.4"/>
	</criteria>
	<!-- da23b892b7b8f9906bc126fad5902356 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031400" comment="flash-player less than 9.0.115.0-0.2"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6245</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6245" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6245" source="CVE"/>
	<description>
	Adobe Flash Player 9.x up to 9.0.48.0, 8.x up to 8.0.35.0, and 7.x up to 7.0.70.0 allows remote attackers to modify HTTP headers for client requests and conduct HTTP Request Splitting attacks.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- abac03d3ea3f90145ddbc82fdd20aebd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031399" comment="flash-player less than 9.0.48.0-4.4"/>
	</criteria>
	<!-- da23b892b7b8f9906bc126fad5902356 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031400" comment="flash-player less than 9.0.115.0-0.2"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6246</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6246" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6246" source="CVE"/>
	<description>
	Adobe Flash Player 9.x up to 9.0.48.0, 8.x up to 8.0.35.0, and 7.x up to 7.0.70.0, when running on Linux, uses insecure permissions for memory, which might allow local users to gain privileges.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- abac03d3ea3f90145ddbc82fdd20aebd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031399" comment="flash-player less than 9.0.48.0-4.4"/>
	</criteria>
	<!-- da23b892b7b8f9906bc126fad5902356 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031400" comment="flash-player less than 9.0.115.0-0.2"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6282</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6282" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6282" source="CVE"/>
	<description>
	The IPsec implementation in Linux kernel before 2.6.25 allows remote routers to cause a denial of service (crash) via a fragmented ESP packet in which the first fragment does not contain the entire ESP header and IV.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 853e9a34519c5d7f690c2da465430026 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031592" comment="kernel-bigsmp less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031593" comment="kernel-default less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031594" comment="kernel-smp less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031595" comment="kernel-source less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031596" comment="kernel-syms less than 2.6.5-7.312"/>
		</criteria>
	</criteria>
	<!-- dab7f48c7af593b70adc01d0c3a450b8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031593" comment="kernel-default less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031594" comment="kernel-smp less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031595" comment="kernel-source less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031596" comment="kernel-syms less than 2.6.5-7.312"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6284</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6284" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6284" source="CVE"/>
	<description>
	The xmlCurrentChar function in libxml2 before 2.6.31 allows context-dependent attackers to cause a denial of service (infinite loop) via XML containing invalid UTF-8 sequences.
	</description>
 </metadata>
<!-- f9364893382df399b6831f0d5db6e063 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031597" comment="libxml2-32bit less than 9-200712191220"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031598" comment="libxml2-devel less than 2.6.7-28.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031599" comment="libxml2-python less than 2.6.7-46.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031600" comment="libxml2 less than 2.6.7-28.11"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031599" comment="libxml2-python less than 2.6.7-46.11"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6303</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6303" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6303" source="CVE"/>
	<description>
	MySQL 5.0.x before 5.0.51a, 5.1.x before 5.1.23, and 6.0.x before 6.0.4 does not update the DEFINER value of a view when the view is altered, which allows remote authenticated users to gain privileges via a sequence of statements including a CREATE SQL SECURITY DEFINER VIEW statement and an ALTER VIEW statement.
	</description>
 </metadata>
<!-- 7cb80eb2033195041bfb93aa6b99a517 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031290" comment="mysql-Max less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031291" comment="mysql-bench less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031292" comment="mysql-client less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031293" comment="mysql-devel less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031294" comment="mysql-shared less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031295" comment="mysql less than 4.0.18-32.32"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6304</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6304" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6304" source="CVE"/>
	<description>
	The federated engine in MySQL 5.0.x before 5.0.51a, 5.1.x before 5.1.23, and 6.0.x before 6.0.4, when performing a certain SHOW TABLE STATUS query, allows remote MySQL servers to cause a denial of service (federated handler crash and daemon crash) via a response that lacks the minimum required number of columns.
	</description>
 </metadata>
<!-- 7cb80eb2033195041bfb93aa6b99a517 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031290" comment="mysql-Max less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031291" comment="mysql-bench less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031292" comment="mysql-client less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031293" comment="mysql-devel less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031294" comment="mysql-shared less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031295" comment="mysql less than 4.0.18-32.32"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6351</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6351" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6351" source="CVE"/>
	<description>
	libexif 0.6.16 and earlier allows context-dependent attackers to cause a denial of service (infinite recursion) via an image file with crafted EXIF tags, possibly involving the exif_loader_write function in exif_loader.c.
	</description>
 </metadata>
<!-- 23b2b9b4c711d113313d3391e1ccaf7b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031601" comment="libexif-32bit less than 9-200801091453"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031602" comment="libexif less than 0.5.12-118.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6352</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6352" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6352" source="CVE"/>
	<description>
	Integer overflow in libexif 0.6.16 and earlier allows context-dependent attackers to execute arbitrary code via an image with crafted EXIF tags, possibly involving the exif_data_load_data_thumbnail function in exif-data.c.
	</description>
 </metadata>
<!-- 23b2b9b4c711d113313d3391e1ccaf7b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031601" comment="libexif-32bit less than 9-200801091453"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031602" comment="libexif less than 0.5.12-118.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6388</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6388" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6388" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in mod_status in the Apache HTTP Server 2.2.0 through 2.2.6, 2.0.35 through 2.0.61, and 1.3.2 through 1.3.39, when the server-status page is enabled, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2c87b234552522821a81df2a63d03f8c -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031503" comment="libapr0 less than 2.0.59-1.8"/>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009031504" comment="apache2-devel less than 2.0.59-1.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031505" comment="apache2-prefork less than 2.0.59-1.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031506" comment="apache2-worker less than 2.0.59-1.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031507" comment="apache2 less than 2.0.59-1.8"/>
			</criteria>
		</criteria></criteria>
	<!-- 484f33da03a9e3e4632f40254c4a96a3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030903" comment="apache-devel less than 1.3.29-71.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030904" comment="apache less than 1.3.29-71.26"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6427</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6427" source="CVE"/>
	<description>
	The XInput extension in X.Org Xserver before 1.4.1 allows context-dependent attackers to execute arbitrary code via requests related to byte swapping and heap corruption within multiple functions, a different vulnerability than CVE-2007-4990.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 56240f6955337ddf455d2aa23797006a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031528" comment="XFree86-libs-32bit less than 9-200801062003"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031529" comment="XFree86-libs less than 4.3.99.902-43.94"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031530" comment="XFree86-server less than 4.3.99.902-43.94"/>
		</criteria>
	</criteria>
	<!-- 686ed843d1dc7672badd026d1d0712c1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031531" comment="XFree86-Xnest less than 4.3.99.902-43.94"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031532" comment="XFree86-Xvfb less than 4.3.99.902-43.94"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6428</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6428" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6428" source="CVE"/>
	<description>
	The ProcGetReservedColormapEntries function in the TOG-CUP extension in X.Org Xserver before 1.4.1 allows context-dependent attackers to read the contents of arbitrary memory locations via a request containing a 32-bit value that is improperly used as an array index.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 56240f6955337ddf455d2aa23797006a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031528" comment="XFree86-libs-32bit less than 9-200801062003"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031529" comment="XFree86-libs less than 4.3.99.902-43.94"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031530" comment="XFree86-server less than 4.3.99.902-43.94"/>
		</criteria>
	</criteria>
	<!-- 686ed843d1dc7672badd026d1d0712c1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031531" comment="XFree86-Xnest less than 4.3.99.902-43.94"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031532" comment="XFree86-Xvfb less than 4.3.99.902-43.94"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6429</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6429" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6429" source="CVE"/>
	<description>
	Multiple integer overflows in X.Org Xserver before 1.4.1 allow context-dependent attackers to execute arbitrary code via (1) a GetVisualInfo request containing a 32-bit value that is improperly used to calculate an amount of memory for allocation by the EVI extension, or (2) a request containing values related to pixmap size that are improperly used in management of shared memory by the MIT-SHM extension.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 56240f6955337ddf455d2aa23797006a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031528" comment="XFree86-libs-32bit less than 9-200801062003"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031529" comment="XFree86-libs less than 4.3.99.902-43.94"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031530" comment="XFree86-server less than 4.3.99.902-43.94"/>
		</criteria>
	</criteria>
	<!-- 686ed843d1dc7672badd026d1d0712c1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031531" comment="XFree86-Xnest less than 4.3.99.902-43.94"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031532" comment="XFree86-Xvfb less than 4.3.99.902-43.94"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6438</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6438" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6438" source="CVE"/>
	<description>
	Unspecified vulnerability in the SMB dissector in Wireshark (formerly Ethereal) 0.99.6 allows remote attackers to cause a denial of service via unknown vectors.  NOTE: this identifier originally included MP3 and NCP, but those issues are already covered by CVE-2007-6111.
	</description>
 </metadata>
<!-- aab8a806c000656fefc91ad0e08dc893 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031588" comment="ethereal less than 0.10.13-2.30"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6439</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6439" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6439" source="CVE"/>
	<description>
	Wireshark (formerly Ethereal) 0.99.6 allows remote attackers to cause a denial of service (infinite or large loop) via the (1) IPv6 or (2) USB dissector, which can trigger resource consumption or a crash. NOTE: this identifier originally included Firebird/Interbase, but it is already covered by CVE-2007-6116.  The DCP ETSI issue is already covered by CVE-2007-6119.
	</description>
 </metadata>
<!-- aab8a806c000656fefc91ad0e08dc893 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031588" comment="ethereal less than 0.10.13-2.30"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6441</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6441" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6441" source="CVE"/>
	<description>
	The WiMAX dissector in Wireshark (formerly Ethereal) 0.99.6 allows remote attackers to cause a denial of service (crash) via unknown vectors related to "unaligned access on some platforms."
	</description>
 </metadata>
<!-- aab8a806c000656fefc91ad0e08dc893 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031588" comment="ethereal less than 0.10.13-2.30"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6450</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6450" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6450" source="CVE"/>
	<description>
	The RPL dissector in Wireshark (formerly Ethereal) 0.9.8 to 0.99.6 allows remote attackers to cause a denial of service (infinite loop) via unknown vectors.
	</description>
 </metadata>
<!-- aab8a806c000656fefc91ad0e08dc893 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031588" comment="ethereal less than 0.10.13-2.30"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6451</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6451" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6451" source="CVE"/>
	<description>
	Unspecified vulnerability in the CIP dissector in Wireshark (formerly Ethereal) 0.9.14 to 0.99.6 allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger allocation of large amounts of memory.
	</description>
 </metadata>
<!-- aab8a806c000656fefc91ad0e08dc893 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031588" comment="ethereal less than 0.10.13-2.30"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6600</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6600" source="CVE"/>
	<description>
	PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, 7.4 before 7.4.19, and 7.3 before 7.3.21 uses superuser privileges instead of table owner privileges for (1) VACUUM and (2) ANALYZE operations within index functions, and supports (3) SET ROLE and (4) SET SESSION AUTHORIZATION within index functions, which allows remote authenticated users to gain privileges.
	</description>
 </metadata>
<!-- b923c74e6ff969e6dca94231c2d4e667 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031433" comment="postgresql-contrib less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031434" comment="postgresql-devel less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031435" comment="postgresql-docs less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031436" comment="postgresql-libs-32bit less than 9-200801312100"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031437" comment="postgresql-libs less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031438" comment="postgresql-pl less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031439" comment="postgresql-server less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031440" comment="postgresql less than 7.4.19-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6601</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6601" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6601" source="CVE"/>
	<description>
	The DBLink module in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, 7.4 before 7.4.19, and 7.3 before 7.3.21, when local trust or ident authentication is used, allows remote attackers to gain privileges via unspecified vectors.  NOTE: this issue exists because of an incomplete fix for CVE-2007-3278.
	</description>
 </metadata>
<!-- b923c74e6ff969e6dca94231c2d4e667 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031433" comment="postgresql-contrib less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031434" comment="postgresql-devel less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031435" comment="postgresql-docs less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031436" comment="postgresql-libs-32bit less than 9-200801312100"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031437" comment="postgresql-libs less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031438" comment="postgresql-pl less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031439" comment="postgresql-server less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031440" comment="postgresql less than 7.4.19-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6637</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6637" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6637" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in Adobe Flash Player allow remote attackers to inject arbitrary web script or HTML via a crafted SWF file, related to "pre-generated SWF files" and Adobe Dreamweaver CS3 or Adobe Acrobat Connect.  NOTE: the asfunction: vector is already covered by CVE-2007-6244.1.
	</description>
 </metadata>
<!-- bf0bfd1ab7b4dfb4cb1cd0bf88a5fb58 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031150" comment="flash-player less than 9.0.124.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6698</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6698" source="CVE"/>
	<description>
	The BDB backend for slapd in OpenLDAP before 2.3.36 allows remote authenticated users to cause a denial of service (crash) via a potentially-successful modify operation with the NOOP control set to critical, possibly due to a double free vulnerability.
	</description>
 </metadata>
<!-- db61a2ae569744603c72552a38a58c12 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031603" comment="openldap2-back-ldap less than 2.2.24-4.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031604" comment="openldap2-back-meta less than 2.2.24-4.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031605" comment="openldap2-back-monitor less than 2.2.24-4.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031606" comment="openldap2-back-perl less than 2.2.24-4.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031607" comment="openldap2-client-32bit less than 9-200802110138"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031608" comment="openldap2-client less than 2.2.24-4.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031609" comment="openldap2-devel-32bit less than 9-200802110138"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031610" comment="openldap2-devel less than 2.2.24-4.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031611" comment="openldap2 less than 2.2.24-4.25"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6716</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6716" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6716" source="CVE"/>
	<description>
	fs/direct-io.c in the dio subsystem in the Linux kernel before 2.6.23 does not properly zero out the dio struct, which allows local users to cause a denial of service (OOPS), as demonstrated by a certain fio test.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7f6082d83ebb412cb08a347f1d4f15d4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031612" comment="kernel-bigsmp less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031613" comment="kernel-default less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031614" comment="kernel-smp less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
	<!-- ab571d638a77193397f7750e6adc1db1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031613" comment="kernel-default less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031614" comment="kernel-smp less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6720</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6720" source="CVE"/>
	<description>
	libmikmod 3.1.9 through 3.2.0, as used by MikMod, SDL-mixer, and possibly other products, relies on the channel count of the last loaded song, rather than the currently playing song, for certain playback calculations, which allows user-assisted attackers to cause a denial of service (application crash) by loading multiple songs (aka MOD files) with different numbers of channels.
	</description>
 </metadata>
<!-- 639b367ae0bb9c20f36d43ad4161177e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031617" comment="libmikmod-32bit less than 9-200902271558"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031618" comment="libmikmod less than 3.1.10-662.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6725</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2007-6725" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6725" source="CVE"/>
	<description>
	The CCITTFax decoding filter in Ghostscript 8.60, 8.61, and possibly other versions, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PDF file that triggers a buffer underflow in the cf_decode_2d function.
	</description>
 </metadata>
<!-- c6678e67cf231f1f6438ecd15943042f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031619" comment="ghostscript-fonts-other less than 7.07.1rc1-195.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031620" comment="ghostscript-fonts-rus less than 7.07.1rc1-195.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031621" comment="ghostscript-fonts-std less than 7.07.1rc1-195.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031622" comment="ghostscript-library less than 7.07.1rc1-195.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031623" comment="ghostscript-serv less than 7.07.1rc1-195.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031624" comment="ghostscript-x11 less than 7.07.1rc1-195.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031625" comment="libgimpprint-devel less than 4.2.6-46.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031626" comment="libgimpprint less than 4.2.6-46.17"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0005</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-0005" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0005" source="CVE"/>
	<description>
	mod_proxy_ftp in Apache 2.2.x before 2.2.7-dev, 2.0.x before 2.0.62-dev, and 1.3.x before 1.3.40-dev does not define a charset, which allows remote attackers to conduct cross-site scripting (XSS) attacks using UTF-7 encoding.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2c87b234552522821a81df2a63d03f8c -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031503" comment="libapr0 less than 2.0.59-1.8"/>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009031504" comment="apache2-devel less than 2.0.59-1.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031505" comment="apache2-prefork less than 2.0.59-1.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031506" comment="apache2-worker less than 2.0.59-1.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031507" comment="apache2 less than 2.0.59-1.8"/>
			</criteria>
		</criteria></criteria>
	<!-- 484f33da03a9e3e4632f40254c4a96a3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030903" comment="apache-devel less than 1.3.29-71.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030904" comment="apache less than 1.3.29-71.26"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0006</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-0006" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0006" source="CVE"/>
	<description>
	Buffer overflow in (1) X.Org Xserver before 1.4.1, and (2) the libfont and libXfont libraries on some platforms including Sun Solaris, allows context-dependent attackers to execute arbitrary code via a PCF font with a large difference between the last col and first col values in the PCF_BDF_ENCODINGS table.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 56240f6955337ddf455d2aa23797006a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031528" comment="XFree86-libs-32bit less than 9-200801062003"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031529" comment="XFree86-libs less than 4.3.99.902-43.94"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031530" comment="XFree86-server less than 4.3.99.902-43.94"/>
		</criteria>
	</criteria>
	<!-- 686ed843d1dc7672badd026d1d0712c1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031531" comment="XFree86-Xnest less than 4.3.99.902-43.94"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031532" comment="XFree86-Xvfb less than 4.3.99.902-43.94"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0007</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-0007" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0007" source="CVE"/>
	<description>
	Linux kernel before 2.6.22.17, when using certain drivers that register a fault handler that does not perform range checks, allows local users to access kernel memory via an out-of-range offset.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- aab836528f99df07c43db5dd38e62ad0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031377" comment="kernel-bigsmp less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031378" comment="kernel-default less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031379" comment="kernel-smp less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031380" comment="kernel-source less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031381" comment="kernel-syms less than 2.6.5-7.311"/>
		</criteria>
	</criteria>
	<!-- b6d5f6e00bbd43399d33b9d8b687ee37 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031378" comment="kernel-default less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031379" comment="kernel-smp less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031380" comment="kernel-source less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031381" comment="kernel-syms less than 2.6.5-7.311"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0016</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-0016" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0016" source="CVE"/>
	<description>
	Stack-based buffer overflow in the URL parsing implementation in Mozilla Firefox before 2.0.0.17 and SeaMonkey before 1.1.12 allows remote attackers to execute arbitrary code via a crafted UTF-8 URL in a link.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- f6315c5c6bde445e37c2730b22895fc0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031627" comment="epiphany-doc less than 1.2.10-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031628" comment="epiphany-extensions-devel less than 0.8.2-2.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031629" comment="epiphany-extensions less than 0.8.2-2.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031630" comment="epiphany less than 1.2.10-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031631" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031632" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031633" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031634" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031635" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031636" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031637" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031638" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031639" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031640" comment="mozilla less than 1.8_seamonkey_1.0.9-1.15"/>
		</criteria>
	</criteria>
	<!-- f8b2838afc3706a1f79bd864e2618613 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031641" comment="MozillaFirefox-translations less than 1.5.0.12-0.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031642" comment="MozillaFirefox less than 1.5.0.12-0.13"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0017</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-0017" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0017" source="CVE"/>
	<description>
	The http-index-format MIME type parser (nsDirIndexParser) in Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 does not check for an allocation failure, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an HTTP index response with a crafted 200 header, which triggers memory corruption and a buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 43ce1734b8f340b9b8cd0bc5a8718241 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031643" comment="MozillaFirefox-translations less than 1.5.0.12-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031644" comment="MozillaFirefox less than 1.5.0.12-0.15"/>
		</criteria>
	</criteria>
	<!-- 55d1889fabf24d9bac066219efec8b53 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031645" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031646" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031647" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031648" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031649" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031650" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031651" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031652" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031653" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031654" comment="mozilla less than 1.8_seamonkey_1.0.9-1.17"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0053</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-0053" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0053" source="CVE"/>
	<description>
	Multiple buffer overflows in the HP-GL/2-to-PostScript filter in CUPS before 1.3.6 might allow remote attackers to execute arbitrary code via a crafted HP-GL/2 file.
	</description>
 </metadata>
<!-- b8c1c10ee3584bcc23b201ff91e9ce95 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031655" comment="cups-client less than 1.1.20-108.50"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031656" comment="cups-devel less than 1.1.20-108.50"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031657" comment="cups-libs-32bit less than 9-200803201838"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031658" comment="cups-libs less than 1.1.20-108.50"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031659" comment="cups less than 1.1.20-108.50"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0072</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-0072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0072" source="CVE"/>
	<description>
	Format string vulnerability in the emf_multipart_encrypted function in mail/em-format.c in Evolution 2.12.3 and earlier allows remote attackers to execute arbitrary code via a crafted encrypted message, as demonstrated using the Version field.
	</description>
 </metadata>
<!-- d93d20ddb38276f9b6f334240fd20e16 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031660" comment="evolution-devel less than 2.0.4-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031661" comment="evolution-pilot less than 2.0.4-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031662" comment="evolution less than 2.0.4-0.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0073</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-0073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0073" source="CVE"/>
	<description>
	Array index error in the sdpplin_parse function in input/libreal/sdpplin.c in xine-lib 1.1.10.1 allows remote RTSP servers to execute arbitrary code via a large streamid SDP parameter.
	</description>
 </metadata>
<!-- f63161ec998be7cdf59b27f04dc6be70 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031663" comment="xine-lib-32bit less than 9-200803202027"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031664" comment="xine-lib less than 0.99.rc3a-106.43"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031665" comment="xine-devel less than 0.99.rc3a-106.43"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031666" comment="xine-extra less than 0.99.rc3a-106.43"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031664" comment="xine-lib less than 0.99.rc3a-106.43"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031667" comment="xine-ui less than 0.99.rc3a-106.43"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0122</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-0122" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0122" source="CVE"/>
	<description>
	Off-by-one error in the inet_network function in libbind in ISC BIND 9.4.2 and earlier, as used in libc in FreeBSD 6.2 through 7.0-PRERELEASE, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted input that triggers memory corruption.
	</description>
 </metadata>
<!-- 7afe858ccb0103a56cad145635e13ece -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031668" comment="bind-devel less than 9.3.4-4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031669" comment="bind-utils-32bit less than 9-200801211531"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031670" comment="bind-utils less than 9.3.4-4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031671" comment="bind less than 9.3.4-4.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0128</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-0128" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0128" source="CVE"/>
	<description>
	The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apache Tomcat before 5.5.21 does not set the secure flag for the JSESSIONIDSSO cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.
	</description>
 </metadata>
<!-- 315ff7a101fca9aabbfab11879f31212 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030636" comment="jakarta-tomcat less than 5.0.19-29.11"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0225</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-0225" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0225" source="CVE"/>
	<description>
	Heap-based buffer overflow in the rmff_dump_cont function in input/libreal/rmff.c in xine-lib 1.1.9 and earlier allows remote attackers to execute arbitrary code via the SDP Abstract attribute in an RTSP session, related to the rmff_dump_header function and related to disregarding the max field.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 8af3aedc81f892a1e5fbccb8c5c45e7d -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031672" comment="xine-lib-32bit less than 9-200801171028"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031673" comment="xine-lib less than 0.99.rc3a-106.41"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031674" comment="xine-devel less than 0.99.rc3a-106.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031675" comment="xine-extra less than 0.99.rc3a-106.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031673" comment="xine-lib less than 0.99.rc3a-106.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031676" comment="xine-ui less than 0.99.rc3a-106.41"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0320</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-0320" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0320" source="CVE"/>
	<description>
	Heap-based buffer overflow in the OLE importer in OpenOffice.org before 2.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an OLE file with a crafted DocumentSummaryInformation stream.
	</description>
 </metadata>
<!-- f6a476d94870d717c3a93c69ce56d196 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031447" comment="OpenOffice_org-ar less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031448" comment="OpenOffice_org-ca less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031449" comment="OpenOffice_org-cs less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031450" comment="OpenOffice_org-da less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031451" comment="OpenOffice_org-de less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031452" comment="OpenOffice_org-el less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031453" comment="OpenOffice_org-en-help less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031454" comment="OpenOffice_org-en less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031455" comment="OpenOffice_org-es less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031456" comment="OpenOffice_org-et less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031457" comment="OpenOffice_org-fi less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031458" comment="OpenOffice_org-fr less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031459" comment="OpenOffice_org-gnome less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031460" comment="OpenOffice_org-hu less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031461" comment="OpenOffice_org-it less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031462" comment="OpenOffice_org-ja less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031463" comment="OpenOffice_org-kde less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031464" comment="OpenOffice_org-ko less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031465" comment="OpenOffice_org-nl less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031466" comment="OpenOffice_org-pl less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031467" comment="OpenOffice_org-pt-BR less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031468" comment="OpenOffice_org-pt less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031469" comment="OpenOffice_org-ru less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031470" comment="OpenOffice_org-sk less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031471" comment="OpenOffice_org-sl less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031472" comment="OpenOffice_org-sv less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031473" comment="OpenOffice_org-tr less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031474" comment="OpenOffice_org-zh-CN less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031475" comment="OpenOffice_org-zh-TW less than 1.1.5-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031476" comment="OpenOffice_org less than 1.1.5-0.22"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0411</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-0411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0411" source="CVE"/>
	<description>
	Stack-based buffer overflow in the zseticcspace function in zicc.c in Ghostscript 8.61 and earlier allows remote attackers to execute arbitrary code via a postscript (.ps) file containing a long Range array in a .seticcspace operator.
	</description>
 </metadata>
<!-- 9c324f30fcb2a47560860b00be29ea05 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031677" comment="ghostscript-fonts-other less than 7.07.1rc1-195.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031678" comment="ghostscript-fonts-rus less than 7.07.1rc1-195.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031679" comment="ghostscript-fonts-std less than 7.07.1rc1-195.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031680" comment="ghostscript-library less than 7.07.1rc1-195.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031681" comment="ghostscript-serv less than 7.07.1rc1-195.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031682" comment="ghostscript-x11 less than 7.07.1rc1-195.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031683" comment="libgimpprint-devel less than 4.2.6-46.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031684" comment="libgimpprint less than 4.2.6-46.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0412</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-0412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0412" source="CVE"/>
	<description>
	The browser engine in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allows remote attackers to cause a denial of service (crash) and possibly trigger memory corruption via vectors related to the (1) nsTableFrame::GetFrameAtOrBefore, (2) nsAccessibilityService::GetAccessible, (3) nsBindingManager::GetNestedInsertionPoint, (4) nsXBLPrototypeBinding::AttributeChanged, (5) nsColumnSetFrame::GetContentInsertionFrame, and (6) nsLineLayout::TrimTrailingWhiteSpaceIn methods, and other vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 25e2ffcf469ccafcac7d9108475aa0a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031685" comment="MozillaFirefox-translations less than 1.5.0.12-0.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031686" comment="MozillaFirefox less than 1.5.0.12-0.9"/>
		</criteria>
	</criteria>
	<!-- 5cfea67de8b82bf442ad7c4663356e99 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031687" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031688" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031689" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031690" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031691" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031692" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031693" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031694" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031695" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031696" comment="mozilla less than 1.8_seamonkey_1.0.9-1.10"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0413</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-0413" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0413" source="CVE"/>
	<description>
	The JavaScript engine in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allows remote attackers to cause a denial of service (crash) and possibly trigger memory corruption via (1) a large switch statement, (2) certain uses of watch and eval, (3) certain uses of the mousedown event listener, and other vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 25e2ffcf469ccafcac7d9108475aa0a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031685" comment="MozillaFirefox-translations less than 1.5.0.12-0.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031686" comment="MozillaFirefox less than 1.5.0.12-0.9"/>
		</criteria>
	</criteria>
	<!-- 5cfea67de8b82bf442ad7c4663356e99 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031687" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031688" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031689" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031690" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031691" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031692" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031693" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031694" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031695" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031696" comment="mozilla less than 1.8_seamonkey_1.0.9-1.10"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0414</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-0414" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0414" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows user-assisted remote attackers to trick the user into uploading arbitrary files via label tags that shift focus to a file input field, aka "focus spoofing."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 25e2ffcf469ccafcac7d9108475aa0a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031685" comment="MozillaFirefox-translations less than 1.5.0.12-0.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031686" comment="MozillaFirefox less than 1.5.0.12-0.9"/>
		</criteria>
	</criteria>
	<!-- 5cfea67de8b82bf442ad7c4663356e99 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031687" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031688" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031689" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031690" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031691" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031692" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031693" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031694" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031695" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031696" comment="mozilla less than 1.8_seamonkey_1.0.9-1.10"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0415</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-0415" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0415" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allows remote attackers to execute script outside of the sandbox and conduct cross-site scripting (XSS) attacks via multiple vectors including the XMLDocument.load function, aka "JavaScript privilege escalation bugs."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 25e2ffcf469ccafcac7d9108475aa0a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031685" comment="MozillaFirefox-translations less than 1.5.0.12-0.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031686" comment="MozillaFirefox less than 1.5.0.12-0.9"/>
		</criteria>
	</criteria>
	<!-- 5cfea67de8b82bf442ad7c4663356e99 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031687" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031688" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031689" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031690" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031691" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031692" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031693" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031694" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031695" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031696" comment="mozilla less than 1.8_seamonkey_1.0.9-1.10"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0417</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-0417" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0417" source="CVE"/>
	<description>
	CRLF injection vulnerability in Mozilla Firefox before 2.0.0.12 allows remote user-assisted web sites to corrupt the user's password store via newlines that are not properly handled when the user saves a password.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 25e2ffcf469ccafcac7d9108475aa0a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031685" comment="MozillaFirefox-translations less than 1.5.0.12-0.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031686" comment="MozillaFirefox less than 1.5.0.12-0.9"/>
		</criteria>
	</criteria>
	<!-- 5cfea67de8b82bf442ad7c4663356e99 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031687" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031688" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031689" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031690" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031691" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031692" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031693" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031694" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031695" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031696" comment="mozilla less than 1.8_seamonkey_1.0.9-1.10"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0418</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-0418" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0418" source="CVE"/>
	<description>
	Directory traversal vulnerability in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8, when using "flat" addons, allows remote attackers to read arbitrary Javascript, image, and stylesheet files via the chrome: URI scheme, as demonstrated by stealing session information from sessionstore.js.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 25e2ffcf469ccafcac7d9108475aa0a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031685" comment="MozillaFirefox-translations less than 1.5.0.12-0.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031686" comment="MozillaFirefox less than 1.5.0.12-0.9"/>
		</criteria>
	</criteria>
	<!-- 5cfea67de8b82bf442ad7c4663356e99 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031687" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031688" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031689" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031690" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031691" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031692" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031693" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031694" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031695" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031696" comment="mozilla less than 1.8_seamonkey_1.0.9-1.10"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0419</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-0419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0419" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows remote attackers to steal navigation history and cause a denial of service (crash) via images in a page that uses designMode frames, which triggers memory corruption related to resize handles.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 25e2ffcf469ccafcac7d9108475aa0a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031685" comment="MozillaFirefox-translations less than 1.5.0.12-0.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031686" comment="MozillaFirefox less than 1.5.0.12-0.9"/>
		</criteria>
	</criteria>
	<!-- 5cfea67de8b82bf442ad7c4663356e99 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031687" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031688" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031689" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031690" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031691" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031692" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031693" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031694" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031695" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031696" comment="mozilla less than 1.8_seamonkey_1.0.9-1.10"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0553</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-0553" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0553" source="CVE"/>
	<description>
	Stack-based buffer overflow in the ReadImage function in tkImgGIF.c in Tk (Tcl/Tk) before 8.5.1 allows remote attackers to execute arbitrary code via a crafted GIF image, a similar issue to CVE-2006-4484.
	</description>
 </metadata>
<!-- 4546b749458249bfe384e07a8f465fe5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031697" comment="tk-32bit less than 9-200802060128"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031698" comment="tk-devel less than 8.4.6-41.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031699" comment="tk less than 8.4.6-41.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0554</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-0554" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0554" source="CVE"/>
	<description>
	Buffer overflow in the readImageData function in giftopnm.c in netpbm before 10.27 in netpbm before 10.27 allows remote user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted GIF image, a similar issue to CVE-2006-4484.
	</description>
 </metadata>
<!-- b90f1d07d8dbf00ef6e210e9e4b58cf8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031700" comment="libnetpbm less than 1.0.0-618.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031701" comment="netpbm less than 10.11.4-172.16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0564</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-0564" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0564" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in Mailman before 2.1.10b1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors related to (1) editing templates and (2) the list's "info attribute" in the web administrator interface, a different vulnerability than CVE-2006-3636.
	</description>
 </metadata>
<!-- 26600278f6138b5e42cfe92fd0ee2777 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031702" comment="mailman less than 2.1.4-83.30"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0591</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-0591" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0591" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.12 and Thunderbird before 2.0.0.12 does not properly manage a delay timer used in confirmation dialogs, which might allow remote attackers to trick users into confirming an unsafe action, such as remote file execution, by using a timer to change the window focus, aka the "dialog refocus bug" or "ffclick2".
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 25e2ffcf469ccafcac7d9108475aa0a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031685" comment="MozillaFirefox-translations less than 1.5.0.12-0.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031686" comment="MozillaFirefox less than 1.5.0.12-0.9"/>
		</criteria>
	</criteria>
	<!-- 5cfea67de8b82bf442ad7c4663356e99 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031687" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031688" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031689" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031690" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031691" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031692" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031693" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031694" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031695" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031696" comment="mozilla less than 1.8_seamonkey_1.0.9-1.10"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0592</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-0592" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0592" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows user-assisted remote attackers to cause a denial of service via a plain .txt file with a "Content-Disposition: attachment" and an invalid "Content-Type: plain/text," which prevents Firefox from rendering future plain text files within the browser.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 25e2ffcf469ccafcac7d9108475aa0a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031685" comment="MozillaFirefox-translations less than 1.5.0.12-0.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031686" comment="MozillaFirefox less than 1.5.0.12-0.9"/>
		</criteria>
	</criteria>
	<!-- 5cfea67de8b82bf442ad7c4663356e99 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031687" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031688" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031689" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031690" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031691" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031692" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031693" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031694" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031695" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031696" comment="mozilla less than 1.8_seamonkey_1.0.9-1.10"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0593</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-0593" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0593" source="CVE"/>
	<description>
	Gecko-based browsers, including Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8, modify the .href property of stylesheet DOM nodes to the final URI of a 302 redirect, which might allow remote attackers to bypass the Same Origin Policy and read sensitive information from the original URL, such as with Single-Signon systems.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 25e2ffcf469ccafcac7d9108475aa0a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031685" comment="MozillaFirefox-translations less than 1.5.0.12-0.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031686" comment="MozillaFirefox less than 1.5.0.12-0.9"/>
		</criteria>
	</criteria>
	<!-- 5cfea67de8b82bf442ad7c4663356e99 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031687" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031688" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031689" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031690" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031691" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031692" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031693" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031694" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031695" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031696" comment="mozilla less than 1.8_seamonkey_1.0.9-1.10"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0594</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-0594" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0594" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.12 does not always display a web forgery warning dialog if the entire contents of a web page are in a DIV tag that uses absolute positioning, which makes it easier for remote attackers to conduct phishing attacks.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 25e2ffcf469ccafcac7d9108475aa0a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031685" comment="MozillaFirefox-translations less than 1.5.0.12-0.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031686" comment="MozillaFirefox less than 1.5.0.12-0.9"/>
		</criteria>
	</criteria>
	<!-- 5cfea67de8b82bf442ad7c4663356e99 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031687" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031688" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031689" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031690" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031691" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031692" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031693" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031694" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031695" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031696" comment="mozilla less than 1.8_seamonkey_1.0.9-1.10"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0596</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-0596" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0596" source="CVE"/>
	<description>
	Memory leak in CUPS before 1.1.22, and possibly other versions, allows remote attackers to cause a denial of service (memory consumption and daemon crash) via a large number of requests to add and remove shared printers.
	</description>
 </metadata>
<!-- 1addc7e3aa69e266f0fba3fdfef8b6c7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031703" comment="cups-client less than 1.1.20-108.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031704" comment="cups-devel less than 1.1.20-108.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031705" comment="cups-libs-32bit less than 9-200803040015"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031706" comment="cups-libs less than 1.1.20-108.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031707" comment="cups less than 1.1.20-108.48"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0597</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-0597" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0597" source="CVE"/>
	<description>
	Use-after-free vulnerability in CUPS before 1.1.22, and possibly other versions, allows remote attackers to cause a denial of service (crash) via crafted IPP packets.
	</description>
 </metadata>
<!-- 1addc7e3aa69e266f0fba3fdfef8b6c7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031703" comment="cups-client less than 1.1.20-108.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031704" comment="cups-devel less than 1.1.20-108.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031705" comment="cups-libs-32bit less than 9-200803040015"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031706" comment="cups-libs less than 1.1.20-108.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031707" comment="cups less than 1.1.20-108.48"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0598</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-0598" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0598" source="CVE"/>
	<description>
	Unspecified vulnerability in the 32-bit and 64-bit emulation in the Linux kernel 2.6.9, 2.6.18, and probably other versions allows local users to read uninitialized memory via unknown vectors involving a crafted binary.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7f6082d83ebb412cb08a347f1d4f15d4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031612" comment="kernel-bigsmp less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031613" comment="kernel-default less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031614" comment="kernel-smp less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
	<!-- ab571d638a77193397f7750e6adc1db1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031613" comment="kernel-default less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031614" comment="kernel-smp less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0658</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-0658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0658" source="CVE"/>
	<description>
	slapd/back-bdb/modrdn.c in the BDB backend for slapd in OpenLDAP 2.3.39 allows remote authenticated users to cause a denial of service (daemon crash) via a modrdn operation with a NOOP (LDAP_X_NO_OPERATION) control, a related issue to CVE-2007-6698.
	</description>
 </metadata>
<!-- db61a2ae569744603c72552a38a58c12 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031603" comment="openldap2-back-ldap less than 2.2.24-4.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031604" comment="openldap2-back-meta less than 2.2.24-4.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031605" comment="openldap2-back-monitor less than 2.2.24-4.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031606" comment="openldap2-back-perl less than 2.2.24-4.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031607" comment="openldap2-client-32bit less than 9-200802110138"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031608" comment="openldap2-client less than 2.2.24-4.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031609" comment="openldap2-devel-32bit less than 9-200802110138"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031610" comment="openldap2-devel less than 2.2.24-4.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031611" comment="openldap2 less than 2.2.24-4.25"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0668</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-0668" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0668" source="CVE"/>
	<description>
	The excel_read_HLINK function in plugins/excel/ms-excel-read.c in Gnome Office Gnumeric before 1.8.1 allows user-assisted remote attackers to execute arbitrary code via a crafted XLS file containing XLS HLINK opcodes, possibly because of an integer signedness error that leads to an integer overflow.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 90f6c9cbe92b66dc4ad450a6e1710516 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031708" comment="gnumeric less than 1.4.1-4.5"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0882</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-0882" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0882" source="CVE"/>
	<description>
	Double free vulnerability in the process_browse_data function in CUPS 1.3.5 allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via crafted UDP Browse packets to the cupsd port (631/udp), related to an unspecified manipulation of a remote printer.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 1addc7e3aa69e266f0fba3fdfef8b6c7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031703" comment="cups-client less than 1.1.20-108.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031704" comment="cups-devel less than 1.1.20-108.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031705" comment="cups-libs-32bit less than 9-200803040015"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031706" comment="cups-libs less than 1.1.20-108.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031707" comment="cups less than 1.1.20-108.48"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0960</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-0960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0960" source="CVE"/>
	<description>
	SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte.
	</description>
 </metadata>
<!-- 71093bdfd49361f6dbe32a8fde43b848 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031709" comment="net-snmp-devel less than 5.1.3.1-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031710" comment="net-snmp less than 5.1.3.1-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031711" comment="perl-SNMP less than 5.1.3.1-0.22"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1070</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1070" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1070" source="CVE"/>
	<description>
	The SCTP dissector in Wireshark (formerly Ethereal) 0.99.5 through 0.99.7 allows remote attackers to cause a denial of service (crash) via a malformed packet.
	</description>
 </metadata>
<!-- 968678e668eda057d4bdaf20099beaf1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031712" comment="ethereal less than 0.10.13-2.32"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1071</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1071" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1071" source="CVE"/>
	<description>
	The SNMP dissector in Wireshark (formerly Ethereal) 0.99.6 through 0.99.7 allows remote attackers to cause a denial of service (crash) via a malformed packet.
	</description>
 </metadata>
<!-- 968678e668eda057d4bdaf20099beaf1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031712" comment="ethereal less than 0.10.13-2.32"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1072</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1072" source="CVE"/>
	<description>
	The TFTP dissector in Wireshark (formerly Ethereal) 0.6.0 through 0.99.7, when running on Ubuntu 7.10, allows remote attackers to cause a denial of service (crash or memory consumption) via a malformed packet, possibly related to a Cairo library bug.
	</description>
 </metadata>
<!-- 968678e668eda057d4bdaf20099beaf1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031712" comment="ethereal less than 0.10.13-2.32"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1096</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1096" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1096" source="CVE"/>
	<description>
	The load_tile function in the XCF coder in coders/xcf.c in (1) ImageMagick 6.2.8-0 and (2) GraphicsMagick (aka gm) 1.1.7 allows user-assisted remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted .xcf file that triggers an out-of-bounds heap write, possibly related to the ScaleCharToQuantum function.
	</description>
 </metadata>
<!-- 00876b5798bc42f6bccea7126f32defa -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031713" comment="ImageMagick-devel less than 5.5.7-225.39"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031714" comment="ImageMagick less than 5.5.7-225.39"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031715" comment="ImageMagick-Magick++ less than 5.5.7-225.39"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031713" comment="ImageMagick-devel less than 5.5.7-225.39"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031714" comment="ImageMagick less than 5.5.7-225.39"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031716" comment="perl-PerlMagick less than 5.5.7-225.39"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1097</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1097" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1097" source="CVE"/>
	<description>
	Heap-based buffer overflow in the ReadPCXImage function in the PCX coder in coders/pcx.c in (1) ImageMagick 6.2.4-5 and 6.2.8-0 and (2) GraphicsMagick (aka gm) 1.1.7 allows user-assisted remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted .pcx file that triggers incorrect memory allocation for the scanline array, leading to memory corruption.
	</description>
 </metadata>
<!-- 00876b5798bc42f6bccea7126f32defa -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031713" comment="ImageMagick-devel less than 5.5.7-225.39"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031714" comment="ImageMagick less than 5.5.7-225.39"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031715" comment="ImageMagick-Magick++ less than 5.5.7-225.39"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031713" comment="ImageMagick-devel less than 5.5.7-225.39"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031714" comment="ImageMagick less than 5.5.7-225.39"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031716" comment="perl-PerlMagick less than 5.5.7-225.39"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1105</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1105" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1105" source="CVE"/>
	<description>
	Heap-based buffer overflow in the receive_smb_raw function in util/sock.c in Samba 3.0.0 through 3.0.29 allows remote attackers to execute arbitrary code via a crafted SMB response.
	</description>
 </metadata>
<!-- b465bc7cbc2819f28527f0fc40c5e3c7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031717" comment="ldapsmb less than 1.34b-64.1.74"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031718" comment="libsmbclient-32bit less than 9-200805282142"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031719" comment="libsmbclient-devel less than 3.0.26a-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031720" comment="libsmbclient less than 3.0.26a-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031721" comment="samba-32bit less than 9-200805282142"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031722" comment="samba-client-32bit less than 9-200805282142"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031723" comment="samba-client less than 3.0.26a-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031724" comment="samba-doc less than 3.0.26a-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031725" comment="samba-pdb less than 3.0.26a-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031726" comment="samba-python less than 3.0.26a-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031727" comment="samba-vscan less than 0.3.6b-0.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031728" comment="samba-winbind-32bit less than 9-200805282142"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031729" comment="samba-winbind less than 3.0.26a-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031730" comment="samba less than 3.0.26a-0.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1108</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1108" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1108" source="CVE"/>
	<description>
	Buffer overflow in Evolution 2.22.1, when the ITip Formatter plugin is disabled, allows remote attackers to execute arbitrary code via a long timezone string in an iCalendar attachment.
	</description>
 </metadata>
<!-- 731a8f5a7c90b93aea547074ea30a884 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031731" comment="evolution-devel less than 2.0.4-0.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031732" comment="evolution-pilot less than 2.0.4-0.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031733" comment="evolution less than 2.0.4-0.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1109</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1109" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1109" source="CVE"/>
	<description>
	Heap-based buffer overflow in Evolution 2.22.1 allows user-assisted remote attackers to execute arbitrary code via a long DESCRIPTION property in an iCalendar attachment, which is not properly handled during a reply in the calendar view (aka the Calendars window).
	</description>
 </metadata>
<!-- 731a8f5a7c90b93aea547074ea30a884 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031731" comment="evolution-devel less than 2.0.4-0.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031732" comment="evolution-pilot less than 2.0.4-0.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031733" comment="evolution less than 2.0.4-0.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1145</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1145" source="CVE"/>
	<description>
	Directory traversal vulnerability in WEBrick in Ruby 1.8 before 1.8.5-p115 and 1.8.6-p114, and 1.9 through 1.9.0-1, when running on systems that support backslash (\) path separators or case-insensitive file names, allows remote attackers to access arbitrary files via (1) "..%5c" (encoded backslash) sequences or (2) filenames that match patterns in the :NondisclosureName option.
	</description>
 </metadata>
<!-- 1e97d8857586ea9f95ec44eb9c68dfe8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031734" comment="ruby less than 1.8.1-42.24"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1185</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1185" source="CVE"/>
	<description>
	Unspecified vulnerability in the Virtual Machine for Sun Java Runtime Environment (JRE) and JDK 6 Update 4 and earlier, 5.0 Update 14 and earlier, and SDK/JRE 1.4.2_16 and earlier allows remote attackers to gain privileges via an untrusted application or applet, a different issue than CVE-2008-1186, aka "the first issue."
	</description>
 </metadata>
<!-- 981c2591380984c2225999d768ea9e97 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031735" comment="java2-jre less than 1.4.2-129.40"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031736" comment="java2 less than 1.4.2-129.40"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1186</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1186" source="CVE"/>
	<description>
	Unspecified vulnerability in the Virtual Machine for Sun Java Runtime Environment (JRE) and JDK 5.0 Update 13 and earlier, and SDK/JRE 1.4.2_16 and earlier, allows remote attackers to gain privileges via an untrusted application or applet, a different issue than CVE-2008-1185, aka "the second issue."
	</description>
 </metadata>
<!-- 981c2591380984c2225999d768ea9e97 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031735" comment="java2-jre less than 1.4.2-129.40"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031736" comment="java2 less than 1.4.2-129.40"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1187</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1187" source="CVE"/>
	<description>
	Unspecified vulnerability in Sun Java Runtime Environment (JRE) and JDK 6 Update 4 and earlier, 5.0 Update 14 and earlier, and SDK/JRE 1.4.2_16 and earlier allows remote attackers to cause a denial of service (JRE crash) and possibly execute arbitrary code via unknown vectors related to XSLT transforms.
	</description>
 </metadata>
<!-- 981c2591380984c2225999d768ea9e97 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031735" comment="java2-jre less than 1.4.2-129.40"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031736" comment="java2 less than 1.4.2-129.40"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1188</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1188" source="CVE"/>
	<description>
	Multiple buffer overflows in the useEncodingDecl function in Java Web Start in Sun JDK and JRE 6 Update 4 and earlier, and 5.0 Update 14 and earlier, allow remote attackers to execute arbitrary code via a JNLP file with (1) a long key name in the xml header or (2) a long charset value, different issues than CVE-2008-1189, aka "The first two issues."
	</description>
 </metadata>
<!-- 981c2591380984c2225999d768ea9e97 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031735" comment="java2-jre less than 1.4.2-129.40"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031736" comment="java2 less than 1.4.2-129.40"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1189</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1189" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1189" source="CVE"/>
	<description>
	Buffer overflow in Java Web Start in Sun JDK and JRE 6 Update 4 and earlier, 5.0 Update 14 and earlier, and SDK/JRE 1.4.2_16 and earlier allows remote attackers to execute arbitrary code via unknown vectors, a different issue than CVE-2008-1188, aka the "third" issue.
	</description>
 </metadata>
<!-- 981c2591380984c2225999d768ea9e97 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031735" comment="java2-jre less than 1.4.2-129.40"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031736" comment="java2 less than 1.4.2-129.40"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1190</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1190" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1190" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Web Start in Sun JDK and JRE 6 Update 4 and earlier, 5.0 Update 14 and earlier, and SDK/JRE 1.4.2_16 and earlier allows remote attackers to gain privileges via an untrusted application, a different issue than CVE-2008-1191, aka the "fourth" issue.
	</description>
 </metadata>
<!-- 981c2591380984c2225999d768ea9e97 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031735" comment="java2-jre less than 1.4.2-129.40"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031736" comment="java2 less than 1.4.2-129.40"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1191</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1191" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Web Start in Sun JDK and JRE 6 Update 4 and earlier allows remote attackers to create arbitrary files via an untrusted application, a different issue than CVE-2008-1190, aka "The fifth issue."
	</description>
 </metadata>
<!-- 981c2591380984c2225999d768ea9e97 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031735" comment="java2-jre less than 1.4.2-129.40"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031736" comment="java2 less than 1.4.2-129.40"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1192</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1192" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1192" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Plug-in for Sun JDK and JRE 6 Update 4 and earlier, and 5.0 Update 14 and earlier; and SDK and JRE 1.4.2_16 and earlier, and 1.3.1_21 and earlier; allows remote attackers to bypass the same origin policy and "execute local applications" via unknown vectors.
	</description>
 </metadata>
<!-- 981c2591380984c2225999d768ea9e97 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031735" comment="java2-jre less than 1.4.2-129.40"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031736" comment="java2 less than 1.4.2-129.40"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1195</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1195" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1195" source="CVE"/>
	<description>
	Unspecified vulnerability in Sun JDK and Java Runtime Environment (JRE) 6 Update 4 and earlier and 5.0 Update 14 and earlier; and SDK and JRE 1.4.2_16 and earlier; allows remote attackers to access arbitrary network services on the local host via unspecified vectors related to JavaScript and Java APIs.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8e287f4ed038cb8bbf6b06ae8f9ce9e5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031477" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031478" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031479" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031480" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031481" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031482" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031483" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031484" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031485" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031486" comment="mozilla less than 1.8_seamonkey_1.0.9-1.13"/>
		</criteria>
	</criteria>
	<!-- 981c2591380984c2225999d768ea9e97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031735" comment="java2-jre less than 1.4.2-129.40"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031736" comment="java2 less than 1.4.2-129.40"/>
		</criteria>
	</criteria>
	<!-- ad3e48b131593041b00e35f46ab10b61 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031487" comment="MozillaFirefox-translations less than 1.5.0.12-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031488" comment="MozillaFirefox less than 1.5.0.12-0.11"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1196</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1196" source="CVE"/>
	<description>
	Stack-based buffer overflow in Java Web Start (javaws.exe) in Sun JDK and JRE 6 Update 4 and earlier and 5.0 Update 14 and earlier; and SDK and JRE 1.4.2_16 and earlier; allows remote attackers to execute arbitrary code via a crafted JNLP file.
	</description>
 </metadata>
<!-- 981c2591380984c2225999d768ea9e97 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031735" comment="java2-jre less than 1.4.2-129.40"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031736" comment="java2 less than 1.4.2-129.40"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1232</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1232" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1232" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via a crafted string that is used in the message argument to the HttpServletResponse.sendError method.
	</description>
 </metadata>
<!-- 23efc5af9808f5fd805226a8dbae7ea1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031737" comment="jakarta-tomcat less than 5.0.19-29.16"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1233</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1233" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1233" source="CVE"/>
	<description>
	Unspecified vulnerability in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allows remote attackers to execute arbitrary code via "XPCNativeWrapper pollution."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8e287f4ed038cb8bbf6b06ae8f9ce9e5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031477" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031478" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031479" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031480" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031481" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031482" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031483" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031484" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031485" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031486" comment="mozilla less than 1.8_seamonkey_1.0.9-1.13"/>
		</criteria>
	</criteria>
	<!-- ad3e48b131593041b00e35f46ab10b61 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031487" comment="MozillaFirefox-translations less than 1.5.0.12-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031488" comment="MozillaFirefox less than 1.5.0.12-0.11"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1234</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1234" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1234" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allows remote attackers to inject arbitrary web script or HTML via event handlers, aka "Universal XSS using event handlers."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8e287f4ed038cb8bbf6b06ae8f9ce9e5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031477" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031478" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031479" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031480" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031481" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031482" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031483" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031484" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031485" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031486" comment="mozilla less than 1.8_seamonkey_1.0.9-1.13"/>
		</criteria>
	</criteria>
	<!-- ad3e48b131593041b00e35f46ab10b61 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031487" comment="MozillaFirefox-translations less than 1.5.0.12-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031488" comment="MozillaFirefox less than 1.5.0.12-0.11"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1235</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1235" source="CVE"/>
	<description>
	Unspecified vulnerability in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allows remote attackers to execute arbitrary code via unknown vectors that cause JavaScript to execute with the wrong principal, aka "Privilege escalation via incorrect principals."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8e287f4ed038cb8bbf6b06ae8f9ce9e5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031477" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031478" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031479" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031480" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031481" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031482" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031483" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031484" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031485" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031486" comment="mozilla less than 1.8_seamonkey_1.0.9-1.13"/>
		</criteria>
	</criteria>
	<!-- ad3e48b131593041b00e35f46ab10b61 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031487" comment="MozillaFirefox-translations less than 1.5.0.12-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031488" comment="MozillaFirefox less than 1.5.0.12-0.11"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1236</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1236" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1236" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors related to the layout engine.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8e287f4ed038cb8bbf6b06ae8f9ce9e5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031477" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031478" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031479" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031480" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031481" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031482" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031483" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031484" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031485" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031486" comment="mozilla less than 1.8_seamonkey_1.0.9-1.13"/>
		</criteria>
	</criteria>
	<!-- ad3e48b131593041b00e35f46ab10b61 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031487" comment="MozillaFirefox-translations less than 1.5.0.12-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031488" comment="MozillaFirefox less than 1.5.0.12-0.11"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1237</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1237" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1237" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors related to the JavaScript engine.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8e287f4ed038cb8bbf6b06ae8f9ce9e5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031477" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031478" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031479" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031480" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031481" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031482" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031483" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031484" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031485" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031486" comment="mozilla less than 1.8_seamonkey_1.0.9-1.13"/>
		</criteria>
	</criteria>
	<!-- ad3e48b131593041b00e35f46ab10b61 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031487" comment="MozillaFirefox-translations less than 1.5.0.12-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031488" comment="MozillaFirefox less than 1.5.0.12-0.11"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1238</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1238" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.13 and SeaMonkey before 1.1.9, when generating the HTTP Referer header, does not list the entire URL when it contains Basic Authentication credentials without a username, which makes it easier for remote attackers to bypass application protection mechanisms that rely on Referer headers, such as with some Cross-Site Request Forgery (CSRF) mechanisms.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8e287f4ed038cb8bbf6b06ae8f9ce9e5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031477" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031478" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031479" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031480" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031481" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031482" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031483" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031484" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031485" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031486" comment="mozilla less than 1.8_seamonkey_1.0.9-1.13"/>
		</criteria>
	</criteria>
	<!-- ad3e48b131593041b00e35f46ab10b61 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031487" comment="MozillaFirefox-translations less than 1.5.0.12-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031488" comment="MozillaFirefox less than 1.5.0.12-0.11"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1240</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1240" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1240" source="CVE"/>
	<description>
	LiveConnect in Mozilla Firefox before 2.0.0.13 and SeaMonkey before 1.1.9 does not properly parse the content origin for jar: URIs before sending them to the Java plugin, which allows remote attackers to access arbitrary ports on the local machine.  NOTE: this is closely related to CVE-2008-1195.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8e287f4ed038cb8bbf6b06ae8f9ce9e5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031477" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031478" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031479" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031480" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031481" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031482" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031483" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031484" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031485" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031486" comment="mozilla less than 1.8_seamonkey_1.0.9-1.13"/>
		</criteria>
	</criteria>
	<!-- ad3e48b131593041b00e35f46ab10b61 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031487" comment="MozillaFirefox-translations less than 1.5.0.12-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031488" comment="MozillaFirefox less than 1.5.0.12-0.11"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1241</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1241" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1241" source="CVE"/>
	<description>
	GUI overlay vulnerability in Mozilla Firefox before 2.0.0.13 and SeaMonkey before 1.1.9 allows remote attackers to spoof form elements and redirect user inputs via a borderless XUL pop-up window from a background tab.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8e287f4ed038cb8bbf6b06ae8f9ce9e5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031477" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031478" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031479" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031480" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031481" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031482" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031483" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031484" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031485" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031486" comment="mozilla less than 1.8_seamonkey_1.0.9-1.13"/>
		</criteria>
	</criteria>
	<!-- ad3e48b131593041b00e35f46ab10b61 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031487" comment="MozillaFirefox-translations less than 1.5.0.12-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031488" comment="MozillaFirefox less than 1.5.0.12-0.11"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1367</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1367" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1367" source="CVE"/>
	<description>
	gcc 4.3.x does not generate a cld instruction while compiling functions used for string manipulation such as memcpy and memmove on x86 and i386, which can prevent the direction flag (DF) from being reset in violation of ABI conventions and cause data to be copied in the wrong direction during signal handling in the Linux kernel, which might allow context-dependent attackers to trigger memory corruption. NOTE: this issue was originally reported for CPU consumption in SBCL.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 853e9a34519c5d7f690c2da465430026 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031592" comment="kernel-bigsmp less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031593" comment="kernel-default less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031594" comment="kernel-smp less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031595" comment="kernel-source less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031596" comment="kernel-syms less than 2.6.5-7.312"/>
		</criteria>
	</criteria>
	<!-- dab7f48c7af593b70adc01d0c3a450b8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031593" comment="kernel-default less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031594" comment="kernel-smp less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031595" comment="kernel-source less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031596" comment="kernel-syms less than 2.6.5-7.312"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1372</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1372" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1372" source="CVE"/>
	<description>
	bzlib.c in bzip2 before 1.0.5 allows user-assisted remote attackers to cause a denial of service (crash) via a crafted file that triggers a buffer over-read, as demonstrated by the PROTOS GENOME test suite for Archive Formats.
	</description>
 </metadata>
<!-- f2bc363a599bad27648d721673858602 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031738" comment="bzip2-32bit less than 9-200803201535"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031739" comment="bzip2 less than 1.0.2-346.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1373</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1373" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1373" source="CVE"/>
	<description>
	Buffer overflow in the gif_read_lzw function in CUPS 1.3.6 allows remote attackers to have an unknown impact via a GIF file with a large code_size value, a similar issue to CVE-2006-4484.
	</description>
 </metadata>
<!-- b8c1c10ee3584bcc23b201ff91e9ce95 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031655" comment="cups-client less than 1.1.20-108.50"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031656" comment="cups-devel less than 1.1.20-108.50"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031657" comment="cups-libs-32bit less than 9-200803201838"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031658" comment="cups-libs less than 1.1.20-108.50"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031659" comment="cups less than 1.1.20-108.50"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1375</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1375" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1375" source="CVE"/>
	<description>
	Race condition in the directory notification subsystem (dnotify) in Linux kernel 2.6.x before 2.6.24.6, and 2.6.25 before 2.6.25.1, allows local users to cause a denial of service (OOPS) and possibly gain privileges via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 853e9a34519c5d7f690c2da465430026 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031592" comment="kernel-bigsmp less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031593" comment="kernel-default less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031594" comment="kernel-smp less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031595" comment="kernel-source less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031596" comment="kernel-syms less than 2.6.5-7.312"/>
		</criteria>
	</criteria>
	<!-- dab7f48c7af593b70adc01d0c3a450b8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031593" comment="kernel-default less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031594" comment="kernel-smp less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031595" comment="kernel-source less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031596" comment="kernel-syms less than 2.6.5-7.312"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1377</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1377" source="CVE"/>
	<description>
	The (1) SProcRecordCreateContext and (2) SProcRecordRegisterClients functions in the Record extension and the (3) SProcSecurityGenerateAuthorization function in the Security extension in the X server 1.4 in X.Org X11R7.3 allow context-dependent attackers to execute arbitrary code via requests with crafted length values that specify an arbitrary number of bytes to be swapped on the heap, which triggers heap corruption.
	</description>
 </metadata>
<!-- f1d6c99d6205780cd2ffac2d4f799210 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031740" comment="XFree86-Xnest less than 4.3.99.902-43.96"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031741" comment="XFree86-Xprt less than 4.3.99.902-43.96"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031742" comment="XFree86-Xvfb less than 4.3.99.902-43.96"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031743" comment="XFree86-Xvnc less than 4.3.99.902-43.96"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031744" comment="XFree86-server less than 4.3.99.902-43.96"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1379</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1379" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1379" source="CVE"/>
	<description>
	Integer overflow in the fbShmPutImage function in the MIT-SHM extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to read arbitrary process memory via crafted values for a Pixmap width and height.
	</description>
 </metadata>
<!-- f1d6c99d6205780cd2ffac2d4f799210 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031740" comment="XFree86-Xnest less than 4.3.99.902-43.96"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031741" comment="XFree86-Xprt less than 4.3.99.902-43.96"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031742" comment="XFree86-Xvfb less than 4.3.99.902-43.96"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031743" comment="XFree86-Xvnc less than 4.3.99.902-43.96"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031744" comment="XFree86-server less than 4.3.99.902-43.96"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1382</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1382" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1382" source="CVE"/>
	<description>
	libpng 1.0.6 through 1.0.32, 1.2.0 through 1.2.26, and 1.4.0beta01 through 1.4.0beta19 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PNG file with zero length "unknown" chunks, which trigger an access of uninitialized memory.
	</description>
 </metadata>
<!-- 81630a8ade2cfc4a99cec96923bdae81 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031745" comment="libpng-32bit less than 9-200804151618"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031746" comment="libpng-devel less than 1.2.5-182.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031747" comment="libpng less than 1.2.5-182.18"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1419</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1419" source="CVE"/>
	<description>
	Xiph.org libvorbis 1.2.0 and earlier does not properly handle a zero value for codebook.dim, which allows remote attackers to cause a denial of service (crash or infinite loop) or trigger an integer overflow.
	</description>
 </metadata>
<!-- 00af0d08c8abdb4db33c8b7206369c40 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031748" comment="libvorbis-32bit less than 9-200805201623"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031749" comment="libvorbis-devel less than 1.0.1-56.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031750" comment="libvorbis less than 1.0.1-56.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1420</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1420" source="CVE"/>
	<description>
	Integer overflow in residue partition value (aka partvals) evaluation in Xiph.org libvorbis 1.2.0 and earlier allows remote attackers to execute arbitrary code via a crafted OGG file, which triggers a heap overflow.
	</description>
 </metadata>
<!-- 00af0d08c8abdb4db33c8b7206369c40 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031748" comment="libvorbis-32bit less than 9-200805201623"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031749" comment="libvorbis-devel less than 1.0.1-56.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031750" comment="libvorbis less than 1.0.1-56.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1423</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1423" source="CVE"/>
	<description>
	Integer overflow in a certain quantvals and quantlist calculation in Xiph.org libvorbis 1.2.0 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted OGG file with a large virtual space for its codebook, which triggers a heap overflow.
	</description>
 </metadata>
<!-- 00af0d08c8abdb4db33c8b7206369c40 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031748" comment="libvorbis-32bit less than 9-200805201623"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031749" comment="libvorbis-devel less than 1.0.1-56.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031750" comment="libvorbis less than 1.0.1-56.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1447</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447" source="CVE"/>
	<description>
	The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug."
	</description>
 </metadata>
<!-- aa846ea840c9bf29e6974f3b6913e550 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031751" comment="bind-devel less than 9.3.4-4.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031752" comment="bind-utils-32bit less than 9-200806172350"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031753" comment="bind-utils less than 9.3.4-4.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031754" comment="bind less than 9.3.4-4.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1482</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1482" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1482" source="CVE"/>
	<description>
	Multiple integer overflows in xine-lib 1.1.11 and earlier allow remote attackers to trigger heap-based buffer overflows and possibly execute arbitrary code via (1) a crafted .FLV file, which triggers an overflow in demuxers/demux_flv.c; (2) a crafted .MOV file, which triggers an overflow in demuxers/demux_qt.c; (3) a crafted .RM file, which triggers an overflow in demuxers/demux_real.c; (4) a crafted .MVE file, which triggers an overflow in demuxers/demux_wc3movie.c; (5) a crafted .MKV file, which triggers an overflow in demuxers/ebml.c; or (6) a crafted .CAK file, which triggers an overflow in demuxers/demux_film.c.
	</description>
 </metadata>
<!-- c306f60e38b7ce6d70968bf8f88568d1 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031755" comment="xine-lib-32bit less than 9-200803271417"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031756" comment="xine-lib less than 0.99.rc3a-106.44"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031757" comment="xine-devel less than 0.99.rc3a-106.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031758" comment="xine-extra less than 0.99.rc3a-106.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031756" comment="xine-lib less than 0.99.rc3a-106.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031759" comment="xine-ui less than 0.99.rc3a-106.44"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1483</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1483" source="CVE"/>
	<description>
	OpenSSH 4.3p2, and probably other versions, allows local users to hijack forwarded X connections by causing ssh to set DISPLAY to :10, even when another process is listening on the associated port, as demonstrated by opening TCP port 6010 (IPv4) and sniffing a cookie sent by Emacs.
	</description>
 </metadata>
<!-- 0a4d98ee282fa46b8ffaf141da879687 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031760" comment="openssh-askpass less than 4.1p1-11.42"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031761" comment="openssh less than 4.1p1-11.42"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1615</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1615" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1615" source="CVE"/>
	<description>
	Linux kernel 2.6.18, and possibly other versions, when running on AMD64 architectures, allows local users to cause a denial of service (crash) via certain ptrace calls.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 853e9a34519c5d7f690c2da465430026 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031592" comment="kernel-bigsmp less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031593" comment="kernel-default less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031594" comment="kernel-smp less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031595" comment="kernel-source less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031596" comment="kernel-syms less than 2.6.5-7.312"/>
		</criteria>
	</criteria>
	<!-- dab7f48c7af593b70adc01d0c3a450b8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031593" comment="kernel-default less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031594" comment="kernel-smp less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031595" comment="kernel-source less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031596" comment="kernel-syms less than 2.6.5-7.312"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1654</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1654" source="CVE"/>
	<description>
	Interaction error between Adobe Flash and multiple Universal Plug and Play (UPnP) services allow remote attackers to perform Cross-Site Request Forgery (CSRF) style attacks by using the Flash navigateToURL function to send a SOAP message to a UPnP control point, as demonstrated by changing the primary DNS server.
	</description>
 </metadata>
<!-- bf0bfd1ab7b4dfb4cb1cd0bf88a5fb58 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031150" comment="flash-player less than 9.0.124.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1655</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1655" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1655" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player 9.0.115.0 and earlier, and 8.0.39.0 and earlier, makes it easier for remote attackers to conduct DNS rebinding attacks via unknown vectors.
	</description>
 </metadata>
<!-- bf0bfd1ab7b4dfb4cb1cd0bf88a5fb58 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031150" comment="flash-player less than 9.0.124.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1673</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1673" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1673" source="CVE"/>
	<description>
	The asn1 implementation in (a) the Linux kernel 2.4 before 2.4.36.6 and 2.6 before 2.6.25.5, as used in the cifs and ip_nat_snmp_basic modules; and (b) the gxsnmp package; does not properly validate length values during decoding of ASN.1 BER data, which allows remote attackers to cause a denial of service (crash) or execute arbitrary code via (1) a length greater than the working buffer, which can lead to an unspecified overflow; (2) an oid length of zero, which can lead to an off-by-one error; or (3) an indefinite length for a primitive encoding.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7f6082d83ebb412cb08a347f1d4f15d4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031612" comment="kernel-bigsmp less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031613" comment="kernel-default less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031614" comment="kernel-smp less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
	<!-- ab571d638a77193397f7750e6adc1db1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031613" comment="kernel-default less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031614" comment="kernel-smp less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1679</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1679" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1679" source="CVE"/>
	<description>
	Multiple integer overflows in imageop.c in Python before 2.5.3 allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted images that trigger heap-based buffer overflows.  NOTE: this issue is due to an incomplete fix for CVE-2007-4965.
	</description>
 </metadata>
<!-- c1c51f74ac5868675063af2a6018cb5f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031762" comment="python-32bit less than 9-200808010009"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031763" comment="python-curses less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031764" comment="python-demo less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031765" comment="python-devel less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031766" comment="python-doc-pdf less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031767" comment="python-doc less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031768" comment="python-gdbm less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031769" comment="python-idle less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031770" comment="python-mpz less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031771" comment="python-tk less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031772" comment="python-xml less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031773" comment="python less than 2.3.3-88.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1683</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1683" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1683" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2008-0887.  Reason: This candidate is a duplicate of CVE-2008-0887.  Notes: All CVE users should reference CVE-2008-0887 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
<!-- e1fc750cdf4b6a2f11f38786fe93d587 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031774" comment="xscreensaver-gnome less than 4.16-2.31"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031775" comment="xscreensaver less than 4.16-2.31"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1686</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1686" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1686" source="CVE"/>
	<description>
	Array index vulnerability in Speex 1.1.12 and earlier, as used in libfishsound 0.9.0 and earlier, including Illiminable DirectShow Filters and Annodex Plugins for Firefox, xine-lib before 1.1.12, and many other products, allows remote attackers to execute arbitrary code via a header structure containing a negative offset, which is used to dereference a function pointer.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1289b0411f53ac52a0899d9ab151688d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009031776" comment="speex-32bit less than 9-200806201343"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031777" comment="speex less than 1.0.3-54.6"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009031778" comment="speex-devel less than 1.0.3-54.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031777" comment="speex less than 1.0.3-54.6"/>
			</criteria>
		</criteria></criteria>
	<!-- 92a814fc7d6d0a1b585e22cc2515c045 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031779" comment="vorbis-tools less than 1.0.1-86.3"/>
	</criteria>
	<!-- f20cac5da33ab969c71be538df88af2a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009031780" comment="xine-lib-32bit less than 9-200804211655"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031781" comment="xine-lib less than 0.99.rc3a-106.47"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009031782" comment="xine-devel less than 0.99.rc3a-106.47"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031783" comment="xine-extra less than 0.99.rc3a-106.47"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031781" comment="xine-lib less than 0.99.rc3a-106.47"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009031784" comment="xine-ui less than 0.99.rc3a-106.47"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1693</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1693" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1693" source="CVE"/>
	<description>
	The CairoFont::create function in CairoFontEngine.cc in Poppler, possibly before 0.8.0, as used in Xpdf, Evince, ePDFview, KWord, and other applications, does not properly handle embedded fonts in PDF files, which allows remote attackers to execute arbitrary code via a crafted font object, related to dereferencing a function pointer associated with the type of this font object.
	</description>
 </metadata>
<!-- 1fe7567e863904a22cd58e6bceb4c035 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031785" comment="cups-client less than 1.1.20-108.52"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031786" comment="cups-devel less than 1.1.20-108.52"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031787" comment="cups-libs-32bit less than 9-200804172236"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031788" comment="cups-libs less than 1.1.20-108.52"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031789" comment="cups less than 1.1.20-108.52"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1767</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1767" source="CVE"/>
	<description>
	Buffer overflow in pattern.c in libxslt before 1.1.24 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XSL style sheet file with a long XSLT "transformation match" condition that triggers a large number of steps.
	</description>
 </metadata>
<!-- c607615c09d474655a6ba03802caa48c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031790" comment="libxslt-32bit less than 9-200805201632"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031791" comment="libxslt-devel less than 1.1.2-58.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031792" comment="libxslt less than 1.1.2-58.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1801</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1801" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1801" source="CVE"/>
	<description>
	Integer underflow in the iso_recv_msg function (iso.c) in rdesktop 1.5.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Remote Desktop Protocol (RDP) request with a small length field.
	</description>
 </metadata>
<!-- 2ed5c86f0e9d2f85a40536ac731afd98 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031793" comment="rdesktop less than 1.3.1-28.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1802</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1802" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1802" source="CVE"/>
	<description>
	Buffer overflow in the process_redirect_pdu (rdp.c) function in rdesktop 1.5.0 allows remote attackers to execute arbitrary code via a Remote Desktop Protocol (RDP) redirect request with modified length fields.
	</description>
 </metadata>
<!-- 2ed5c86f0e9d2f85a40536ac731afd98 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031793" comment="rdesktop less than 1.3.1-28.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1803</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1803" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1803" source="CVE"/>
	<description>
	Integer signedness error in the xrealloc function (rdesktop.c) in RDesktop 1.5.0 allows remote attackers to execute arbitrary code via unknown parameters that trigger a heap-based overflow.  NOTE: the role of the channel_process function was not specified by the original researcher.
	</description>
 </metadata>
<!-- 2ed5c86f0e9d2f85a40536ac731afd98 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031793" comment="rdesktop less than 1.3.1-28.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1806</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1806" source="CVE"/>
	<description>
	Integer overflow in FreeType2 before 2.3.6 allows context-dependent attackers to execute arbitrary code via a crafted set of 16-bit length values within the Private dictionary table in a Printer Font Binary (PFB) file, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- b06161048b1b9e09a9a2671fce97f428 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031794" comment="freetype2-32bit less than 9-200806170342"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031795" comment="freetype2-devel-32bit less than 9-200806170342"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031796" comment="freetype2-devel less than 2.1.7-53.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031797" comment="freetype2 less than 2.1.7-53.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1807</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1807" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1807" source="CVE"/>
	<description>
	FreeType2 before 2.3.6 allow context-dependent attackers to execute arbitrary code via an invalid "number of axes" field in a Printer Font Binary (PFB) file, which triggers a free of arbitrary memory locations, leading to memory corruption.
	</description>
 </metadata>
<!-- b06161048b1b9e09a9a2671fce97f428 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031794" comment="freetype2-32bit less than 9-200806170342"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031795" comment="freetype2-devel-32bit less than 9-200806170342"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031796" comment="freetype2-devel less than 2.1.7-53.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031797" comment="freetype2 less than 2.1.7-53.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1808</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1808" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1808" source="CVE"/>
	<description>
	Multiple off-by-one errors in FreeType2 before 2.3.6 allow context-dependent attackers to execute arbitrary code via (1) a crafted table in a Printer Font Binary (PFB) file or (2) a crafted SHC instruction in a TrueType Font (TTF) file, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- b06161048b1b9e09a9a2671fce97f428 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031794" comment="freetype2-32bit less than 9-200806170342"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031795" comment="freetype2-devel-32bit less than 9-200806170342"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031796" comment="freetype2-devel less than 2.1.7-53.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031797" comment="freetype2 less than 2.1.7-53.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1878</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1878" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1878" source="CVE"/>
	<description>
	Stack-based buffer overflow in the demux_nsf_send_chunk function in src/demuxers/demux_nsf.c in xine-lib 1.1.12 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long NSF title.
	</description>
 </metadata>
<!-- f20cac5da33ab969c71be538df88af2a -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031780" comment="xine-lib-32bit less than 9-200804211655"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031781" comment="xine-lib less than 0.99.rc3a-106.47"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031782" comment="xine-devel less than 0.99.rc3a-106.47"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031783" comment="xine-extra less than 0.99.rc3a-106.47"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031781" comment="xine-lib less than 0.99.rc3a-106.47"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031784" comment="xine-ui less than 0.99.rc3a-106.47"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1887</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1887" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1887" source="CVE"/>
	<description>
	Python 2.5.2 and earlier allows context-dependent attackers to execute arbitrary code via multiple vectors that cause a negative size value to be provided to the PyString_FromStringAndSize function, which allocates less memory than expected when assert() is disabled and triggers a buffer overflow.
	</description>
 </metadata>
<!-- c1c51f74ac5868675063af2a6018cb5f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031762" comment="python-32bit less than 9-200808010009"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031763" comment="python-curses less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031764" comment="python-demo less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031765" comment="python-devel less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031766" comment="python-doc-pdf less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031767" comment="python-doc less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031768" comment="python-gdbm less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031769" comment="python-idle less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031770" comment="python-mpz less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031771" comment="python-tk less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031772" comment="python-xml less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031773" comment="python less than 2.3.3-88.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1891</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1891" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1891" source="CVE"/>
	<description>
	Directory traversal vulnerability in WEBrick in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2, when using NTFS or FAT filesystems, allows remote attackers to read arbitrary CGI files via a trailing (1) + (plus), (2) %2b (encoded plus), (3) . (dot), (4) %2e (encoded dot), or (5) %20 (encoded space) character in the URI, possibly related to the WEBrick::HTTPServlet::FileHandler and WEBrick::HTTPServer.new functionality and the :DocumentRoot option.
	</description>
 </metadata>
<!-- 1e97d8857586ea9f95ec44eb9c68dfe8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031734" comment="ruby less than 1.8.1-42.24"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1927</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1927" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1927" source="CVE"/>
	<description>
	Double free vulnerability in Perl 5.8.8 allows context-dependent attackers to cause a denial of service (memory corruption and crash) via a crafted regular expression containing UTF8 characters.  NOTE: this issue might only be present on certain operating systems.
	</description>
 </metadata>
<!-- 20ce81a11a5c6f370b6cf14264e38cf0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031798" comment="perl-32bit less than 9-200807111457"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031799" comment="perl less than 5.8.3-32.14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1948</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1948" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1948" source="CVE"/>
	<description>
	The _gnutls_server_name_recv_params function in lib/ext_server_name.c in libgnutls in gnutls-serv in GnuTLS before 2.2.4 does not properly calculate the number of Server Names in a TLS 1.0 Client Hello message during extension handling, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a zero value for the length of Server Names, which leads to a buffer overflow in session resumption data in the pack_security_parameters function, aka GNUTLS-SA-2008-1-1.
	</description>
 </metadata>
<!-- 566c183b06655fd3c666c5d69f276831 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031800" comment="gnutls-32bit less than 9-200808211659"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031801" comment="gnutls-devel-32bit less than 9-200808211659"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031802" comment="gnutls-devel less than 1.0.8-26.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031803" comment="gnutls less than 1.0.8-26.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1949</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1949" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1949" source="CVE"/>
	<description>
	The _gnutls_recv_client_kx_message function in lib/gnutls_kx.c in libgnutls in gnutls-serv in GnuTLS before 2.2.4 continues to process Client Hello messages within a TLS message after one has already been processed, which allows remote attackers to cause a denial of service (NULL dereference and crash) via a TLS message containing multiple Client Hello messages, aka GNUTLS-SA-2008-1-2.
	</description>
 </metadata>
<!-- 566c183b06655fd3c666c5d69f276831 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031800" comment="gnutls-32bit less than 9-200808211659"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031801" comment="gnutls-devel-32bit less than 9-200808211659"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031802" comment="gnutls-devel less than 1.0.8-26.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031803" comment="gnutls less than 1.0.8-26.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1950</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-1950" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1950" source="CVE"/>
	<description>
	Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record with an invalid Record Length, which leads to an invalid cipher padding length, aka GNUTLS-SA-2008-1-3.
	</description>
 </metadata>
<!-- 566c183b06655fd3c666c5d69f276831 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031800" comment="gnutls-32bit less than 9-200808211659"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031801" comment="gnutls-devel-32bit less than 9-200808211659"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031802" comment="gnutls-devel less than 1.0.8-26.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031803" comment="gnutls less than 1.0.8-26.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2079</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-2079" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2079" source="CVE"/>
	<description>
	MySQL 4.1.x before 4.1.24, 5.0.x before 5.0.60, 5.1.x before 5.1.24, and 6.0.x before 6.0.5 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are within the MySQL home data directory, which can point to tables that are created in the future.
	</description>
 </metadata>
<!-- 30a5e3996d30fa92e0adac8c1dafa7ee -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031104" comment="mysql-Max less than 4.0.18-32.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031105" comment="mysql-bench less than 4.0.18-32.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031106" comment="mysql-client less than 4.0.18-32.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031107" comment="mysql-devel less than 4.0.18-32.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031108" comment="mysql-shared less than 4.0.18-32.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031109" comment="mysql less than 4.0.18-32.35"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2086</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-2086" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2086" source="CVE"/>
	<description>
	Sun Java Web Start and Java Plug-in for JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allow remote attackers to execute arbitrary code via a crafted jnlp file that modifies the (1) java.home, (2) java.ext.dirs, or (3) user.home System Properties, aka "Java Web Start File Inclusion" and CR 6694892.
	</description>
 </metadata>
<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2142</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-2142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2142" source="CVE"/>
	<description>
	Emacs 21 and XEmacs automatically load and execute .flc (fast lock) files that are associated with other files that are edited within Emacs, which allows user-assisted attackers to execute arbitrary code.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3fd87069eb9f22f5cd2cecb8e30f846d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031806" comment="xemacs-packages-el less than 20040202-54.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031807" comment="xemacs-packages-info less than 20040202-54.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031808" comment="xemacs-packages less than 20040202-54.4"/>
		</criteria>
	</criteria>
	<!-- bb5c8be6845a2742fab6bf5c07f76e76 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031809" comment="emacs-info less than 21.3-185.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031810" comment="emacs-nox less than 21.3-185.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031811" comment="emacs less than 21.3-185.15"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2235</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-2235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2235" source="CVE"/>
	<description>
	OpenSC before 0.11.5 uses weak permissions (ADMIN file control information of 00) for the 5015 directory on smart cards and USB crypto tokens running Siemens CardOS M4, which allows physically proximate attackers to change the PIN.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 093ac65717da9e9a9950e72fd32a5327 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031812" comment="opensc-devel less than 0.8.0-194.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031813" comment="opensc less than 0.8.0-194.4"/>
		</criteria>
	</criteria>
	<!-- c3fd31aad32a3c9d1c57dd1c890137ec -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031814" comment="opensc-devel less than 0.8.0-194.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031815" comment="opensc less than 0.8.0-194.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2237</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-2237" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2237" source="CVE"/>
	<description>
	Heap-based buffer overflow in OpenOffice.org (OOo) 2.x before 2.4.2 allows remote attackers to execute arbitrary code via a crafted WMF file associated with a StarOffice/StarSuite document.
	</description>
 </metadata>
<!-- 49f266e0465fca88d0691c521f4d9c88 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031816" comment="OpenOffice_org-ar less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031817" comment="OpenOffice_org-ca less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031818" comment="OpenOffice_org-cs less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031819" comment="OpenOffice_org-da less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031820" comment="OpenOffice_org-de less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031821" comment="OpenOffice_org-el less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031822" comment="OpenOffice_org-en-help less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031823" comment="OpenOffice_org-en less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031824" comment="OpenOffice_org-es less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031825" comment="OpenOffice_org-et less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031826" comment="OpenOffice_org-fi less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031827" comment="OpenOffice_org-fr less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031828" comment="OpenOffice_org-gnome less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031829" comment="OpenOffice_org-hu less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031830" comment="OpenOffice_org-it less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031831" comment="OpenOffice_org-ja less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031832" comment="OpenOffice_org-kde less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031833" comment="OpenOffice_org-ko less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031834" comment="OpenOffice_org-nl less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031835" comment="OpenOffice_org-pl less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031836" comment="OpenOffice_org-pt-BR less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031837" comment="OpenOffice_org-pt less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031838" comment="OpenOffice_org-ru less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031839" comment="OpenOffice_org-sk less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031840" comment="OpenOffice_org-sl less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031841" comment="OpenOffice_org-sv less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031842" comment="OpenOffice_org-tr less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031843" comment="OpenOffice_org-zh-CN less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031844" comment="OpenOffice_org-zh-TW less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031845" comment="OpenOffice_org less than 1.1.5-0.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2238</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-2238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2238" source="CVE"/>
	<description>
	Multiple integer overflows in OpenOffice.org (OOo) 2.x before 2.4.2 allow remote attackers to execute arbitrary code via crafted EMR records in an EMF file associated with a StarOffice/StarSuite document, which trigger a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 49f266e0465fca88d0691c521f4d9c88 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031816" comment="OpenOffice_org-ar less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031817" comment="OpenOffice_org-ca less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031818" comment="OpenOffice_org-cs less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031819" comment="OpenOffice_org-da less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031820" comment="OpenOffice_org-de less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031821" comment="OpenOffice_org-el less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031822" comment="OpenOffice_org-en-help less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031823" comment="OpenOffice_org-en less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031824" comment="OpenOffice_org-es less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031825" comment="OpenOffice_org-et less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031826" comment="OpenOffice_org-fi less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031827" comment="OpenOffice_org-fr less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031828" comment="OpenOffice_org-gnome less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031829" comment="OpenOffice_org-hu less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031830" comment="OpenOffice_org-it less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031831" comment="OpenOffice_org-ja less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031832" comment="OpenOffice_org-kde less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031833" comment="OpenOffice_org-ko less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031834" comment="OpenOffice_org-nl less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031835" comment="OpenOffice_org-pl less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031836" comment="OpenOffice_org-pt-BR less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031837" comment="OpenOffice_org-pt less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031838" comment="OpenOffice_org-ru less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031839" comment="OpenOffice_org-sk less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031840" comment="OpenOffice_org-sl less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031841" comment="OpenOffice_org-sv less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031842" comment="OpenOffice_org-tr less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031843" comment="OpenOffice_org-zh-CN less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031844" comment="OpenOffice_org-zh-TW less than 1.1.5-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031845" comment="OpenOffice_org less than 1.1.5-0.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2292</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-2292" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2292" source="CVE"/>
	<description>
	Buffer overflow in the __snprint_value function in snmp_get in Net-SNMP 5.1.4, 5.2.4, and 5.4.1, as used in SNMP.xs for Perl, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large OCTETSTRING in an attribute value pair (AVP).
	</description>
 </metadata>
<!-- 71093bdfd49361f6dbe32a8fde43b848 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031709" comment="net-snmp-devel less than 5.1.3.1-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031710" comment="net-snmp less than 5.1.3.1-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031711" comment="perl-SNMP less than 5.1.3.1-0.22"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2315</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-2315" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2315" source="CVE"/>
	<description>
	Multiple integer overflows in Python 2.5.2 and earlier allow context-dependent attackers to have an unknown impact via vectors related to the (1) stringobject, (2) unicodeobject, (3) bufferobject, (4) longobject, (5) tupleobject, (6) stropmodule, (7) gcmodule, and (8) mmapmodule modules.  NOTE: The expandtabs integer overflows in stringobject and unicodeobject in 2.5.2 are covered by CVE-2008-5031.
	</description>
 </metadata>
<!-- c1c51f74ac5868675063af2a6018cb5f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031762" comment="python-32bit less than 9-200808010009"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031763" comment="python-curses less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031764" comment="python-demo less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031765" comment="python-devel less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031766" comment="python-doc-pdf less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031767" comment="python-doc less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031768" comment="python-gdbm less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031769" comment="python-idle less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031770" comment="python-mpz less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031771" comment="python-tk less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031772" comment="python-xml less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031773" comment="python less than 2.3.3-88.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2316</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-2316" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2316" source="CVE"/>
	<description>
	Integer overflow in _hashopenssl.c in the hashlib module in Python 2.5.2 and earlier might allow context-dependent attackers to defeat cryptographic digests, related to "partial hashlib hashing of data exceeding 4GB."
	</description>
 </metadata>
<!-- c1c51f74ac5868675063af2a6018cb5f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031762" comment="python-32bit less than 9-200808010009"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031763" comment="python-curses less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031764" comment="python-demo less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031765" comment="python-devel less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031766" comment="python-doc-pdf less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031767" comment="python-doc less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031768" comment="python-gdbm less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031769" comment="python-idle less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031770" comment="python-mpz less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031771" comment="python-tk less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031772" comment="python-xml less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031773" comment="python less than 2.3.3-88.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2327</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-2327" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2327" source="CVE"/>
	<description>
	Multiple buffer underflows in the (1) LZWDecode, (2) LZWDecodeCompat, and (3) LZWDecodeVector functions in tif_lzw.c in the LZW decoder in LibTIFF 3.8.2 and earlier allow context-dependent attackers to execute arbitrary code via a crafted TIFF file, related to improper handling of the CODE_CLEAR code.
	</description>
 </metadata>
<!-- 6ad5a94fc892aa5c6aeb1f575178024c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031846" comment="libtiff-32bit less than 9-200808201417"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031847" comment="libtiff less than 3.6.1-38.38"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2360</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-2360" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2360" source="CVE"/>
	<description>
	Integer overflow in the AllocateGlyph function in the Render extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to execute arbitrary code via unspecified request fields that are used to calculate a heap buffer size, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- f1d6c99d6205780cd2ffac2d4f799210 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031740" comment="XFree86-Xnest less than 4.3.99.902-43.96"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031741" comment="XFree86-Xprt less than 4.3.99.902-43.96"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031742" comment="XFree86-Xvfb less than 4.3.99.902-43.96"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031743" comment="XFree86-Xvnc less than 4.3.99.902-43.96"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031744" comment="XFree86-server less than 4.3.99.902-43.96"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2361</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-2361" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2361" source="CVE"/>
	<description>
	Integer overflow in the ProcRenderCreateCursor function in the Render extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to cause a denial of service (daemon crash) via unspecified request fields that are used to calculate a glyph buffer size, which triggers a dereference of unmapped memory.
	</description>
 </metadata>
<!-- f1d6c99d6205780cd2ffac2d4f799210 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031740" comment="XFree86-Xnest less than 4.3.99.902-43.96"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031741" comment="XFree86-Xprt less than 4.3.99.902-43.96"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031742" comment="XFree86-Xvfb less than 4.3.99.902-43.96"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031743" comment="XFree86-Xvnc less than 4.3.99.902-43.96"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031744" comment="XFree86-server less than 4.3.99.902-43.96"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2362</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-2362" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2362" source="CVE"/>
	<description>
	Multiple integer overflows in the Render extension in the X server 1.4 in X.Org X11R7.3 allow context-dependent attackers to execute arbitrary code via a (1) SProcRenderCreateLinearGradient, (2) SProcRenderCreateRadialGradient, or (3) SProcRenderCreateConicalGradient request with an invalid field specifying the number of bytes to swap in the request data, which triggers heap memory corruption.
	</description>
 </metadata>
<!-- f1d6c99d6205780cd2ffac2d4f799210 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031740" comment="XFree86-Xnest less than 4.3.99.902-43.96"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031741" comment="XFree86-Xprt less than 4.3.99.902-43.96"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031742" comment="XFree86-Xvfb less than 4.3.99.902-43.96"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031743" comment="XFree86-Xvnc less than 4.3.99.902-43.96"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031744" comment="XFree86-server less than 4.3.99.902-43.96"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2370</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-2370" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2370" source="CVE"/>
	<description>
	Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when a RequestDispatcher is used, performs path normalization before removing the query string from the URI, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a .. (dot dot) in a request parameter.
	</description>
 </metadata>
<!-- 23efc5af9808f5fd805226a8dbae7ea1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031737" comment="jakarta-tomcat less than 5.0.19-29.16"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2383</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-2383" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2383" source="CVE"/>
	<description>
	CRLF injection vulnerability in xterm allows user-assisted attackers to execute arbitrary commands via LF (aka \n) characters surrounding a command name within a Device Control Request Status String (DECRQSS) escape sequence in a text file, a related issue to CVE-2003-0063 and CVE-2003-0071.
	</description>
 </metadata>
<!-- df74b9f380d2758eba5d0159fe37a84e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031848" comment="XFree86-server less than 4.3.99.902-43.98"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031849" comment="XFree86 less than 4.3.99.902-43.98"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2641</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-2641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2641" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 7.0.9 and earlier, and 8.0 through 8.1.2, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors, related to an "input validation issue in a JavaScript method."
	</description>
 </metadata>
<!-- 2986c2829dd78462b9103d8682a29dbb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031850" comment="acroread less than 7.0.9-2.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2662</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-2662" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2662" source="CVE"/>
	<description>
	Multiple integer overflows in the rb_str_buf_append function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2 allow context-dependent attackers to execute arbitrary code or cause a denial of service via unknown vectors that trigger memory corruption, a different issue than CVE-2008-2663, CVE-2008-2664, and CVE-2008-2725.  NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. This CVE description should be regarded as authoritative, although it is likely to change.
	</description>
 </metadata>
<!-- 1e97d8857586ea9f95ec44eb9c68dfe8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031734" comment="ruby less than 1.8.1-42.24"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2663</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-2663" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2663" source="CVE"/>
	<description>
	Multiple integer overflows in the rb_ary_store function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, and 1.8.7 before 1.8.7-p22 allow context-dependent attackers to execute arbitrary code or cause a denial of service via unknown vectors, a different issue than CVE-2008-2662, CVE-2008-2664, and CVE-2008-2725. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.
	</description>
 </metadata>
<!-- 1e97d8857586ea9f95ec44eb9c68dfe8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031734" comment="ruby less than 1.8.1-42.24"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2664</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-2664" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2664" source="CVE"/>
	<description>
	The rb_str_format function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2 allows context-dependent attackers to trigger memory corruption via unspecified vectors related to alloca, a different issue than CVE-2008-2662, CVE-2008-2663, and CVE-2008-2725.  NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.
	</description>
 </metadata>
<!-- 1e97d8857586ea9f95ec44eb9c68dfe8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031734" comment="ruby less than 1.8.1-42.24"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2712</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-2712" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2712" source="CVE"/>
	<description>
	Vim 7.1.314, 6.4, and other versions allows user-assisted remote attackers to execute arbitrary commands via Vim scripts that do not properly sanitize inputs before invoking the execute or system functions, as demonstrated using (1) filetype.vim, (3) xpm.vim, (4) gzip_vim, and (5) netrw.  NOTE: the originally reported version was 7.1.314, but the researcher actually found this set of issues in 7.1.298.  NOTE: the zipplugin issue (originally vector 2 in this identifier) has been subsumed by CVE-2008-3075.
	</description>
 </metadata>
<!-- d33093c5830311c493a7cebdc1a9debe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031851" comment="gvim less than 6.2-235.8"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2725</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-2725" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2725" source="CVE"/>
	<description>
	Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, and 1.8.7 before 1.8.7-p22; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger memory corruption via unspecified vectors, aka the "REALLOC_N" variant, a different issue than CVE-2008-2662, CVE-2008-2663, and CVE-2008-2664.  NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.
	</description>
 </metadata>
<!-- 1e97d8857586ea9f95ec44eb9c68dfe8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031734" comment="ruby less than 1.8.1-42.24"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2726</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-2726" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2726" source="CVE"/>
	<description>
	Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger memory corruption, aka the "beg + rlen" issue.  NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.
	</description>
 </metadata>
<!-- 1e97d8857586ea9f95ec44eb9c68dfe8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031734" comment="ruby less than 1.8.1-42.24"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2727</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-2727" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2727" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2008-2725.  Reason: This candidate is a duplicate of CVE-2008-2725.  Notes: All CVE users should reference CVE-2008-2725 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
<!-- 1e97d8857586ea9f95ec44eb9c68dfe8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031734" comment="ruby less than 1.8.1-42.24"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2728</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-2728" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2728" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2008-2726.  Reason: This candidate is a duplicate of CVE-2008-2726.  Notes: All CVE users should reference CVE-2008-2726 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
<!-- 1e97d8857586ea9f95ec44eb9c68dfe8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031734" comment="ruby less than 1.8.1-42.24"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2812</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-2812" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2812" source="CVE"/>
	<description>
	The Linux kernel before 2.6.25.10 does not properly perform tty operations, which allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving NULL pointer dereference of function pointers in (1) hamradio/6pack.c, (2) hamradio/mkiss.c, (3) irda/irtty-sir.c, (4) ppp_async.c, (5) ppp_synctty.c, (6) slip.c, (7) wan/x25_asy.c, and (8) wireless/strip.c in drivers/net/.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7f6082d83ebb412cb08a347f1d4f15d4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031612" comment="kernel-bigsmp less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031613" comment="kernel-default less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031614" comment="kernel-smp less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
	<!-- ab571d638a77193397f7750e6adc1db1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031613" comment="kernel-default less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031614" comment="kernel-smp less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2936</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-2936" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2936" source="CVE"/>
	<description>
	Postfix before 2.3.15, 2.4 before 2.4.8, 2.5 before 2.5.4, and 2.6 before 2.6-20080814, when the operating system supports hard links to symlinks, allows local users to append e-mail messages to a file to which a root-owned symlink points, by creating a hard link to this symlink and then sending a message.  NOTE: this can be leveraged to gain privileges if there is a symlink to an init script.
	</description>
 </metadata>
<!-- f572eea698b3b6a0124f7004ea6579c8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031852" comment="postfix less than 2.1.1-1.24"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2937</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-2937" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2937" source="CVE"/>
	<description>
	Postfix 2.5 before 2.5.4 and 2.6 before 2.6-20080814 delivers to a mailbox file even when this file is not owned by the recipient, which allows local users to read e-mail messages by creating a mailbox file corresponding to another user's account name.
	</description>
 </metadata>
<!-- f572eea698b3b6a0124f7004ea6579c8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031852" comment="postfix less than 2.1.1-1.24"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2938</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-2938" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2938" source="CVE"/>
	<description>
	Directory traversal vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when allowLinking and UTF-8 are enabled, allows remote attackers to read arbitrary files via encoded directory traversal sequences in the URI, a different vulnerability than CVE-2008-2370.  NOTE: versions earlier than 6.0.18 were reported affected, but the vendor advisory lists 6.0.16 as the last affected version.
	</description>
 </metadata>
<!-- 23efc5af9808f5fd805226a8dbae7ea1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031737" comment="jakarta-tomcat less than 5.0.19-29.16"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2939</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-2939" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2939" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the mod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c in the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions, allows remote attackers to inject arbitrary web script or HTML via a wildcard in the last directory component in the pathname in an FTP URI.
	</description>
 </metadata>
<!-- d442bcbd4d332421f2d1be5fd728b2f4 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031853" comment="libapr0 less than 2.0.59-1.10"/>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031854" comment="apache2-devel less than 2.0.59-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031855" comment="apache2-prefork less than 2.0.59-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031856" comment="apache2-worker less than 2.0.59-1.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031857" comment="apache2 less than 2.0.59-1.10"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2952</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-2952" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2952" source="CVE"/>
	<description>
	liblber/io.c in OpenLDAP 2.2.4 to 2.4.10 allows remote attackers to cause a denial of service (program termination) via crafted ASN.1 BER datagrams that trigger an assertion error.
	</description>
 </metadata>
<!-- da48a44725c6492d098066cb53b194a6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031858" comment="openldap2-back-ldap less than 2.2.24-4.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031859" comment="openldap2-back-meta less than 2.2.24-4.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031860" comment="openldap2-back-monitor less than 2.2.24-4.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031861" comment="openldap2-back-perl less than 2.2.24-4.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031862" comment="openldap2-client-32bit less than 9-200808130009"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031863" comment="openldap2-client less than 2.2.24-4.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031864" comment="openldap2-devel-32bit less than 9-200808130009"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031865" comment="openldap2-devel less than 2.2.24-4.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031866" comment="openldap2 less than 2.2.24-4.29"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3104</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3104" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3104" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, SDK and JRE 1.4.x before 1.4.2_18, and SDK and JRE 1.3.x before 1.3.1_23 allow remote attackers to violate the security model for an applet's outbound connections by connecting to localhost services running on the machine that loaded the applet.
	</description>
 </metadata>
<!-- 0a2f6f756f222e5ae33fb9a54fb01088 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031867" comment="java2-jre less than 1.4.2-129.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031868" comment="java2 less than 1.4.2-129.43"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3107</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3107" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3107" source="CVE"/>
	<description>
	Unspecified vulnerability in the Virtual Machine in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allows context-dependent attackers to gain privileges via an untrusted (1) application or (2) applet, as demonstrated by an application or applet that grants itself privileges to (a) read local files, (b) write to local files, or (c) execute local programs.
	</description>
 </metadata>
<!-- 0a2f6f756f222e5ae33fb9a54fb01088 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031867" comment="java2-jre less than 1.4.2-129.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031868" comment="java2 less than 1.4.2-129.43"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3108</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3108" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3108" source="CVE"/>
	<description>
	Buffer overflow in Sun Java Runtime Environment (JRE) in JDK and JRE 5.0 before Update 10, SDK and JRE 1.4.x before 1.4.2_18, and SDK and JRE 1.3.x before 1.3.1_23 allows context-dependent attackers to gain privileges via unspecified vectors related to font processing.
	</description>
 </metadata>
<!-- 0a2f6f756f222e5ae33fb9a54fb01088 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031867" comment="java2-jre less than 1.4.2-129.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031868" comment="java2 less than 1.4.2-129.43"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3111</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3111" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3111" source="CVE"/>
	<description>
	Multiple buffer overflows in Sun Java Web Start in JDK and JRE 6 before Update 4, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allow context-dependent attackers to gain privileges via an untrusted application, as demonstrated by (a) an application that grants itself privileges to (1) read local files, (2) write to local files, or (3) execute local programs; and as demonstrated by (b) a long value associated with a java-vm-args attribute in a j2se tag in a JNLP file, which triggers a stack-based buffer overflow in the GetVMArgsOption function; aka CR 6557220.
	</description>
 </metadata>
<!-- 0a2f6f756f222e5ae33fb9a54fb01088 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031867" comment="java2-jre less than 1.4.2-129.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031868" comment="java2 less than 1.4.2-129.43"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3112</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3112" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3112" source="CVE"/>
	<description>
	Directory traversal vulnerability in Sun Java Web Start in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allows remote attackers to create arbitrary files via the writeManifest method in the CacheEntry class, aka CR 6703909.
	</description>
 </metadata>
<!-- 0a2f6f756f222e5ae33fb9a54fb01088 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031867" comment="java2-jre less than 1.4.2-129.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031868" comment="java2 less than 1.4.2-129.43"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3113</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3113" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3113" source="CVE"/>
	<description>
	Unspecified vulnerability in Sun Java Web Start in JDK and JRE 5.0 before Update 16 and SDK and JRE 1.4.x before 1.4.2_18 allows remote attackers to create or delete arbitrary files via an untrusted application, aka CR 6704077.
	</description>
 </metadata>
<!-- 0a2f6f756f222e5ae33fb9a54fb01088 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031867" comment="java2-jre less than 1.4.2-129.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031868" comment="java2 less than 1.4.2-129.43"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3114</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3114" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3114" source="CVE"/>
	<description>
	Unspecified vulnerability in Sun Java Web Start in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allows context-dependent attackers to obtain sensitive information (the cache location) via an untrusted application, aka CR 6704074.
	</description>
 </metadata>
<!-- 0a2f6f756f222e5ae33fb9a54fb01088 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031867" comment="java2-jre less than 1.4.2-129.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031868" comment="java2 less than 1.4.2-129.43"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3137</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3137" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3137" source="CVE"/>
	<description>
	The GSM SMS dissector in Wireshark (formerly Ethereal) 0.99.2 through 1.0.0 allows remote attackers to cause a denial of service (application crash) via unknown vectors.
	</description>
 </metadata>
<!-- 1e9c12e8e40b1a82250c9f63d0e5c302 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031869" comment="ethereal less than 0.10.13-2.34"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3138</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3138" source="CVE"/>
	<description>
	The (1) PANA and (2) KISMET dissectors in Wireshark (formerly Ethereal) 0.99.3 through 1.0.0 allow remote attackers to cause a denial of service (application stop) via unknown vectors.
	</description>
 </metadata>
<!-- 1e9c12e8e40b1a82250c9f63d0e5c302 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031869" comment="ethereal less than 0.10.13-2.34"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3139</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3139" source="CVE"/>
	<description>
	The RTMPT dissector in Wireshark (formerly Ethereal) 0.99.8 through 1.0.0 allows remote attackers to cause a denial of service (crash) via unknown vectors.  NOTE: this might be due to a use-after-free error.
	</description>
 </metadata>
<!-- 1e9c12e8e40b1a82250c9f63d0e5c302 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031869" comment="ethereal less than 0.10.13-2.34"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3140</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3140" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3140" source="CVE"/>
	<description>
	The syslog dissector in Wireshark (formerly Ethereal) 1.0.0 allows remote attackers to cause a denial of service (application crash) via unknown vectors, possibly related to an "incomplete SS7 MSU syslog encapsulated packet."
	</description>
 </metadata>
<!-- 1e9c12e8e40b1a82250c9f63d0e5c302 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031869" comment="ethereal less than 0.10.13-2.34"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3141</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3141" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3141" source="CVE"/>
	<description>
	Unspecified vulnerability in the RMI dissector in Wireshark (formerly Ethereal) 0.9.5 through 1.0.0 allows remote attackers to read system memory via unspecified vectors.
	</description>
 </metadata>
<!-- 1e9c12e8e40b1a82250c9f63d0e5c302 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031869" comment="ethereal less than 0.10.13-2.34"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3142</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3142" source="CVE"/>
	<description>
	Multiple buffer overflows in Python 2.5.2 and earlier on 32bit platforms allow context-dependent attackers to cause a denial of service (crash) or have unspecified other impact via a long string that leads to incorrect memory allocation during Unicode string processing, related to the unicode_resize function and the PyMem_RESIZE macro.
	</description>
 </metadata>
<!-- c1c51f74ac5868675063af2a6018cb5f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031762" comment="python-32bit less than 9-200808010009"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031763" comment="python-curses less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031764" comment="python-demo less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031765" comment="python-devel less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031766" comment="python-doc-pdf less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031767" comment="python-doc less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031768" comment="python-gdbm less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031769" comment="python-idle less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031770" comment="python-mpz less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031771" comment="python-tk less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031772" comment="python-xml less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031773" comment="python less than 2.3.3-88.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3143</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3143" source="CVE"/>
	<description>
	Multiple integer overflows in Python before 2.5.2 might allow context-dependent attackers to have an unknown impact via vectors related to (1) Include/pymem.h; (2) _csv.c, (3) _struct.c, (4) arraymodule.c, (5) audioop.c, (6) binascii.c, (7) cPickle.c, (8) cStringIO.c, (9) cjkcodecs/multibytecodec.c, (10) datetimemodule.c, (11) md5.c, (12) rgbimgmodule.c, and (13) stropmodule.c in Modules/; (14) bufferobject.c, (15) listobject.c, and (16) obmalloc.c in Objects/; (17) Parser/node.c; and (18) asdl.c, (19) ast.c, (20) bltinmodule.c, and (21) compile.c in Python/, as addressed by "checks for integer overflows, contributed by Google."
	</description>
 </metadata>
<!-- c1c51f74ac5868675063af2a6018cb5f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031762" comment="python-32bit less than 9-200808010009"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031763" comment="python-curses less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031764" comment="python-demo less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031765" comment="python-devel less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031766" comment="python-doc-pdf less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031767" comment="python-doc less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031768" comment="python-gdbm less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031769" comment="python-idle less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031770" comment="python-mpz less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031771" comment="python-tk less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031772" comment="python-xml less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031773" comment="python less than 2.3.3-88.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3144</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3144" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3144" source="CVE"/>
	<description>
	Multiple integer overflows in the PyOS_vsnprintf function in Python/mysnprintf.c in Python 2.5.2 and earlier allow context-dependent attackers to cause a denial of service (memory corruption) or have unspecified other impact via crafted input to string formatting operations.  NOTE: the handling of certain integer values is also affected by related integer underflows and an off-by-one error.
	</description>
 </metadata>
<!-- c1c51f74ac5868675063af2a6018cb5f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031762" comment="python-32bit less than 9-200808010009"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031763" comment="python-curses less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031764" comment="python-demo less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031765" comment="python-devel less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031766" comment="python-doc-pdf less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031767" comment="python-doc less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031768" comment="python-gdbm less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031769" comment="python-idle less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031770" comment="python-mpz less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031771" comment="python-tk less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031772" comment="python-xml less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031773" comment="python less than 2.3.3-88.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3145</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3145" source="CVE"/>
	<description>
	The fragment_add_work function in epan/reassemble.c in Wireshark 0.8.19 through 1.0.1 allows remote attackers to cause a denial of service (crash) via a series of fragmented packets with non-sequential fragmentation offset values, which lead to a buffer over-read.
	</description>
 </metadata>
<!-- 1e9c12e8e40b1a82250c9f63d0e5c302 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031869" comment="ethereal less than 0.10.13-2.34"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3146</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3146" source="CVE"/>
	<description>
	Multiple buffer overflows in packet_ncp2222.inc in Wireshark (formerly Ethereal) 0.9.7 through 1.0.2 allow attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted NCP packet that causes an invalid pointer to be used.
	</description>
 </metadata>
<!-- 1e9c12e8e40b1a82250c9f63d0e5c302 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031869" comment="ethereal less than 0.10.13-2.34"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3231</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3231" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3231" source="CVE"/>
	<description>
	xine-lib before 1.1.15 allows remote attackers to cause a denial of service (crash) via a crafted OGG file, as demonstrated by playing lol-ffplay.ogg with xine.
	</description>
 </metadata>
<!-- b425888bf973abc460031dbfa196bae0 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031870" comment="xine-lib-32bit less than 9-200901281640"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031871" comment="xine-lib less than 0.99.rc3a-106.49"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031872" comment="xine-devel less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031873" comment="xine-extra less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031870" comment="xine-lib-32bit less than 9-200901281640"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031871" comment="xine-lib less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031874" comment="xine-ui less than 0.99.rc3a-106.49"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3271</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3271" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3271" source="CVE"/>
	<description>
	Apache Tomcat 5.5.0 and 4.1.0 through 4.1.31 allows remote attackers to bypass an IP address restriction and obtain sensitive information via a request that is processed concurrently with another request but in a different thread, leading to an instance-variable overwrite associated with a "synchronization problem" and lack of thread safety, and related to RemoteFilterValve, RemoteAddrValve, and RemoteHostValve.
	</description>
 </metadata>
<!-- fb4ec2e8c3670355efd3ca4ed3953b38 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031875" comment="jakarta-tomcat less than 5.0.19-29.18"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3272</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3272" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3272" source="CVE"/>
	<description>
	The snd_seq_oss_synth_make_info function in sound/core/seq/oss/seq_oss_synth.c in the sound subsystem in the Linux kernel before 2.6.27-rc2 does not verify that the device number is within the range defined by max_synthdev before returning certain data to the caller, which allows local users to obtain sensitive information.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7f6082d83ebb412cb08a347f1d4f15d4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031612" comment="kernel-bigsmp less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031613" comment="kernel-default less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031614" comment="kernel-smp less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
	<!-- ab571d638a77193397f7750e6adc1db1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031613" comment="kernel-default less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031614" comment="kernel-smp less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3281</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3281" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3281" source="CVE"/>
	<description>
	libxml2 2.6.32 and earlier does not properly detect recursion during entity expansion in an attribute value, which allows context-dependent attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document.
	</description>
 </metadata>
<!-- 6a4c53a4f0700f99972273ceb5bb6e49 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031876" comment="libxml2-32bit less than 9-200809051309"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031877" comment="libxml2-devel less than 2.6.7-28.14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031878" comment="libxml2-python less than 2.6.7-46.14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031879" comment="libxml2 less than 2.6.7-28.14"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031878" comment="libxml2-python less than 2.6.7-46.14"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3422</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3422" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in the ASP.net class libraries in Mono 2.0 and earlier allow remote attackers to inject arbitrary web script or HTML via crafted attributes related to (1) HtmlControl.cs (PreProcessRelativeReference), (2) HtmlForm.cs (RenderAttributes), (3) HtmlInputButton (RenderAttributes), (4) HtmlInputRadioButton (RenderAttributes), and (5) HtmlSelect (RenderChildren).
	</description>
 </metadata>
<!-- b573e7d0c48bb80f24d0a72d84ce9bed -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031880" comment="mono-devel less than 1.1.7-0.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031881" comment="mono less than 1.1.7-0.17"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3443</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3443" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3443" source="CVE"/>
	<description>
	The regular expression engine (regex.c) in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows remote attackers to cause a denial of service (infinite loop and crash) via multiple long requests to a Ruby socket, related to memory allocation failure, and as demonstrated against Webrick.
	</description>
 </metadata>
<!-- bf0b463c573238d140dbff3b8165ac7b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053391" comment="ruby less than 1.8.1-42.27"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3520</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3520" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3520" source="CVE"/>
	<description>
	Multiple integer overflows in JasPer 1.900.1 might allow context-dependent attackers to have an unknown impact via a crafted image file, related to integer multiplication for memory allocation.
	</description>
 </metadata>
<!-- 8b7969b972f487746cbdfd26efd3ae0a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031882" comment="libjasper-32bit less than 9-200811141502"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031883" comment="libjasper less than 1.701.0-1.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3521</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3521" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3521" source="CVE"/>
	<description>
	Race condition in the jas_stream_tmpfile function in libjasper/base/jas_stream.c in JasPer 1.900.1 allows local users to cause a denial of service (program exit) by creating the appropriate tmp.XXXXXXXXXX temporary file, which causes Jasper to exit.  NOTE: this was originally reported as a symlink issue, but this was incorrect.  NOTE: some vendors dispute the severity of this issue, but it satisfies CVE's requirements for inclusion.
	</description>
 </metadata>
<!-- 8b7969b972f487746cbdfd26efd3ae0a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031882" comment="libjasper-32bit less than 9-200811141502"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031883" comment="libjasper less than 1.701.0-1.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3522</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3522" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3522" source="CVE"/>
	<description>
	Buffer overflow in the jas_stream_printf function in libjasper/base/jas_stream.c in JasPer 1.900.1 might allow context-dependent attackers to have an unknown impact via vectors related to the mif_hdr_put function and use of vsprintf.
	</description>
 </metadata>
<!-- 8b7969b972f487746cbdfd26efd3ae0a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031882" comment="libjasper-32bit less than 9-200811141502"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031883" comment="libjasper less than 1.701.0-1.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3525</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3525" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3525" source="CVE"/>
	<description>
	The sbni_ioctl function in drivers/net/wan/sbni.c in the wan subsystem in the Linux kernel 2.6.26.3 does not check for the CAP_NET_ADMIN capability before processing a (1) SIOCDEVRESINSTATS, (2) SIOCDEVSHWSTATE, (3) SIOCDEVENSLAVE, or (4) SIOCDEVEMANSIPATE ioctl request, which allows local users to bypass intended capability restrictions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7f6082d83ebb412cb08a347f1d4f15d4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031612" comment="kernel-bigsmp less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031613" comment="kernel-default less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031614" comment="kernel-smp less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
	<!-- ab571d638a77193397f7750e6adc1db1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031613" comment="kernel-default less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031614" comment="kernel-smp less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3528</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3528" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3528" source="CVE"/>
	<description>
	The error-reporting functionality in (1) fs/ext2/dir.c, (2) fs/ext3/dir.c, and possibly (3) fs/ext4/dir.c in the Linux kernel 2.6.26.5 does not limit the number of printk console messages that report directory corruption, which allows physically proximate attackers to cause a denial of service (temporary system hang) by mounting a filesystem that has corrupted dir-&gt;i_size and dir-&gt;i_blocks values and performing (a) read or (b) write operations.  NOTE: there are limited scenarios in which this crosses privilege boundaries.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7cafba4000c518586bc1b78e580e6295 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031884" comment="kernel-default less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031885" comment="kernel-smp less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031886" comment="kernel-source less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031887" comment="kernel-syms less than 2.6.5-7.315"/>
		</criteria>
	</criteria>
	<!-- b2f2bd1365ca33906b7c0bb3eb996ea0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031888" comment="kernel-bigsmp less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031884" comment="kernel-default less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031885" comment="kernel-smp less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031886" comment="kernel-source less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031887" comment="kernel-syms less than 2.6.5-7.315"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3529</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3529" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3529" source="CVE"/>
	<description>
	Heap-based buffer overflow in the xmlParseAttValueComplex function in parser.c in libxml2 before 2.7.0 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a long XML entity name.
	</description>
 </metadata>
<!-- 6a4c53a4f0700f99972273ceb5bb6e49 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031876" comment="libxml2-32bit less than 9-200809051309"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031877" comment="libxml2-devel less than 2.6.7-28.14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031878" comment="libxml2-python less than 2.6.7-46.14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031879" comment="libxml2 less than 2.6.7-28.14"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031878" comment="libxml2-python less than 2.6.7-46.14"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3639</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3639" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3639" source="CVE"/>
	<description>
	Heap-based buffer overflow in the read_rle16 function in imagetops in CUPS before 1.3.9 allows remote attackers to execute arbitrary code via an SGI image with malformed Run Length Encoded (RLE) data containing a small image and a large row count.
	</description>
 </metadata>
<!-- e400c570cdd9cb377678f746496466e7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031889" comment="cups-client less than 1.1.20-108.54"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031890" comment="cups-devel less than 1.1.20-108.54"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031891" comment="cups-libs-32bit less than 9-200810021549"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031892" comment="cups-libs less than 1.1.20-108.54"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031893" comment="cups less than 1.1.20-108.54"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3640</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3640" source="CVE"/>
	<description>
	Integer overflow in the WriteProlog function in texttops in CUPS before 1.3.9 allows remote attackers to execute arbitrary code via a crafted PostScript file that triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- e400c570cdd9cb377678f746496466e7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031889" comment="cups-client less than 1.1.20-108.54"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031890" comment="cups-devel less than 1.1.20-108.54"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031891" comment="cups-libs-32bit less than 9-200810021549"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031892" comment="cups-libs less than 1.1.20-108.54"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031893" comment="cups less than 1.1.20-108.54"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3641</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3641" source="CVE"/>
	<description>
	The Hewlett-Packard Graphics Language (HPGL) filter in CUPS before 1.3.9 allows remote attackers to execute arbitrary code via crafted pen width and pen color opcodes that overwrite arbitrary memory.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 780fd9d1e30deb80a800424357446b59 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031894" comment="cups-client less than 1.1.20-108.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031895" comment="cups-devel less than 1.1.20-108.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031896" comment="cups-libs-32bit less than 9-200812030152"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031897" comment="cups-libs less than 1.1.20-108.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031898" comment="cups less than 1.1.20-108.56"/>
		</criteria>
	</criteria>
	<!-- e400c570cdd9cb377678f746496466e7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031889" comment="cups-client less than 1.1.20-108.54"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031890" comment="cups-devel less than 1.1.20-108.54"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031891" comment="cups-libs-32bit less than 9-200810021549"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031892" comment="cups-libs less than 1.1.20-108.54"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031893" comment="cups less than 1.1.20-108.54"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3651</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3651" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3651" source="CVE"/>
	<description>
	Memory leak in racoon/proposal.c in the racoon daemon in ipsec-tools before 0.7.1 allows remote authenticated users to cause a denial of service (memory consumption) via invalid proposals.
	</description>
 </metadata>
<!-- 002debd7fd5575e0f83a48921e02a556 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031899" comment="ipsec-tools less than 0.3.3-1.15"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3652</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3652" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3652" source="CVE"/>
	<description>
	src/racoon/handler.c in racoon in ipsec-tools does not remove an "orphaned ph1" (phase 1) handle when it has been initiated remotely, which allows remote attackers to cause a denial of service (resource consumption).
	</description>
 </metadata>
<!-- 002debd7fd5575e0f83a48921e02a556 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031899" comment="ipsec-tools less than 0.3.3-1.15"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3655</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3655" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3655" source="CVE"/>
	<description>
	Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.
	</description>
 </metadata>
<!-- bf0b463c573238d140dbff3b8165ac7b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053391" comment="ruby less than 1.8.1-42.27"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3656</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3656" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3656" source="CVE"/>
	<description>
	Algorithmic complexity vulnerability in the WEBrick::HTTPUtils.split_header_value function in WEBrick::HTTP::DefaultFileHandler in WEBrick in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted HTTP request that is processed by a backtracking regular expression.
	</description>
 </metadata>
<!-- bf0b463c573238d140dbff3b8165ac7b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053391" comment="ruby less than 1.8.1-42.27"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3657</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3657" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3657" source="CVE"/>
	<description>
	The dl module in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not check "taintness" of inputs, which allows context-dependent attackers to bypass safe levels and execute dangerous functions by accessing a library using DL.dlopen.
	</description>
 </metadata>
<!-- bf0b463c573238d140dbff3b8165ac7b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053391" comment="ruby less than 1.8.1-42.27"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3658</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3658" source="CVE"/>
	<description>
	Buffer overflow in the imageloadfont function in ext/gd/gd.c in PHP 4.4.x before 4.4.9 and PHP 5.2 before 5.2.6-r6 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
<!-- 4336a0af68f8f640e4b94b0e41923a0a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031900" comment="mod_php4-core less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031901" comment="php4-bcmath less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031902" comment="php4-bz2 less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031903" comment="php4-calendar less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031904" comment="php4-ctype less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031905" comment="php4-curl less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031906" comment="php4-dba less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031907" comment="php4-dbase less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031908" comment="php4-devel less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031909" comment="php4-domxml less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031910" comment="php4-exif less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031911" comment="php4-fastcgi less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031912" comment="php4-filepro less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031913" comment="php4-ftp less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031914" comment="php4-gd less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031915" comment="php4-gettext less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031916" comment="php4-gmp less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031917" comment="php4-iconv less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031918" comment="php4-imap less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031919" comment="php4-ldap less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031920" comment="php4-mbstring less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031921" comment="php4-mcal less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031922" comment="php4-mcrypt less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031923" comment="php4-mhash less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031924" comment="php4-mime_magic less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031925" comment="php4-mysql less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031926" comment="php4-pear less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031927" comment="php4-pgsql less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031928" comment="php4-qtdom less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031929" comment="php4-readline less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031930" comment="php4-recode less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031931" comment="php4-servlet less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031932" comment="php4-session less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031933" comment="php4-shmop less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031934" comment="php4-snmp less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031935" comment="php4-sockets less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031936" comment="php4-swf less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031937" comment="php4-sysvsem less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031938" comment="php4-sysvshm less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031939" comment="php4-unixODBC less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031940" comment="php4-wddx less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031941" comment="php4-xslt less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031942" comment="php4-yp less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031943" comment="php4-zlib less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031944" comment="php4 less than 4.3.4-43.87"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3659</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3659" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3659" source="CVE"/>
	<description>
	Buffer overflow in the memnstr function in PHP 4.4.x before 4.4.9 and PHP 5.6 through 5.2.6 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via the delimiter argument to the explode function.  NOTE: the scope of this issue is limited since most applications would not use an attacker-controlled delimiter, but local attacks against safe_mode are feasible.
	</description>
 </metadata>
<!-- 4336a0af68f8f640e4b94b0e41923a0a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031900" comment="mod_php4-core less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031901" comment="php4-bcmath less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031902" comment="php4-bz2 less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031903" comment="php4-calendar less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031904" comment="php4-ctype less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031905" comment="php4-curl less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031906" comment="php4-dba less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031907" comment="php4-dbase less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031908" comment="php4-devel less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031909" comment="php4-domxml less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031910" comment="php4-exif less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031911" comment="php4-fastcgi less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031912" comment="php4-filepro less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031913" comment="php4-ftp less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031914" comment="php4-gd less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031915" comment="php4-gettext less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031916" comment="php4-gmp less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031917" comment="php4-iconv less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031918" comment="php4-imap less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031919" comment="php4-ldap less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031920" comment="php4-mbstring less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031921" comment="php4-mcal less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031922" comment="php4-mcrypt less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031923" comment="php4-mhash less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031924" comment="php4-mime_magic less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031925" comment="php4-mysql less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031926" comment="php4-pear less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031927" comment="php4-pgsql less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031928" comment="php4-qtdom less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031929" comment="php4-readline less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031930" comment="php4-recode less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031931" comment="php4-servlet less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031932" comment="php4-session less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031933" comment="php4-shmop less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031934" comment="php4-snmp less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031935" comment="php4-sockets less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031936" comment="php4-swf less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031937" comment="php4-sysvsem less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031938" comment="php4-sysvshm less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031939" comment="php4-unixODBC less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031940" comment="php4-wddx less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031941" comment="php4-xslt less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031942" comment="php4-yp less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031943" comment="php4-zlib less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031944" comment="php4 less than 4.3.4-43.87"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3790</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3790" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3790" source="CVE"/>
	<description>
	The REXML module in Ruby 1.8.6 through 1.8.6-p287, 1.8.7 through 1.8.7-p72, and 1.9 allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML document with recursively nested entities, aka an "XML entity explosion."
	</description>
 </metadata>
<!-- bf0b463c573238d140dbff3b8165ac7b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053391" comment="ruby less than 1.8.1-42.27"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3835</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3835" source="CVE"/>
	<description>
	The nsXMLDocument::OnChannelRedirect function in Mozilla Firefox before 2.0.0.17, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- f6315c5c6bde445e37c2730b22895fc0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031627" comment="epiphany-doc less than 1.2.10-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031628" comment="epiphany-extensions-devel less than 0.8.2-2.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031629" comment="epiphany-extensions less than 0.8.2-2.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031630" comment="epiphany less than 1.2.10-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031631" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031632" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031633" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031634" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031635" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031636" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031637" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031638" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031639" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031640" comment="mozilla less than 1.8_seamonkey_1.0.9-1.15"/>
		</criteria>
	</criteria>
	<!-- f8b2838afc3706a1f79bd864e2618613 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031641" comment="MozillaFirefox-translations less than 1.5.0.12-0.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031642" comment="MozillaFirefox less than 1.5.0.12-0.13"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3836</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3836" source="CVE"/>
	<description>
	feedWriter in Mozilla Firefox before 2.0.0.17 allows remote attackers to execute scripts with chrome privileges via vectors related to feed preview and the (1) elem.doCommand, (2) elem.dispatchEvent, (3) _setTitleText, (4) _setTitleImage, and (5) _initSubscriptionUI functions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- f6315c5c6bde445e37c2730b22895fc0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031627" comment="epiphany-doc less than 1.2.10-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031628" comment="epiphany-extensions-devel less than 0.8.2-2.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031629" comment="epiphany-extensions less than 0.8.2-2.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031630" comment="epiphany less than 1.2.10-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031631" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031632" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031633" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031634" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031635" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031636" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031637" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031638" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031639" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031640" comment="mozilla less than 1.8_seamonkey_1.0.9-1.15"/>
		</criteria>
	</criteria>
	<!-- f8b2838afc3706a1f79bd864e2618613 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031641" comment="MozillaFirefox-translations less than 1.5.0.12-0.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031642" comment="MozillaFirefox less than 1.5.0.12-0.13"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3837</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3837" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, and SeaMonkey before 1.1.12, allow user-assisted remote attackers to move a window during a mouse click, and possibly force a file download or unspecified other drag-and-drop action, via a crafted onmousedown action that calls window.moveBy, a variant of CVE-2003-0823.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- f6315c5c6bde445e37c2730b22895fc0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031627" comment="epiphany-doc less than 1.2.10-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031628" comment="epiphany-extensions-devel less than 0.8.2-2.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031629" comment="epiphany-extensions less than 0.8.2-2.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031630" comment="epiphany less than 1.2.10-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031631" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031632" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031633" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031634" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031635" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031636" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031637" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031638" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031639" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031640" comment="mozilla less than 1.8_seamonkey_1.0.9-1.15"/>
		</criteria>
	</criteria>
	<!-- f8b2838afc3706a1f79bd864e2618613 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031641" comment="MozillaFirefox-translations less than 1.5.0.12-0.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031642" comment="MozillaFirefox less than 1.5.0.12-0.13"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3863</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3863" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3863" source="CVE"/>
	<description>
	Stack-based buffer overflow in the read_special_escape function in src/psgen.c in GNU Enscript 1.6.1 and 1.6.4 beta, when the -e (aka special escapes processing) option is enabled, allows user-assisted remote attackers to execute arbitrary code via a crafted ASCII file, related to the setfilename command.
	</description>
 </metadata>
<!-- c62a897b906c327cb10e091f30f655f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031945" comment="enscript less than 1.6.2-814.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3873</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3873" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3873" source="CVE"/>
	<description>
	The System.setClipboard method in ActionScript in Adobe Flash Player 9.0.124.0 and earlier allows remote attackers to populate the clipboard with a URL that is difficult to delete and does not require user interaction to populate the clipboard, as exploited in the wild in August 2008.
	</description>
 </metadata>
<!-- edd13d7bde2f2ca4007725ec6281d6bd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031401" comment="flash-player less than 9.0.151.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3905</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3905" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3905" source="CVE"/>
	<description>
	resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
	</description>
 </metadata>
<!-- bf0b463c573238d140dbff3b8165ac7b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053391" comment="ruby less than 1.8.1-42.27"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3933</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3933" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3933" source="CVE"/>
	<description>
	Wireshark (formerly Ethereal) 0.10.14 through 1.0.2 allows attackers to cause a denial of service (crash) via a packet with crafted zlib-compressed data that triggers an invalid read in the tvb_uncompress function.
	</description>
 </metadata>
<!-- 3e457ce69a705b7f5c4fd47a764e90e0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031946" comment="ethereal less than 0.10.13-2.38"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3972</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3972" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3972" source="CVE"/>
	<description>
	pkcs15-tool in OpenSC before 0.11.6 does not apply security updates to a smart card unless the card's label matches the "OpenSC" string, which might allow physically proximate attackers to exploit vulnerabilities that the card owner expected were patched, as demonstrated by exploitation of CVE-2008-2235.
	</description>
 </metadata>
<!-- c3fd31aad32a3c9d1c57dd1c890137ec -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031814" comment="opensc-devel less than 0.8.0-194.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031815" comment="opensc less than 0.8.0-194.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4058</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-4058" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4058" source="CVE"/>
	<description>
	The XPConnect component in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to "pollute XPCNativeWrappers" and execute arbitrary code with chrome privileges via vectors related to (1) chrome XBL and (2) chrome JS.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- f6315c5c6bde445e37c2730b22895fc0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031627" comment="epiphany-doc less than 1.2.10-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031628" comment="epiphany-extensions-devel less than 0.8.2-2.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031629" comment="epiphany-extensions less than 0.8.2-2.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031630" comment="epiphany less than 1.2.10-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031631" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031632" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031633" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031634" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031635" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031636" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031637" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031638" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031639" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031640" comment="mozilla less than 1.8_seamonkey_1.0.9-1.15"/>
		</criteria>
	</criteria>
	<!-- f8b2838afc3706a1f79bd864e2618613 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031641" comment="MozillaFirefox-translations less than 1.5.0.12-0.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031642" comment="MozillaFirefox less than 1.5.0.12-0.13"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4059</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-4059" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4059" source="CVE"/>
	<description>
	The XPConnect component in Mozilla Firefox before 2.0.0.17 allows remote attackers to "pollute XPCNativeWrappers" and execute arbitrary code with chrome privileges via vectors related to a SCRIPT element.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- f6315c5c6bde445e37c2730b22895fc0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031627" comment="epiphany-doc less than 1.2.10-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031628" comment="epiphany-extensions-devel less than 0.8.2-2.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031629" comment="epiphany-extensions less than 0.8.2-2.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031630" comment="epiphany less than 1.2.10-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031631" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031632" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031633" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031634" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031635" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031636" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031637" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031638" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031639" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031640" comment="mozilla less than 1.8_seamonkey_1.0.9-1.15"/>
		</criteria>
	</criteria>
	<!-- f8b2838afc3706a1f79bd864e2618613 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031641" comment="MozillaFirefox-translations less than 1.5.0.12-0.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031642" comment="MozillaFirefox less than 1.5.0.12-0.13"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4060</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-4060" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4060" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allow remote attackers to create documents that lack script-handling objects, and execute arbitrary code with chrome privileges, via vectors related to (1) the document.loadBindingDocument function and (2) XSLT.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- f6315c5c6bde445e37c2730b22895fc0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031627" comment="epiphany-doc less than 1.2.10-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031628" comment="epiphany-extensions-devel less than 0.8.2-2.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031629" comment="epiphany-extensions less than 0.8.2-2.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031630" comment="epiphany less than 1.2.10-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031631" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031632" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031633" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031634" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031635" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031636" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031637" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031638" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031639" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031640" comment="mozilla less than 1.8_seamonkey_1.0.9-1.15"/>
		</criteria>
	</criteria>
	<!-- f8b2838afc3706a1f79bd864e2618613 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031641" comment="MozillaFirefox-translations less than 1.5.0.12-0.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031642" comment="MozillaFirefox less than 1.5.0.12-0.13"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4061</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-4061" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4061" source="CVE"/>
	<description>
	Integer overflow in the MathML component in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via an mtd element with a large integer value in the rowspan attribute, related to the layout engine.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- f6315c5c6bde445e37c2730b22895fc0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031627" comment="epiphany-doc less than 1.2.10-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031628" comment="epiphany-extensions-devel less than 0.8.2-2.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031629" comment="epiphany-extensions less than 0.8.2-2.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031630" comment="epiphany less than 1.2.10-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031631" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031632" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031633" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031634" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031635" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031636" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031637" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031638" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031639" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031640" comment="mozilla less than 1.8_seamonkey_1.0.9-1.15"/>
		</criteria>
	</criteria>
	<!-- f8b2838afc3706a1f79bd864e2618613 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031641" comment="MozillaFirefox-translations less than 1.5.0.12-0.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031642" comment="MozillaFirefox less than 1.5.0.12-0.13"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4062</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-4062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4062" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the JavaScript engine and (1) misinterpretation of the characteristics of Namespace and QName in jsxml.c, (2) misuse of signed integers in the nsEscapeCount function in nsEscape.cpp, and (3) interaction of JavaScript garbage collection with certain use of an NPObject in the nsNPObjWrapper::GetNewOrUsed function in nsJSNPRuntime.cpp.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- f6315c5c6bde445e37c2730b22895fc0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031627" comment="epiphany-doc less than 1.2.10-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031628" comment="epiphany-extensions-devel less than 0.8.2-2.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031629" comment="epiphany-extensions less than 0.8.2-2.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031630" comment="epiphany less than 1.2.10-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031631" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031632" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031633" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031634" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031635" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031636" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031637" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031638" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031639" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031640" comment="mozilla less than 1.8_seamonkey_1.0.9-1.15"/>
		</criteria>
	</criteria>
	<!-- f8b2838afc3706a1f79bd864e2618613 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031641" comment="MozillaFirefox-translations less than 1.5.0.12-0.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031642" comment="MozillaFirefox less than 1.5.0.12-0.13"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4063</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-4063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4063" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Mozilla Firefox 3.x before 3.0.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the layout engine and (1) a zero value of the "this" variable in the nsContentList::Item function; (2) interaction of the indic IME extension, a Hindi language selection, and the "g" character; and (3) interaction of the nsFrameList::SortByContentOrder function with a certain insufficient protection of inline frames.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- f6315c5c6bde445e37c2730b22895fc0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031627" comment="epiphany-doc less than 1.2.10-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031628" comment="epiphany-extensions-devel less than 0.8.2-2.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031629" comment="epiphany-extensions less than 0.8.2-2.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031630" comment="epiphany less than 1.2.10-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031631" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031632" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031633" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031634" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031635" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031636" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031637" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031638" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031639" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031640" comment="mozilla less than 1.8_seamonkey_1.0.9-1.15"/>
		</criteria>
	</criteria>
	<!-- f8b2838afc3706a1f79bd864e2618613 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031641" comment="MozillaFirefox-translations less than 1.5.0.12-0.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031642" comment="MozillaFirefox less than 1.5.0.12-0.13"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4064</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-4064" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4064" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Mozilla Firefox 3.x before 3.0.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to graphics rendering and (1) handling of a long alert messagebox in the cairo_surface_set_device_offset function, (2) integer overflows when handling animated PNG data in the info_callback function in nsPNGDecoder.cpp, and (3) an integer overflow when handling SVG data in the nsSVGFEGaussianBlurElement::SetupPredivide function in nsSVGFilters.cpp.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- f6315c5c6bde445e37c2730b22895fc0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031627" comment="epiphany-doc less than 1.2.10-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031628" comment="epiphany-extensions-devel less than 0.8.2-2.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031629" comment="epiphany-extensions less than 0.8.2-2.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031630" comment="epiphany less than 1.2.10-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031631" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031632" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031633" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031634" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031635" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031636" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031637" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031638" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031639" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031640" comment="mozilla less than 1.8_seamonkey_1.0.9-1.15"/>
		</criteria>
	</criteria>
	<!-- f8b2838afc3706a1f79bd864e2618613 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031641" comment="MozillaFirefox-translations less than 1.5.0.12-0.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031642" comment="MozillaFirefox less than 1.5.0.12-0.13"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4065</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-4065" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4065" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allow remote attackers to bypass cross-site scripting (XSS) protection mechanisms and conduct XSS attacks via byte order mark (BOM) characters that are removed from JavaScript code before execution, aka "Stripped BOM characters bug."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- f6315c5c6bde445e37c2730b22895fc0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031627" comment="epiphany-doc less than 1.2.10-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031628" comment="epiphany-extensions-devel less than 0.8.2-2.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031629" comment="epiphany-extensions less than 0.8.2-2.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031630" comment="epiphany less than 1.2.10-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031631" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031632" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031633" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031634" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031635" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031636" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031637" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031638" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031639" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031640" comment="mozilla less than 1.8_seamonkey_1.0.9-1.15"/>
		</criteria>
	</criteria>
	<!-- f8b2838afc3706a1f79bd864e2618613 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031641" comment="MozillaFirefox-translations less than 1.5.0.12-0.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031642" comment="MozillaFirefox less than 1.5.0.12-0.13"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4066</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-4066" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4066" source="CVE"/>
	<description>
	Mozilla Firefox 2.0.0.14, and other versions before 2.0.0.17, allows remote attackers to bypass cross-site scripting (XSS) protection mechanisms and conduct XSS attacks via HTML-escaped low surrogate characters that are ignored by the HTML parser, as demonstrated by a "jav&amp;#56325ascript" sequence, aka "HTML escaped low surrogates bug."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- f6315c5c6bde445e37c2730b22895fc0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031627" comment="epiphany-doc less than 1.2.10-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031628" comment="epiphany-extensions-devel less than 0.8.2-2.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031629" comment="epiphany-extensions less than 0.8.2-2.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031630" comment="epiphany less than 1.2.10-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031631" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031632" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031633" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031634" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031635" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031636" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031637" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031638" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031639" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031640" comment="mozilla less than 1.8_seamonkey_1.0.9-1.15"/>
		</criteria>
	</criteria>
	<!-- f8b2838afc3706a1f79bd864e2618613 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031641" comment="MozillaFirefox-translations less than 1.5.0.12-0.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031642" comment="MozillaFirefox less than 1.5.0.12-0.13"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4067</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-4067" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4067" source="CVE"/>
	<description>
	Directory traversal vulnerability in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 on Linux allows remote attackers to read arbitrary files via a .. (dot dot) and URL-encoded / (slash) characters in a resource: URI.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- f6315c5c6bde445e37c2730b22895fc0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031627" comment="epiphany-doc less than 1.2.10-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031628" comment="epiphany-extensions-devel less than 0.8.2-2.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031629" comment="epiphany-extensions less than 0.8.2-2.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031630" comment="epiphany less than 1.2.10-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031631" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031632" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031633" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031634" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031635" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031636" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031637" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031638" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031639" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031640" comment="mozilla less than 1.8_seamonkey_1.0.9-1.15"/>
		</criteria>
	</criteria>
	<!-- f8b2838afc3706a1f79bd864e2618613 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031641" comment="MozillaFirefox-translations less than 1.5.0.12-0.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031642" comment="MozillaFirefox less than 1.5.0.12-0.13"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4068</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-4068" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4068" source="CVE"/>
	<description>
	Directory traversal vulnerability in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to bypass "restrictions imposed on local HTML files," and obtain sensitive information and prompt users to write this information into a file, via directory traversal sequences in a resource: URI.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- f6315c5c6bde445e37c2730b22895fc0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031627" comment="epiphany-doc less than 1.2.10-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031628" comment="epiphany-extensions-devel less than 0.8.2-2.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031629" comment="epiphany-extensions less than 0.8.2-2.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031630" comment="epiphany less than 1.2.10-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031631" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031632" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031633" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031634" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031635" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031636" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031637" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031638" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031639" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031640" comment="mozilla less than 1.8_seamonkey_1.0.9-1.15"/>
		</criteria>
	</criteria>
	<!-- f8b2838afc3706a1f79bd864e2618613 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031641" comment="MozillaFirefox-translations less than 1.5.0.12-0.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031642" comment="MozillaFirefox less than 1.5.0.12-0.13"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4069</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-4069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4069" source="CVE"/>
	<description>
	The XBM decoder in Mozilla Firefox before 2.0.0.17 and SeaMonkey before 1.1.12 allows remote attackers to read uninitialized memory, and possibly obtain sensitive information in opportunistic circumstances, via a crafted XBM image file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- f6315c5c6bde445e37c2730b22895fc0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031627" comment="epiphany-doc less than 1.2.10-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031628" comment="epiphany-extensions-devel less than 0.8.2-2.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031629" comment="epiphany-extensions less than 0.8.2-2.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031630" comment="epiphany less than 1.2.10-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031631" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031632" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031633" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031634" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031635" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031636" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031637" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031638" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031639" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031640" comment="mozilla less than 1.8_seamonkey_1.0.9-1.15"/>
		</criteria>
	</criteria>
	<!-- f8b2838afc3706a1f79bd864e2618613 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031641" comment="MozillaFirefox-translations less than 1.5.0.12-0.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031642" comment="MozillaFirefox less than 1.5.0.12-0.13"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4097</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-4097" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4097" source="CVE"/>
	<description>
	MySQL 5.0.51a allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are associated with symlinks within pathnames for subdirectories of the MySQL home data directory, which are followed when tables are created in the future. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-2079.
	</description>
 </metadata>
<!-- 004cd7faf8f5e6ae4d2cfb50caa21db0 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031947" comment="mysql-Max less than 4.0.18-32.37"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031948" comment="mysql-bench less than 4.0.18-32.37"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031949" comment="mysql-client less than 4.0.18-32.37"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031950" comment="mysql-devel less than 4.0.18-32.37"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031951" comment="mysql-shared less than 4.0.18-32.37"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031952" comment="mysql less than 4.0.18-32.37"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031948" comment="mysql-bench less than 4.0.18-32.37"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4098</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-4098" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4098" source="CVE"/>
	<description>
	MySQL before 5.0.67 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL home data directory. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4097.
	</description>
 </metadata>
<!-- 004cd7faf8f5e6ae4d2cfb50caa21db0 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031947" comment="mysql-Max less than 4.0.18-32.37"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031948" comment="mysql-bench less than 4.0.18-32.37"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031949" comment="mysql-client less than 4.0.18-32.37"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031950" comment="mysql-devel less than 4.0.18-32.37"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031951" comment="mysql-shared less than 4.0.18-32.37"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031952" comment="mysql less than 4.0.18-32.37"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031948" comment="mysql-bench less than 4.0.18-32.37"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4101</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-4101" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4101" source="CVE"/>
	<description>
	Vim 3.0 through 7.x before 7.2.010 does not properly escape characters, which allows user-assisted attackers to (1) execute arbitrary shell commands by entering a K keystroke on a line that contains a ";" (semicolon) followed by a command, or execute arbitrary Ex commands by entering an argument after a (2) "Ctrl-]" (control close-square-bracket) or (3) "g]" (g close-square-bracket) keystroke sequence, a different issue than CVE-2008-2712.
	</description>
 </metadata>
<!-- d33093c5830311c493a7cebdc1a9debe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031851" comment="gvim less than 6.2-235.8"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4109</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-4109" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4109" source="CVE"/>
	<description>
	A certain Debian patch for OpenSSH before 4.3p2-9etch3 on etch; before 4.6p1-1 on sid and lenny; and on other distributions such as SUSE uses functions that are not async-signal-safe in the signal handler for login timeouts, which allows remote attackers to cause a denial of service (connection slot exhaustion) via multiple login attempts. NOTE: this issue exists because of an incorrect fix for CVE-2006-5051.
	</description>
 </metadata>
<!-- 55fbc6c14f7e9bffc041b18fa3a3a0c4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031953" comment="openssh-askpass less than 4.1p1-11.44"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031954" comment="openssh less than 4.1p1-11.44"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4210</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-4210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4210" source="CVE"/>
	<description>
	fs/open.c in the Linux kernel before 2.6.22 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by creating an executable file in a setgid directory through the (1) truncate or (2) ftruncate function in conjunction with memory-mapped I/O.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7cafba4000c518586bc1b78e580e6295 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031884" comment="kernel-default less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031885" comment="kernel-smp less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031886" comment="kernel-source less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031887" comment="kernel-syms less than 2.6.5-7.315"/>
		</criteria>
	</criteria>
	<!-- b2f2bd1365ca33906b7c0bb3eb996ea0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031888" comment="kernel-bigsmp less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031884" comment="kernel-default less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031885" comment="kernel-smp less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031886" comment="kernel-source less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031887" comment="kernel-syms less than 2.6.5-7.315"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4225</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-4225" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4225" source="CVE"/>
	<description>
	Integer overflow in the xmlBufferResize function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (infinite loop) via a large XML document.
	</description>
 </metadata>
<!-- 7b9a35f48b4e544e836f3f113ed2bedc -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031955" comment="libxml2-32bit less than 9-200811201357"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031956" comment="libxml2-devel less than 2.6.7-28.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031957" comment="libxml2-python less than 2.6.7-46.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031958" comment="libxml2 less than 2.6.7-28.18"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031957" comment="libxml2-python less than 2.6.7-46.17"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4226</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-4226" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4226" source="CVE"/>
	<description>
	Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a large XML document.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1dfc6f678d5735cf86f0e172115233b2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031959" comment="libxml2-32bit less than 9-200811071633"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031960" comment="libxml2 less than 2.6.7-28.16"/>
		</criteria>
	</criteria>
	<!-- 7c646ef4d38effcdd2a8421201f81211 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031959" comment="libxml2-32bit less than 9-200811071633"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031961" comment="libxml2-devel less than 2.6.7-28.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031960" comment="libxml2 less than 2.6.7-28.16"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4309</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-4309" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4309" source="CVE"/>
	<description>
	Integer overflow in the netsnmp_create_subtree_cache function in agent/snmp_agent.c in net-snmp 5.4 before 5.4.2.1, 5.3 before 5.3.2.3, and 5.2 before 5.2.5.1 allows remote attackers to cause a denial of service (crash) via a crafted SNMP GETBULK request, which triggers a heap-based buffer overflow,  related to the number of responses or repeats.
	</description>
 </metadata>
<!-- 517491e0816d67ef60d161f3189b3d20 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031962" comment="net-snmp-devel less than 5.1.3.1-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031963" comment="net-snmp less than 5.1.3.1-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031964" comment="perl-SNMP less than 5.1.3.1-0.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4395</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-4395" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4395" source="CVE"/>
	<description>
	Multiple buffer overflows in the ndiswrapper module 1.53 for the Linux kernel 2.6 allow remote attackers to execute arbitrary code by sending packets over a local wireless network that specify long ESSIDs.
	</description>
 </metadata>
<!-- 1515d78d43995dddb6687965c5c35f6e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031965" comment="km_ndiswrapper less than 1.1-4.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4401</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-4401" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4401" source="CVE"/>
	<description>
	ActionScript in Adobe Flash Player 9.0.124.0 and earlier does not require user interaction in conjunction with (1) the FileReference.browse operation in the FileReference upload API or (2) the FileReference.download operation in the FileReference download API, which allows remote attackers to create a browse dialog box, and possibly have unspecified other impact, via an SWF file.
	</description>
 </metadata>
<!-- edd13d7bde2f2ca4007725ec6281d6bd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031401" comment="flash-player less than 9.0.151.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4456</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-4456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4456" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in the command-line client in MySQL 5.0.26 through 5.0.45, and other versions including versions later than 5.0.45, when the --html option is enabled, allows attackers to inject arbitrary web script or HTML by placing it in a database cell, which might be accessed by this client when composing an HTML document.  NOTE: as of 20081031, the issue has not been fixed in MySQL 5.0.67.
	</description>
 </metadata>
<!-- 877515d582920d4f52d3e647af5b2d42 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054280" comment="mysql-Max less than 4.0.18-32.39"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054281" comment="mysql-bench less than 4.0.18-32.39"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054282" comment="mysql-client less than 4.0.18-32.39"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054283" comment="mysql-devel less than 4.0.18-32.39"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054284" comment="mysql-shared less than 4.0.18-32.39"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054285" comment="mysql less than 4.0.18-32.39"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4503</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-4503" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4503" source="CVE"/>
	<description>
	The Settings Manager in Adobe Flash Player 9.0.124.0 and earlier allows remote attackers to cause victims to unknowingly click on a link or dialog via access control dialogs disguised as normal graphical elements, as demonstrated by hijacking the camera or microphone, and related to "clickjacking."
	</description>
 </metadata>
<!-- edd13d7bde2f2ca4007725ec6281d6bd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031401" comment="flash-player less than 9.0.151.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4546</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-4546" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4546" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows remote web servers to cause a denial of service (NULL pointer dereference and browser crash) by returning a different response when an HTTP request is sent a second time, as demonstrated by two responses that provide SWF files with different SWF version numbers.
	</description>
 </metadata>
<!-- edd13d7bde2f2ca4007725ec6281d6bd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031401" comment="flash-player less than 9.0.151.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4552</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-4552" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4552" source="CVE"/>
	<description>
	The good_client function in nfs-utils 1.0.9, and possibly other versions before 1.1.3, invokes the hosts_ctl function with the wrong order of arguments, which causes TCP Wrappers to ignore netgroups and allows remote attackers to bypass intended access restrictions.
	</description>
 </metadata>
<!-- 3967fcc22b1b0321540d24f5e3d833c7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031966" comment="nfs-utils less than 1.0.6-103.33"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4555</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-4555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4555" source="CVE"/>
	<description>
	Stack-based buffer overflow in the push_subg function in parser.y (lib/graph/parser.c) in Graphviz 2.20.2, and possibly earlier versions, allows user-assisted remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a DOT file with a large number of Agraph_t elements.
	</description>
 </metadata>
<!-- 0cbce96469a1b382771890c2f274dbc6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031967" comment="graphviz-devel less than 1.11-34.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031968" comment="graphviz-graphs less than 1.11-34.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031969" comment="graphviz-tcl less than 1.11-34.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031970" comment="graphviz less than 1.11-34.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4636</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-4636" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4636" source="CVE"/>
	<description>
	yast2-backup 2.14.2 through 2.16.6 on SUSE Linux and Novell Linux allows local users to gain privileges via shell metacharacters in filenames used by the backup process.
	</description>
 </metadata>
<!-- 9b5088ff155f0ef71eeac627566a4ebe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031971" comment="yast2-backup less than 2.9.22-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4677</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-4677" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4677" source="CVE"/>
	<description>
	autoload/netrw.vim (aka the Netrw Plugin) 109, 131, and other versions before 133k for Vim 7.1.266, other 7.1 versions, and 7.2 stores credentials for an FTP session, and sends those credentials when attempting to establish subsequent FTP sessions to servers on different hosts, which allows remote FTP servers to obtain sensitive information in opportunistic circumstances by logging usernames and passwords.  NOTE: the upstream vendor disputes a vector involving different ports on the same host, stating "I'm assuming that they're using the same id and password on that unchanged hostname, deliberately."
	</description>
 </metadata>
<!-- d33093c5830311c493a7cebdc1a9debe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031851" comment="gvim less than 6.2-235.8"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4680</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-4680" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4680" source="CVE"/>
	<description>
	packet-usb.c in the USB dissector in Wireshark 0.99.7 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via a malformed USB Request Block (URB).
	</description>
 </metadata>
<!-- 3e457ce69a705b7f5c4fd47a764e90e0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031946" comment="ethereal less than 0.10.13-2.38"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4681</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-4681" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4681" source="CVE"/>
	<description>
	Unspecified vulnerability in the Bluetooth RFCOMM dissector in Wireshark 0.99.7 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via unknown packets.
	</description>
 </metadata>
<!-- 3e457ce69a705b7f5c4fd47a764e90e0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031946" comment="ethereal less than 0.10.13-2.38"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4683</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-4683" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4683" source="CVE"/>
	<description>
	The dissect_btacl function in packet-bthci_acl.c in the Bluetooth ACL dissector in Wireshark 0.99.2 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via a packet with an invalid length, related to an erroneous tvb_memcpy call.
	</description>
 </metadata>
<!-- 3e457ce69a705b7f5c4fd47a764e90e0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031946" comment="ethereal less than 0.10.13-2.38"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4685</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-4685" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4685" source="CVE"/>
	<description>
	Use-after-free vulnerability in the dissect_q931_cause_ie function in packet-q931.c in the Q.931 dissector in Wireshark 0.10.3 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via certain packets that trigger an exception.
	</description>
 </metadata>
<!-- 3e457ce69a705b7f5c4fd47a764e90e0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031946" comment="ethereal less than 0.10.13-2.38"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4690</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-4690" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4690" source="CVE"/>
	<description>
	lynx 2.8.6dev.15 and earlier, when advanced mode is enabled and lynx is configured as a URL handler, allows remote attackers to execute arbitrary commands via a crafted lynxcgi: URL, a related issue to CVE-2005-2929.  NOTE: this might only be a vulnerability in limited deployments that have defined a lynxcgi: handler.
	</description>
 </metadata>
<!-- 5411df1b613a6a69bdfd1a60aa1f2dcb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031110" comment="lynx less than 2.8.5-30.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4824</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-4824" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4824" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Adobe Flash Player 10.x before 10.0.12.36 and 9.x before 9.0.151.0 allow remote attackers to execute arbitrary code via unknown vectors related to "input validation errors."
	</description>
 </metadata>
<!-- edd13d7bde2f2ca4007725ec6281d6bd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031401" comment="flash-player less than 9.0.151.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4864</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-4864" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4864" source="CVE"/>
	<description>
	Multiple integer overflows in imageop.c in the imageop module in Python 1.5.2 through 2.5.1 allow context-dependent attackers to break out of the Python VM and execute arbitrary code via large integer values in certain arguments to the crop function, leading to a buffer overflow, a different vulnerability than CVE-2007-4965 and CVE-2008-1679.
	</description>
 </metadata>
<!-- 3118793234bb8b5e0dcba89b0a141f28 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031972" comment="python-32bit less than 9-200812011728"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031973" comment="python-curses less than 2.3.3-88.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031974" comment="python-demo less than 2.3.3-88.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031975" comment="python-devel less than 2.3.3-88.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031976" comment="python-doc-pdf less than 2.3.3-88.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031977" comment="python-doc less than 2.3.3-88.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031978" comment="python-gdbm less than 2.3.3-88.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031979" comment="python-idle less than 2.3.3-88.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031980" comment="python-mpz less than 2.3.3-88.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031981" comment="python-tk less than 2.3.3-88.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031982" comment="python-xml less than 2.3.3-88.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031983" comment="python less than 2.3.3-88.26"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4865</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-4865" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4865" source="CVE"/>
	<description>
	Untrusted search path vulnerability in valgrind before 3.4.0 allows local users to execute arbitrary programs via a Trojan horse .valgrindrc file in the current working directory, as demonstrated using a malicious --db-command options.  NOTE: the severity of this issue has been disputed, but CVE is including this issue because execution of a program from an untrusted directory is a common scenario.
	</description>
 </metadata>
<!-- 6fdf199cc33bcb79bf8fd8e53af19ead -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031984" comment="valgrind less than 3.2.3-0.3"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5012</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5012" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5012" source="CVE"/>
	<description>
	Mozilla Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 do not properly change the source URI when processing a canvas element and an HTTP redirect, which allows remote attackers to bypass the same origin policy and access arbitrary images that are not directly accessible to the attacker.  NOTE: this issue can be leveraged to enumerate software on the client by performing redirections related to moz-icon.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 43ce1734b8f340b9b8cd0bc5a8718241 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031643" comment="MozillaFirefox-translations less than 1.5.0.12-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031644" comment="MozillaFirefox less than 1.5.0.12-0.15"/>
		</criteria>
	</criteria>
	<!-- 55d1889fabf24d9bac066219efec8b53 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031645" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031646" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031647" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031648" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031649" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031650" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031651" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031652" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031653" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031654" comment="mozilla less than 1.8_seamonkey_1.0.9-1.17"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5013</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5013" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5013" source="CVE"/>
	<description>
	Mozilla Firefox 2.x before 2.0.0.18 and SeaMonkey 1.x before 1.1.13 do not properly check when the Flash module has been dynamically unloaded properly, which allows remote attackers to execute arbitrary code via a crafted SWF file that "dynamically unloads itself from an outside JavaScript function," which triggers an access of an expired memory address.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 43ce1734b8f340b9b8cd0bc5a8718241 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031643" comment="MozillaFirefox-translations less than 1.5.0.12-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031644" comment="MozillaFirefox less than 1.5.0.12-0.15"/>
		</criteria>
	</criteria>
	<!-- 55d1889fabf24d9bac066219efec8b53 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031645" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031646" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031647" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031648" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031649" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031650" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031651" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031652" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031653" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031654" comment="mozilla less than 1.8_seamonkey_1.0.9-1.17"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5014</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5014" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5014" source="CVE"/>
	<description>
	jslock.cpp in Mozilla Firefox 3.x before 3.0.2, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by modifying the window.__proto__.__proto__ object in a way that causes a lock on a non-native object, which triggers an assertion failure related to the OBJ_IS_NATIVE function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 43ce1734b8f340b9b8cd0bc5a8718241 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031643" comment="MozillaFirefox-translations less than 1.5.0.12-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031644" comment="MozillaFirefox less than 1.5.0.12-0.15"/>
		</criteria>
	</criteria>
	<!-- 55d1889fabf24d9bac066219efec8b53 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031645" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031646" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031647" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031648" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031649" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031650" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031651" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031652" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031653" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031654" comment="mozilla less than 1.8_seamonkey_1.0.9-1.17"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5016</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5016" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5016" source="CVE"/>
	<description>
	The layout engine in Mozilla Firefox 3.x before 3.0.4, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) via multiple vectors that trigger an assertion failure or other consequences.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 43ce1734b8f340b9b8cd0bc5a8718241 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031643" comment="MozillaFirefox-translations less than 1.5.0.12-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031644" comment="MozillaFirefox less than 1.5.0.12-0.15"/>
		</criteria>
	</criteria>
	<!-- 55d1889fabf24d9bac066219efec8b53 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031645" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031646" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031647" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031648" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031649" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031650" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031651" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031652" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031653" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031654" comment="mozilla less than 1.8_seamonkey_1.0.9-1.17"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5017</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5017" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5017" source="CVE"/>
	<description>
	Integer overflow in xpcom/io/nsEscape.cpp in the browser engine in Mozilla Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 43ce1734b8f340b9b8cd0bc5a8718241 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031643" comment="MozillaFirefox-translations less than 1.5.0.12-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031644" comment="MozillaFirefox less than 1.5.0.12-0.15"/>
		</criteria>
	</criteria>
	<!-- 55d1889fabf24d9bac066219efec8b53 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031645" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031646" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031647" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031648" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031649" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031650" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031651" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031652" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031653" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031654" comment="mozilla less than 1.8_seamonkey_1.0.9-1.17"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5018</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5018" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5018" source="CVE"/>
	<description>
	The JavaScript engine in Mozilla Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) via vectors related to "insufficient class checking" in the Date class.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 43ce1734b8f340b9b8cd0bc5a8718241 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031643" comment="MozillaFirefox-translations less than 1.5.0.12-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031644" comment="MozillaFirefox less than 1.5.0.12-0.15"/>
		</criteria>
	</criteria>
	<!-- 55d1889fabf24d9bac066219efec8b53 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031645" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031646" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031647" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031648" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031649" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031650" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031651" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031652" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031653" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031654" comment="mozilla less than 1.8_seamonkey_1.0.9-1.17"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5021</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5021" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5021" source="CVE"/>
	<description>
	nsFrameManager in Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by modifying properties of a file input element while it is still being initialized, then using the blur method to access uninitialized memory.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 43ce1734b8f340b9b8cd0bc5a8718241 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031643" comment="MozillaFirefox-translations less than 1.5.0.12-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031644" comment="MozillaFirefox less than 1.5.0.12-0.15"/>
		</criteria>
	</criteria>
	<!-- 55d1889fabf24d9bac066219efec8b53 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031645" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031646" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031647" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031648" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031649" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031650" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031651" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031652" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031653" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031654" comment="mozilla less than 1.8_seamonkey_1.0.9-1.17"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5022</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5022" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5022" source="CVE"/>
	<description>
	The nsXMLHttpRequest::NotifyEventListeners method in Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to bypass the same-origin policy and execute arbitrary script via multiple listeners, which bypass the inner window check.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 43ce1734b8f340b9b8cd0bc5a8718241 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031643" comment="MozillaFirefox-translations less than 1.5.0.12-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031644" comment="MozillaFirefox less than 1.5.0.12-0.15"/>
		</criteria>
	</criteria>
	<!-- 55d1889fabf24d9bac066219efec8b53 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031645" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031646" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031647" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031648" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031649" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031650" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031651" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031652" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031653" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031654" comment="mozilla less than 1.8_seamonkey_1.0.9-1.17"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5023</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5023" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5023" source="CVE"/>
	<description>
	Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to bypass the protection mechanism for codebase principals and execute arbitrary script via the -moz-binding CSS property in a signed JAR file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 43ce1734b8f340b9b8cd0bc5a8718241 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031643" comment="MozillaFirefox-translations less than 1.5.0.12-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031644" comment="MozillaFirefox less than 1.5.0.12-0.15"/>
		</criteria>
	</criteria>
	<!-- 55d1889fabf24d9bac066219efec8b53 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031645" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031646" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031647" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031648" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031649" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031650" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031651" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031652" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031653" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031654" comment="mozilla less than 1.8_seamonkey_1.0.9-1.17"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5024</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5024" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5024" source="CVE"/>
	<description>
	Mozilla Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 do not properly escape quote characters used for XML processing, which allows remote attackers to conduct XML injection attacks via the default namespace in an E4X document.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 43ce1734b8f340b9b8cd0bc5a8718241 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031643" comment="MozillaFirefox-translations less than 1.5.0.12-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031644" comment="MozillaFirefox less than 1.5.0.12-0.15"/>
		</criteria>
	</criteria>
	<!-- 55d1889fabf24d9bac066219efec8b53 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031645" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031646" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031647" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031648" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031649" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031650" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031651" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031652" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031653" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031654" comment="mozilla less than 1.8_seamonkey_1.0.9-1.17"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5029</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5029" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5029" source="CVE"/>
	<description>
	The __scm_destroy function in net/core/scm.c in the Linux kernel 2.6.27.4, 2.6.26, and earlier makes indirect recursive calls to itself through calls to the fput function, which allows local users to cause a denial of service (panic) via vectors related to sending an SCM_RIGHTS message through a UNIX domain socket and closing file descriptors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7cafba4000c518586bc1b78e580e6295 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031884" comment="kernel-default less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031885" comment="kernel-smp less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031886" comment="kernel-source less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031887" comment="kernel-syms less than 2.6.5-7.315"/>
		</criteria>
	</criteria>
	<!-- b2f2bd1365ca33906b7c0bb3eb996ea0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031888" comment="kernel-bigsmp less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031884" comment="kernel-default less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031885" comment="kernel-smp less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031886" comment="kernel-source less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031887" comment="kernel-syms less than 2.6.5-7.315"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5031</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5031" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5031" source="CVE"/>
	<description>
	Multiple integer overflows in Python 2.2.3 through 2.5.1, and 2.6, allow context-dependent attackers to have an unknown impact via a large integer value in the tabsize argument to the expandtabs method, as implemented by (1) the string_expandtabs function in Objects/stringobject.c and (2) the unicode_expandtabs function in Objects/unicodeobject.c.  NOTE: this vulnerability reportedly exists because of an incomplete fix for CVE-2008-2315.
	</description>
 </metadata>
<!-- 3118793234bb8b5e0dcba89b0a141f28 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031972" comment="python-32bit less than 9-200812011728"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031973" comment="python-curses less than 2.3.3-88.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031974" comment="python-demo less than 2.3.3-88.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031975" comment="python-devel less than 2.3.3-88.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031976" comment="python-doc-pdf less than 2.3.3-88.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031977" comment="python-doc less than 2.3.3-88.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031978" comment="python-gdbm less than 2.3.3-88.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031979" comment="python-idle less than 2.3.3-88.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031980" comment="python-mpz less than 2.3.3-88.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031981" comment="python-tk less than 2.3.3-88.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031982" comment="python-xml less than 2.3.3-88.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031983" comment="python less than 2.3.3-88.26"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5052</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5052" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5052" source="CVE"/>
	<description>
	The AppendAttributeValue function in the JavaScript engine in Mozilla Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger memory corruption, as demonstrated by e4x/extensions/regress-410192.js.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 43ce1734b8f340b9b8cd0bc5a8718241 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031643" comment="MozillaFirefox-translations less than 1.5.0.12-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031644" comment="MozillaFirefox less than 1.5.0.12-0.15"/>
		</criteria>
	</criteria>
	<!-- 55d1889fabf24d9bac066219efec8b53 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031645" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031646" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031647" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031648" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031649" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031650" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031651" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031652" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031653" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031654" comment="mozilla less than 1.8_seamonkey_1.0.9-1.17"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5077</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077" source="CVE"/>
	<description>
	OpenSSL 0.9.8i and earlier does not properly check the return value from the EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys.
	</description>
 </metadata>
<!-- 0a0c29d2fa5ecac3cdf58a731bb7cd9a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031985" comment="openssl-32bit less than 9-200901211340"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031986" comment="openssl-devel-32bit less than 9-200901211340"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031987" comment="openssl-devel less than 0.9.7d-15.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031988" comment="openssl-doc less than 0.9.7d-15.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031989" comment="openssl less than 0.9.7d-15.37"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5078</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5078" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5078" source="CVE"/>
	<description>
	Multiple buffer overflows in the (1) recognize_eps_file function (src/psgen.c) and (2) tilde_subst function (src/util.c) in GNU enscript 1.6.1, and possibly earlier, might allow remote attackers to execute arbitrary code via an epsf escape sequence with a long filename.
	</description>
 </metadata>
<!-- b8fe6200e0d56eee4d9169a28de8f327 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031990" comment="enscript less than 1.6.2-814.11"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5233</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5233" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5233" source="CVE"/>
	<description>
	xine-lib 1.1.12, and other versions before 1.1.15, does not check for failure of malloc in circumstances including (1) the mymng_process_header function in demux_mng.c, (2) the open_mod_file function in demux_mod.c, and (3) frame_buffer allocation in the real_parse_audio_specific_data function in demux_real.c, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted media file.
	</description>
 </metadata>
<!-- b425888bf973abc460031dbfa196bae0 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031870" comment="xine-lib-32bit less than 9-200901281640"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031871" comment="xine-lib less than 0.99.rc3a-106.49"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031872" comment="xine-devel less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031873" comment="xine-extra less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031870" comment="xine-lib-32bit less than 9-200901281640"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031871" comment="xine-lib less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031874" comment="xine-ui less than 0.99.rc3a-106.49"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5234</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5234" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5234" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in xine-lib 1.1.12, and other versions before 1.1.15, allow remote attackers to execute arbitrary code via vectors related to (1) a crafted metadata atom size processed by the parse_moov_atom function in demux_qt.c and (2) frame reading in the id3v23_interp_frame function in id3.c.  NOTE: as of 20081122, it is possible that vector 1 has not been fixed in 1.1.15.
	</description>
 </metadata>
<!-- b425888bf973abc460031dbfa196bae0 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031870" comment="xine-lib-32bit less than 9-200901281640"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031871" comment="xine-lib less than 0.99.rc3a-106.49"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031872" comment="xine-devel less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031873" comment="xine-extra less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031870" comment="xine-lib-32bit less than 9-200901281640"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031871" comment="xine-lib less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031874" comment="xine-ui less than 0.99.rc3a-106.49"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5235</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5235" source="CVE"/>
	<description>
	Heap-based buffer overflow in the demux_real_send_chunk function in src/demuxers/demux_real.c in xine-lib before 1.1.15 allows remote attackers to execute arbitrary code via a crafted Real Media file. NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- b425888bf973abc460031dbfa196bae0 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031870" comment="xine-lib-32bit less than 9-200901281640"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031871" comment="xine-lib less than 0.99.rc3a-106.49"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031872" comment="xine-devel less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031873" comment="xine-extra less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031870" comment="xine-lib-32bit less than 9-200901281640"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031871" comment="xine-lib less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031874" comment="xine-ui less than 0.99.rc3a-106.49"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5236</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5236" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5236" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in xine-lib 1.1.12, and other 1.1.15 and earlier versions, allow remote attackers to execute arbitrary code via vectors related to (1) a crafted EBML element length processed by the parse_block_group function in demux_matroska.c; (2) a certain combination of sps, w, and h values processed by the real_parse_audio_specific_data and demux_real_send_chunk functions in demux_real.c; and (3) an unspecified combination of three values processed by the open_ra_file function in demux_realaudio.c.  NOTE: vector 2 reportedly exists because of an incomplete fix in 1.1.15.
	</description>
 </metadata>
<!-- b425888bf973abc460031dbfa196bae0 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031870" comment="xine-lib-32bit less than 9-200901281640"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031871" comment="xine-lib less than 0.99.rc3a-106.49"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031872" comment="xine-devel less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031873" comment="xine-extra less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031870" comment="xine-lib-32bit less than 9-200901281640"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031871" comment="xine-lib less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031874" comment="xine-ui less than 0.99.rc3a-106.49"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5237</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5237" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5237" source="CVE"/>
	<description>
	Multiple integer overflows in xine-lib 1.1.12, and other 1.1.15 and earlier versions, allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via (1) crafted width and height values that are not validated by the mymng_process_header function in demux_mng.c before use in an allocation calculation or (2) crafted current_atom_size and string_size values processed by the parse_reference_atom function in demux_qt.c for an RDRF_ATOM string.
	</description>
 </metadata>
<!-- b425888bf973abc460031dbfa196bae0 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031870" comment="xine-lib-32bit less than 9-200901281640"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031871" comment="xine-lib less than 0.99.rc3a-106.49"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031872" comment="xine-devel less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031873" comment="xine-extra less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031870" comment="xine-lib-32bit less than 9-200901281640"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031871" comment="xine-lib less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031874" comment="xine-ui less than 0.99.rc3a-106.49"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5238</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5238" source="CVE"/>
	<description>
	Integer overflow in the real_parse_mdpr function in demux_real.c in xine-lib 1.1.12, and other versions before 1.1.15, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted stream_name_size field.
	</description>
 </metadata>
<!-- b425888bf973abc460031dbfa196bae0 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031870" comment="xine-lib-32bit less than 9-200901281640"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031871" comment="xine-lib less than 0.99.rc3a-106.49"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031872" comment="xine-devel less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031873" comment="xine-extra less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031870" comment="xine-lib-32bit less than 9-200901281640"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031871" comment="xine-lib less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031874" comment="xine-ui less than 0.99.rc3a-106.49"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5239</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5239" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5239" source="CVE"/>
	<description>
	xine-lib 1.1.12, and other 1.1.15 and earlier versions, does not properly handle (a) negative and (b) zero values during unspecified read function calls in input_file.c, input_net.c, input_smb.c, and input_http.c, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via vectors such as (1) a file or (2) an HTTP response, which triggers consequences such as out-of-bounds reads and heap-based buffer overflows.
	</description>
 </metadata>
<!-- b425888bf973abc460031dbfa196bae0 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031870" comment="xine-lib-32bit less than 9-200901281640"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031871" comment="xine-lib less than 0.99.rc3a-106.49"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031872" comment="xine-devel less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031873" comment="xine-extra less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031870" comment="xine-lib-32bit less than 9-200901281640"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031871" comment="xine-lib less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031874" comment="xine-ui less than 0.99.rc3a-106.49"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5240</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5240" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5240" source="CVE"/>
	<description>
	xine-lib 1.1.12, and other 1.1.15 and earlier versions, relies on an untrusted input value to determine the memory allocation and does not check the result for (1) the MATROSKA_ID_TR_CODECPRIVATE track entry element processed by demux_matroska.c; and (2) PROP_TAG, (3) MDPR_TAG, and (4) CONT_TAG chunks processed by the real_parse_headers function in demux_real.c; which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) or possibly execute arbitrary code via a crafted value.
	</description>
 </metadata>
<!-- b425888bf973abc460031dbfa196bae0 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031870" comment="xine-lib-32bit less than 9-200901281640"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031871" comment="xine-lib less than 0.99.rc3a-106.49"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031872" comment="xine-devel less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031873" comment="xine-extra less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031870" comment="xine-lib-32bit less than 9-200901281640"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031871" comment="xine-lib less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031874" comment="xine-ui less than 0.99.rc3a-106.49"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5241</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5241" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5241" source="CVE"/>
	<description>
	Integer underflow in demux_qt.c in xine-lib 1.1.12, and other 1.1.15 and earlier versions, allows remote attackers to cause a denial of service (crash) via a crafted media file that results in a small value of moov_atom_size in a compressed MOV (aka CMOV_ATOM).
	</description>
 </metadata>
<!-- b425888bf973abc460031dbfa196bae0 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031870" comment="xine-lib-32bit less than 9-200901281640"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031871" comment="xine-lib less than 0.99.rc3a-106.49"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031872" comment="xine-devel less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031873" comment="xine-extra less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031870" comment="xine-lib-32bit less than 9-200901281640"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031871" comment="xine-lib less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031874" comment="xine-ui less than 0.99.rc3a-106.49"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5242</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5242" source="CVE"/>
	<description>
	demux_qt.c in xine-lib 1.1.12, and other 1.1.15 and earlier versions, does not validate the count field before calling calloc for STSD_ATOM atom allocation, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted media file.
	</description>
 </metadata>
<!-- b425888bf973abc460031dbfa196bae0 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031870" comment="xine-lib-32bit less than 9-200901281640"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031871" comment="xine-lib less than 0.99.rc3a-106.49"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031872" comment="xine-devel less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031873" comment="xine-extra less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031870" comment="xine-lib-32bit less than 9-200901281640"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031871" comment="xine-lib less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031874" comment="xine-ui less than 0.99.rc3a-106.49"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5243</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5243" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5243" source="CVE"/>
	<description>
	The real_parse_headers function in demux_real.c in xine-lib 1.1.12, and other 1.1.15 and earlier versions, relies on an untrusted input length value to "reindex into an allocated buffer," which allows remote attackers to cause a denial of service (crash) via a crafted value, probably an array index error.
	</description>
 </metadata>
<!-- b425888bf973abc460031dbfa196bae0 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031870" comment="xine-lib-32bit less than 9-200901281640"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031871" comment="xine-lib less than 0.99.rc3a-106.49"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031872" comment="xine-devel less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031873" comment="xine-extra less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031870" comment="xine-lib-32bit less than 9-200901281640"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031871" comment="xine-lib less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031874" comment="xine-ui less than 0.99.rc3a-106.49"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5244</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5244" source="CVE"/>
	<description>
	Unspecified vulnerability in xine-lib before 1.1.15 has unknown impact and attack vectors related to libfaad.  NOTE: due to the lack of details, it is not clear whether this is an issue in xine-lib or in libfaad.
	</description>
 </metadata>
<!-- b425888bf973abc460031dbfa196bae0 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031870" comment="xine-lib-32bit less than 9-200901281640"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031871" comment="xine-lib less than 0.99.rc3a-106.49"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031872" comment="xine-devel less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031873" comment="xine-extra less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031870" comment="xine-lib-32bit less than 9-200901281640"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031871" comment="xine-lib less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031874" comment="xine-ui less than 0.99.rc3a-106.49"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5245</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5245" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5245" source="CVE"/>
	<description>
	xine-lib before 1.1.15 performs V4L video frame preallocation before ascertaining the required length, which has unknown impact and attack vectors, possibly related to a buffer overflow in the open_video_capture_device function in src/input/input_v4l.c.
	</description>
 </metadata>
<!-- b425888bf973abc460031dbfa196bae0 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031870" comment="xine-lib-32bit less than 9-200901281640"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031871" comment="xine-lib less than 0.99.rc3a-106.49"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031872" comment="xine-devel less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031873" comment="xine-extra less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031870" comment="xine-lib-32bit less than 9-200901281640"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031871" comment="xine-lib less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031874" comment="xine-ui less than 0.99.rc3a-106.49"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5246</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5246" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5246" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in xine-lib before 1.1.15 allow remote attackers to execute arbitrary code via vectors that send ID3 data to the (1) id3v22_interp_frame and (2) id3v24_interp_frame functions in src/demuxers/id3.c.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
	</description>
 </metadata>
<!-- b425888bf973abc460031dbfa196bae0 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031870" comment="xine-lib-32bit less than 9-200901281640"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031871" comment="xine-lib less than 0.99.rc3a-106.49"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031872" comment="xine-devel less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031873" comment="xine-extra less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031870" comment="xine-lib-32bit less than 9-200901281640"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031871" comment="xine-lib less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031874" comment="xine-ui less than 0.99.rc3a-106.49"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5247</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5247" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5247" source="CVE"/>
	<description>
	The real_parse_audio_specific_data function in demux_real.c in xine-lib 1.1.12, and other 1.1.15 and earlier versions, uses an untrusted height (aka codec_data_length) value as a divisor, which allow remote attackers to cause a denial of service (divide-by-zero error and crash) via a zero value.
	</description>
 </metadata>
<!-- b425888bf973abc460031dbfa196bae0 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031870" comment="xine-lib-32bit less than 9-200901281640"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031871" comment="xine-lib less than 0.99.rc3a-106.49"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031872" comment="xine-devel less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031873" comment="xine-extra less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031870" comment="xine-lib-32bit less than 9-200901281640"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031871" comment="xine-lib less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031874" comment="xine-ui less than 0.99.rc3a-106.49"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5248</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 SDK for x86</platform>
		<platform>Novell Linux Desktop 9 SDK for x86_64</platform>
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5248" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5248" source="CVE"/>
	<description>
	xine-lib before 1.1.15 allows remote attackers to cause a denial of service (crash) via "MP3 files with metadata consisting only of separators."
	</description>
 </metadata>
<!-- b425888bf973abc460031dbfa196bae0 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031870" comment="xine-lib-32bit less than 9-200901281640"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031871" comment="xine-lib less than 0.99.rc3a-106.49"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031872" comment="xine-devel less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031873" comment="xine-extra less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031870" comment="xine-lib-32bit less than 9-200901281640"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031871" comment="xine-lib less than 0.99.rc3a-106.49"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031874" comment="xine-ui less than 0.99.rc3a-106.49"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5286</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5286" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5286" source="CVE"/>
	<description>
	Integer overflow in the _cupsImageReadPNG function in CUPS 1.1.17 through 1.3.9 allows remote attackers to execute arbitrary code via a PNG image with a large height value, which bypasses a validation check and triggers a buffer overflow.
	</description>
 </metadata>
<!-- 780fd9d1e30deb80a800424357446b59 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031894" comment="cups-client less than 1.1.20-108.56"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031895" comment="cups-devel less than 1.1.20-108.56"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031896" comment="cups-libs-32bit less than 9-200812030152"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031897" comment="cups-libs less than 1.1.20-108.56"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031898" comment="cups less than 1.1.20-108.56"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5339</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5339" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5339" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Web Start (JWS) and Java Plug-in with Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allows untrusted JWS applications to perform network connections to unauthorized hosts via unknown vectors, aka CR 6727079.
	</description>
 </metadata>
<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5340</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5340" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5340" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Web Start (JWS) and Java Plug-in with Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allows untrusted JWS applications to gain privileges to access local files or applications via unknown vectors, aka 6727081.
	</description>
 </metadata>
<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5341</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5341" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5341" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Web Start (JWS) and Java Plug-in with Sun JDK and JRE 6 Update 10 and earlier, and JDK and JRE 5.0 Update 16 and earlier, allows untrusted JWS applications to obtain the pathname of the JWS cache and the application username via unknown vectors, aka CR 6727071.
	</description>
 </metadata>
<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5342</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5342" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5342" source="CVE"/>
	<description>
	Unspecified vulnerability in the BasicService for Java Web Start (JWS) and Java Plug-in with Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allows untrusted downloaded applications to cause local files to be displayed in the browser of the user of the untrusted application via unknown vectors, aka 6767668.
	</description>
 </metadata>
<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5343</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5343" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5343" source="CVE"/>
	<description>
	Java Web Start (JWS) and Java Plug-in with Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allows remote attackers to make unauthorized network connections and hijack HTTP sessions via a crafted file that validates as both a GIF and a Java JAR file, aka "GIFAR" and CR 6707535.
	</description>
 </metadata>
<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5344</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5344" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5344" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Web Start (JWS) and Java Plug-in with Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allows untrusted applets to read arbitrary files and make unauthorized network connections via unknown vectors related to applet classloading, aka 6716217.
	</description>
 </metadata>
<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5345</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5345" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5345" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Runtime Environment (JRE) with Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; SDK and JRE 1.4.2_18 and earlier; and SDK and JRE 1.3.1_23 and earlier allows code that is loaded from a local filesystem to read arbitrary files and make unauthorized connections to localhost via unknown vectors.
	</description>
 </metadata>
<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5346</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5346" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5346" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Runtime Environment (JRE) for Sun JDK and JRE 5.0 Update 16 and earlier; SDK and JRE 1.4.2_18 and earlier; and SDK and JRE 1.3.1_23 or earlier allows untrusted applets and applications to read arbitrary memory via a crafted ZIP file.
	</description>
 </metadata>
<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5347</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5347" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5347" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier allow untrusted applets and applications to gain privileges via vectors related to access to inner classes in the (1) JAX-WS and (2) JAXB packages.
	</description>
 </metadata>
<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5348</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5348" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5348" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier, when using Kerberos authentication, allows remote attackers to cause a denial of service (OS resource consumption) via unknown vectors.
	</description>
 </metadata>
<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5349</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5349" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5349" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier, and JDK and JRE 5.0 Update 16 and earlier, allows remote attackers to cause a denial of service (CPU consumption) via a crafted RSA public key.
	</description>
 </metadata>
<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5350</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5350" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5350" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allows untrusted applications and applets to list the contents of the operating user's directory via unknown vectors.
	</description>
 </metadata>
<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5351</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5351" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5351" source="CVE"/>
	<description>
	Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier accepts UTF-8 encodings that are not the "shortest" form, which makes it easier for attackers to bypass protection mechanisms for other applications that rely on shortest-form UTF-8 encodings.
	</description>
 </metadata>
<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5352</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5352" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5352" source="CVE"/>
	<description>
	Integer overflow in the JAR unpacking utility (unpack200) in the unpack library (unpack.dll) in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier, and JDK and JRE 5.0 Update 16 and earlier, allows untrusted applications and applets to gain privileges via a Pack200 compressed JAR file that triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5353</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5353" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5353" source="CVE"/>
	<description>
	The Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier does not properly enforce context of ZoneInfo objects during deserialization, which allows remote attackers to run untrusted applets and applications in a privileged context, as demonstrated by "deserializing Calendar objects".
	</description>
 </metadata>
<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5354</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5354" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5354" source="CVE"/>
	<description>
	Stack-based buffer overflow in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allows locally-launched and possibly remote untrusted Java applications to execute arbitrary code via a JAR file with a long Main-Class manifest entry.
	</description>
 </metadata>
<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5355</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5355" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5355" source="CVE"/>
	<description>
	The "Java Update" feature for Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier does not verify the signature of the JRE that is downloaded, which allows remote attackers to execute arbitrary code via DNS man-in-the-middle attacks.
	</description>
 </metadata>
<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5356</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5356" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5356" source="CVE"/>
	<description>
	Heap-based buffer overflow in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier might allow remote attackers to execute arbitrary code via a crafted TrueType font file.
	</description>
 </metadata>
<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5357</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5357" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5357" source="CVE"/>
	<description>
	Integer overflow in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; SDK and JRE 1.4.2_18 and earlier; and SDK and JRE 1.3.1_23 and earlier might allow remote attackers to execute arbitrary code via a crafted TrueType font file, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5358</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5358" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5358" source="CVE"/>
	<description>
	Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier might allow remote attackers to execute arbitrary code via a crafted GIF file that triggers memory corruption during display of the splash screen, possibly related to splashscreen.dll.
	</description>
 </metadata>
<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5359</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5359" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5359" source="CVE"/>
	<description>
	Buffer overflow in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; SDK and JRE 1.4.2_18 and earlier; and SDK and JRE 1.3.1_23 and earlier might allow remote attackers to execute arbitrary code, related to a ConvolveOp operation in the Java AWT library.
	</description>
 </metadata>
<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5360</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5360" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5360" source="CVE"/>
	<description>
	Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; SDK and JRE 1.4.2_18 and earlier; and SDK and JRE 1.3.1_23 and earlier creates temporary files with predictable file names, which allows attackers to write malicious JAR files via unknown vectors.
	</description>
 </metadata>
<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5499</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5499" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5499" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player for Linux 10.0.12.36, and 9.0.151.0 and earlier, allows remote attackers to execute arbitrary code via a crafted SWF file.
	</description>
 </metadata>
<!-- b52cdb1ec44206a5f1c43b3ad4bc355b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031991" comment="flash-player less than 9.0.152.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5500</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5500" source="CVE"/>
	<description>
	The layout engine in Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to cause a denial of service (crash) and possibly trigger memory corruption via vectors related to (1) a reachable assertion or (2) an integer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e95b6241be3476dc7e25a19a51d3d48 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031992" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031993" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031994" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031995" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031996" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031997" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031998" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031999" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032000" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032001" comment="mozilla less than 1.8_seamonkey_1.0.9-1.19"/>
		</criteria>
	</criteria>
	<!-- f3a7728c69c970d583ccc6816c706262 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032002" comment="MozillaFirefox-translations less than 1.5.0.12-0.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032003" comment="MozillaFirefox less than 1.5.0.12-0.17"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5503</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5503" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5503" source="CVE"/>
	<description>
	The loadBindingDocument function in Mozilla Firefox 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 does not perform any security checks related to the same-domain policy, which allows remote attackers to read or access data from other domains via crafted XBL bindings.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e95b6241be3476dc7e25a19a51d3d48 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031992" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031993" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031994" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031995" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031996" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031997" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031998" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031999" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032000" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032001" comment="mozilla less than 1.8_seamonkey_1.0.9-1.19"/>
		</criteria>
	</criteria>
	<!-- f3a7728c69c970d583ccc6816c706262 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032002" comment="MozillaFirefox-translations less than 1.5.0.12-0.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032003" comment="MozillaFirefox less than 1.5.0.12-0.17"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5504</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5504" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5504" source="CVE"/>
	<description>
	Mozilla Firefox 2.x before 2.0.0.19 allows remote attackers to run arbitrary JavaScript with chrome privileges via vectors related to the feed preview, a different vulnerability than CVE-2008-3836.
	</description>
 </metadata>
<!-- f3a7728c69c970d583ccc6816c706262 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032002" comment="MozillaFirefox-translations less than 1.5.0.12-0.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032003" comment="MozillaFirefox less than 1.5.0.12-0.17"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5506</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5506" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5506" source="CVE"/>
	<description>
	Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to bypass the same origin policy by causing the browser to issue an XMLHttpRequest to an attacker-controlled resource that uses a 302 redirect to a resource in a different domain, then reading content from the response, aka "response disclosure."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e95b6241be3476dc7e25a19a51d3d48 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031992" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031993" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031994" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031995" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031996" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031997" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031998" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031999" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032000" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032001" comment="mozilla less than 1.8_seamonkey_1.0.9-1.19"/>
		</criteria>
	</criteria>
	<!-- f3a7728c69c970d583ccc6816c706262 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032002" comment="MozillaFirefox-translations less than 1.5.0.12-0.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032003" comment="MozillaFirefox less than 1.5.0.12-0.17"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5507</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5507" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5507" source="CVE"/>
	<description>
	Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allow remote attackers to bypass the same origin policy and access portions of data from another domain via a JavaScript URL that redirects to the target resource, which generates an error if the target data does not have JavaScript syntax, which can be accessed using the window.onerror DOM API.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e95b6241be3476dc7e25a19a51d3d48 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031992" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031993" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031994" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031995" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031996" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031997" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031998" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031999" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032000" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032001" comment="mozilla less than 1.8_seamonkey_1.0.9-1.19"/>
		</criteria>
	</criteria>
	<!-- f3a7728c69c970d583ccc6816c706262 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032002" comment="MozillaFirefox-translations less than 1.5.0.12-0.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032003" comment="MozillaFirefox less than 1.5.0.12-0.17"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5508</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5508" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5508" source="CVE"/>
	<description>
	Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 does not properly parse URLs with leading whitespace or control characters, which might allow remote attackers to misrepresent URLs and simplify phishing attacks.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e95b6241be3476dc7e25a19a51d3d48 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031992" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031993" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031994" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031995" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031996" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031997" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031998" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031999" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032000" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032001" comment="mozilla less than 1.8_seamonkey_1.0.9-1.19"/>
		</criteria>
	</criteria>
	<!-- f3a7728c69c970d583ccc6816c706262 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032002" comment="MozillaFirefox-translations less than 1.5.0.12-0.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032003" comment="MozillaFirefox less than 1.5.0.12-0.17"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5510</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5510" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5510" source="CVE"/>
	<description>
	The CSS parser in Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 ignores the '\0' escaped null character, which might allow remote attackers to bypass protection mechanisms such as sanitization routines.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e95b6241be3476dc7e25a19a51d3d48 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031992" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031993" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031994" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031995" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031996" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031997" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031998" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031999" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032000" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032001" comment="mozilla less than 1.8_seamonkey_1.0.9-1.19"/>
		</criteria>
	</criteria>
	<!-- f3a7728c69c970d583ccc6816c706262 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032002" comment="MozillaFirefox-translations less than 1.5.0.12-0.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032003" comment="MozillaFirefox less than 1.5.0.12-0.17"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5511</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5511" source="CVE"/>
	<description>
	Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to bypass the same origin policy and conduct cross-site scripting (XSS) attacks via an XBL binding to an "unloaded document."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e95b6241be3476dc7e25a19a51d3d48 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031992" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031993" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031994" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031995" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031996" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031997" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031998" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031999" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032000" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032001" comment="mozilla less than 1.8_seamonkey_1.0.9-1.19"/>
		</criteria>
	</criteria>
	<!-- f3a7728c69c970d583ccc6816c706262 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032002" comment="MozillaFirefox-translations less than 1.5.0.12-0.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032003" comment="MozillaFirefox less than 1.5.0.12-0.17"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5512</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5512" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5512" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allow remote attackers to run arbitrary JavaScript with chrome privileges via unknown vectors in which "page content can pollute XPCNativeWrappers."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e95b6241be3476dc7e25a19a51d3d48 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031992" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031993" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031994" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031995" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031996" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031997" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031998" comment="mozilla-lib64 less than 1.8_seamonkey_1.0.9-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031999" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032000" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032001" comment="mozilla less than 1.8_seamonkey_1.0.9-1.19"/>
		</criteria>
	</criteria>
	<!-- f3a7728c69c970d583ccc6816c706262 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032002" comment="MozillaFirefox-translations less than 1.5.0.12-0.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032003" comment="MozillaFirefox less than 1.5.0.12-0.17"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5513</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5513" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5513" source="CVE"/>
	<description>
	Unspecified vulnerability in the session-restore feature in Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19 allows remote attackers to bypass the same origin policy, inject content into documents associated with other domains, and conduct cross-site scripting (XSS) attacks via unknown vectors related to restoration of SessionStore data.
	</description>
 </metadata>
<!-- f3a7728c69c970d583ccc6816c706262 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032002" comment="MozillaFirefox-translations less than 1.5.0.12-0.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032003" comment="MozillaFirefox less than 1.5.0.12-0.17"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5824</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5824" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5824" source="CVE"/>
	<description>
	Heap-based buffer overflow in msadpcm.c in libaudiofile in audiofile 0.2.6 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted WAV file.
	</description>
 </metadata>
<!-- 14bde6bb0a340384586047d3ae2cee19 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032004" comment="audiofile-32bit less than 9-200901211334"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032005" comment="audiofile less than 0.2.5-37.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5907</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5907" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5907" source="CVE"/>
	<description>
	The png_check_keyword function in pngwutil.c in libpng before 1.0.42, and 1.2.x before 1.2.34, might allow context-dependent attackers to set the value of an arbitrary memory location to zero via vectors involving creation of crafted PNG files with keywords, related to an implicit cast of the '\0' character constant to a NULL pointer.  NOTE: some sources incorrectly report this as a double free vulnerability.
	</description>
 </metadata>
<!-- 8f88f45d1a609aeb3243992706c05fae -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032006" comment="libpng-32bit less than 9-200901202355"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032007" comment="libpng-devel less than 1.2.5-182.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032008" comment="libpng less than 1.2.5-182.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20086123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-6123</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-6123" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6123" source="CVE"/>
	<description>
	The netsnmp_udp_fmtaddr function (snmplib/snmpUDPDomain.c) in net-snmp 5.0.9 through 5.4.2.1, when using TCP wrappers for client authorization, does not properly parse hosts.allow rules, which allows remote attackers to bypass intended access restrictions and execute SNMP queries, related to "source/destination IP address confusion."
	</description>
 </metadata>
<!-- 743455cf241c649b75edf49bbe932fcc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032009" comment="net-snmp-devel less than 5.1.3.1-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032010" comment="net-snmp less than 5.1.3.1-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032011" comment="perl-SNMP less than 5.1.3.1-0.28"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0021</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0021" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0021" source="CVE"/>
	<description>
	NTP 4.2.4 before 4.2.4p5 and 4.2.5 before 4.2.5p150 does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys, a similar vulnerability to CVE-2008-5077.
	</description>
 </metadata>
<!-- 446479f51e9e32eb8b7ebb60a54f19af -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032012" comment="xntp-doc less than 4.2.0a-23.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032013" comment="xntp less than 4.2.0a-23.17"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0025</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0025" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0025" source="CVE"/>
	<description>
	BIND 9.6.0, 9.5.1, 9.5.0, 9.4.3, and earlier does not properly check the return value from the OpenSSL DSA_verify function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077.
	</description>
 </metadata>
<!-- 3c0305962976100c07f4b568bf3ed2f1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032014" comment="bind-devel less than 9.3.4-4.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032015" comment="bind-utils-32bit less than 9-200901120120"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032016" comment="bind-utils less than 9.3.4-4.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032017" comment="bind less than 9.3.4-4.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0028</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0028" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0028" source="CVE"/>
	<description>
	The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a5f830cc07634abf9262d8a651634e2b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032018" comment="kernel-default less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032019" comment="kernel-smp less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032020" comment="kernel-source less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032021" comment="kernel-syms less than 2.6.5-7.316"/>
		</criteria>
	</criteria>
	<!-- c7655805ae75e4234d9dc24b9dccb316 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032022" comment="kernel-bigsmp less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032018" comment="kernel-default less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032019" comment="kernel-smp less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032020" comment="kernel-source less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032021" comment="kernel-syms less than 2.6.5-7.316"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0037</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0037" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0037" source="CVE"/>
	<description>
	The redirect implementation in curl and libcurl 5.11 through 7.19.3, when CURLOPT_FOLLOWLOCATION is enabled, accepts arbitrary Location values, which might allow remote HTTP servers to (1) trigger arbitrary requests to intranet servers, (2) read or overwrite arbitrary files via a redirect to a file: URL, or (3) execute arbitrary commands via a redirect to an scp: URL.
	</description>
 </metadata>
<!-- d6e4b8fc031088598a536725879a803b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032023" comment="curl-32bit less than 9-200902201554"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032024" comment="curl-devel less than 7.11.0-39.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032025" comment="curl less than 7.11.0-39.18"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0040</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0040" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0040" source="CVE"/>
	<description>
	The PNG reference library (aka libpng) before 1.0.43, and 1.2.x before 1.2.35, as used in pngcrush and other applications, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file that triggers a free of an uninitialized pointer in (1) the png_read_png function, (2) pCAL chunk handling, or (3) setup of 16-bit gamma tables.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 55936f1f9c1a01f598b866e36a1be16a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032026" comment="libpng-32bit less than 9-200902171046"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032027" comment="libpng-devel less than 1.2.5-182.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032028" comment="libpng less than 1.2.5-182.22"/>
		</criteria>
	</criteria>
	<!-- b299db6da4726011dca881ce59bd99ed -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032029" comment="libpng-32bit less than 9-200902251715"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032030" comment="libpng-devel less than 1.2.5-182.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032031" comment="libpng less than 1.2.5-182.24"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0065</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0065" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0065" source="CVE"/>
	<description>
	Buffer overflow in net/sctp/sm_statefuns.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.28-git8 allows remote attackers to have an unknown impact via an FWD-TSN (aka FORWARD-TSN) chunk with a large stream ID.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a5f830cc07634abf9262d8a651634e2b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032018" comment="kernel-default less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032019" comment="kernel-smp less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032020" comment="kernel-source less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032021" comment="kernel-syms less than 2.6.5-7.316"/>
		</criteria>
	</criteria>
	<!-- c7655805ae75e4234d9dc24b9dccb316 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032022" comment="kernel-bigsmp less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032018" comment="kernel-default less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032019" comment="kernel-smp less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032020" comment="kernel-source less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032021" comment="kernel-syms less than 2.6.5-7.316"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0114</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0114" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0114" source="CVE"/>
	<description>
	Unspecified vulnerability in the Settings Manager in Adobe Flash Player 9.x before 9.0.159.0 and 10.x before 10.0.22.87, and possibly other versions, allows remote attackers to trick a user into visiting an arbitrary URL via unknown vectors, related to "a potential Clickjacking issue variant."
	</description>
 </metadata>
<!-- 526f8f83b86c20628b1912d0c53f6f5b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032032" comment="flash-player less than 9.0.159.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0115</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0115" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0115" source="CVE"/>
	<description>
	The Device Mapper multipathing driver (aka multipath-tools or device-mapper-multipath) 0.4.8, as used in SUSE openSUSE, SUSE Linux Enterprise Server (SLES), Fedora, and possibly other operating systems, uses world-writable permissions for the socket file (aka /var/run/multipathd.sock), which allows local users to send arbitrary commands to the multipath daemon.
	</description>
 </metadata>
<!-- f1dfd5fdc667c28010289b15b2445d11 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032033" comment="multipath-tools less than 0.4.7-75.21"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0146</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146" source="CVE"/>
	<description>
	Multiple buffer overflows in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allow remote attackers to cause a denial of service (crash) via a crafted PDF file, related to (1) JBIG2SymbolDict::setBitmap and (2) JBIG2Stream::readSymbolDictSeg.
	</description>
 </metadata>
<!-- 403675f837530f047eb825dcb7428cf3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032034" comment="cups-client less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032035" comment="cups-devel less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032036" comment="cups-libs-32bit less than 9-200904161449"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032037" comment="cups-libs less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032038" comment="cups less than 1.1.20-108.58"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0147</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0147" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147" source="CVE"/>
	<description>
	Multiple integer overflows in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allow remote attackers to cause a denial of service (crash) via a crafted PDF file, related to (1) JBIG2Stream::readSymbolDictSeg, (2) JBIG2Stream::readSymbolDictSeg, and (3) JBIG2Stream::readGenericBitmap.
	</description>
 </metadata>
<!-- 403675f837530f047eb825dcb7428cf3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032034" comment="cups-client less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032035" comment="cups-devel less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032036" comment="cups-libs-32bit less than 9-200904161449"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032037" comment="cups-libs less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032038" comment="cups less than 1.1.20-108.58"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0159</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0159" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0159" source="CVE"/>
	<description>
	Stack-based buffer overflow in the cookedprint function in ntpq/ntpq.c in ntpq in NTP before 4.2.4p7-RC2 allows remote NTP servers to execute arbitrary code via a crafted response.
	</description>
 </metadata>
<!-- b2abe13274d8a80c17f63140404ec31b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032039" comment="xntp-doc less than 4.2.0a-23.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032040" comment="xntp less than 4.2.0a-23.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0163</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0163" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0163" source="CVE"/>
	<description>
	Integer overflow in the TIFF image decoding routines in CUPS 1.3.9 and earlier allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via a crafted TIFF image, which is not properly handled by the (1) _cupsImageReadTIFF function in the imagetops filter and (2) imagetoraster filter, leading to a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 403675f837530f047eb825dcb7428cf3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032034" comment="cups-client less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032035" comment="cups-devel less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032036" comment="cups-libs-32bit less than 9-200904161449"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032037" comment="cups-libs less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032038" comment="cups less than 1.1.20-108.58"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0165</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0165" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0165" source="CVE"/>
	<description>
	Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, as used in Poppler and other products, when running on Mac OS X, has unspecified impact, related to "g*allocn."
	</description>
 </metadata>
<!-- 403675f837530f047eb825dcb7428cf3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032034" comment="cups-client less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032035" comment="cups-devel less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032036" comment="cups-libs-32bit less than 9-200904161449"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032037" comment="cups-libs less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032038" comment="cups less than 1.1.20-108.58"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0166</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166" source="CVE"/>
	<description>
	The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers a free of uninitialized memory.
	</description>
 </metadata>
<!-- 403675f837530f047eb825dcb7428cf3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032034" comment="cups-client less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032035" comment="cups-devel less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032036" comment="cups-libs-32bit less than 9-200904161449"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032037" comment="cups-libs less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032038" comment="cups less than 1.1.20-108.58"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0179</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0179" source="CVE"/>
	<description>
	libmikmod 3.1.11 through 3.2.0, as used by MikMod and possibly other products, allows user-assisted attackers to cause a denial of service (application crash) by loading an XM file.
	</description>
 </metadata>
<!-- 639b367ae0bb9c20f36d43ad4161177e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031617" comment="libmikmod-32bit less than 9-200902271558"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031618" comment="libmikmod less than 3.1.10-662.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0196</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0196" source="CVE"/>
	<description>
	Heap-based buffer overflow in the big2_decode_symbol_dict function (jbig2_symbol_dict.c) in the JBIG2 decoding library (jbig2dec) in Ghostscript 8.64, and probably earlier versions, allows remote attackers to execute arbitrary code via a PDF file with a JBIG2 symbol dictionary segment with a large run length value.
	</description>
 </metadata>
<!-- c6678e67cf231f1f6438ecd15943042f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031619" comment="ghostscript-fonts-other less than 7.07.1rc1-195.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031620" comment="ghostscript-fonts-rus less than 7.07.1rc1-195.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031621" comment="ghostscript-fonts-std less than 7.07.1rc1-195.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031622" comment="ghostscript-library less than 7.07.1rc1-195.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031623" comment="ghostscript-serv less than 7.07.1rc1-195.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031624" comment="ghostscript-x11 less than 7.07.1rc1-195.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031625" comment="libgimpprint-devel less than 4.2.6-46.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031626" comment="libgimpprint less than 4.2.6-46.17"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0200</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0200" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0200" source="CVE"/>
	<description>
	Integer underflow in OpenOffice.org (OOo) before 3.1.1 and StarOffice/StarSuite 7, 8, and 9 might allow remote attackers to execute arbitrary code via crafted records in the document table of a Word document, leading to a heap-based buffer overflow.
	</description>
 </metadata>
<!-- b1572b9156655758a7aefa7520808b38 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054545" comment="OpenOffice_org-ar less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054546" comment="OpenOffice_org-ca less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054547" comment="OpenOffice_org-cs less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054548" comment="OpenOffice_org-da less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054549" comment="OpenOffice_org-de less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054550" comment="OpenOffice_org-el less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054551" comment="OpenOffice_org-en-help less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054552" comment="OpenOffice_org-en less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054553" comment="OpenOffice_org-es less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054554" comment="OpenOffice_org-et less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054555" comment="OpenOffice_org-fi less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054556" comment="OpenOffice_org-fr less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054557" comment="OpenOffice_org-gnome less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054558" comment="OpenOffice_org-hu less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054559" comment="OpenOffice_org-it less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054560" comment="OpenOffice_org-ja less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054561" comment="OpenOffice_org-kde less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054562" comment="OpenOffice_org-ko less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054563" comment="OpenOffice_org-nl less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054564" comment="OpenOffice_org-pl less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054565" comment="OpenOffice_org-pt-BR less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054566" comment="OpenOffice_org-pt less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054567" comment="OpenOffice_org-ru less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054568" comment="OpenOffice_org-sk less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054569" comment="OpenOffice_org-sl less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054570" comment="OpenOffice_org-sv less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054571" comment="OpenOffice_org-tr less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054572" comment="OpenOffice_org-zh-CN less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054573" comment="OpenOffice_org-zh-TW less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054574" comment="OpenOffice_org less than 1.1.5-0.26"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0201</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0201" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0201" source="CVE"/>
	<description>
	Heap-based buffer overflow in OpenOffice.org (OOo) before 3.1.1 and StarOffice/StarSuite 7, 8, and 9 might allow remote attackers to execute arbitrary code via unspecified records in a crafted Word document, related to "table parsing."
	</description>
 </metadata>
<!-- b1572b9156655758a7aefa7520808b38 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054545" comment="OpenOffice_org-ar less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054546" comment="OpenOffice_org-ca less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054547" comment="OpenOffice_org-cs less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054548" comment="OpenOffice_org-da less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054549" comment="OpenOffice_org-de less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054550" comment="OpenOffice_org-el less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054551" comment="OpenOffice_org-en-help less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054552" comment="OpenOffice_org-en less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054553" comment="OpenOffice_org-es less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054554" comment="OpenOffice_org-et less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054555" comment="OpenOffice_org-fi less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054556" comment="OpenOffice_org-fr less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054557" comment="OpenOffice_org-gnome less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054558" comment="OpenOffice_org-hu less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054559" comment="OpenOffice_org-it less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054560" comment="OpenOffice_org-ja less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054561" comment="OpenOffice_org-kde less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054562" comment="OpenOffice_org-ko less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054563" comment="OpenOffice_org-nl less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054564" comment="OpenOffice_org-pl less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054565" comment="OpenOffice_org-pt-BR less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054566" comment="OpenOffice_org-pt less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054567" comment="OpenOffice_org-ru less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054568" comment="OpenOffice_org-sk less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054569" comment="OpenOffice_org-sl less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054570" comment="OpenOffice_org-sv less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054571" comment="OpenOffice_org-tr less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054572" comment="OpenOffice_org-zh-CN less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054573" comment="OpenOffice_org-zh-TW less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054574" comment="OpenOffice_org less than 1.1.5-0.26"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0217</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0217" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0217" source="CVE"/>
	<description>
	The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.
	</description>
 </metadata>
<!-- 087f548d901d39a770d6597289f86557 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059440" comment="OpenOffice_org-ar less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059441" comment="OpenOffice_org-ca less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059442" comment="OpenOffice_org-cs less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059443" comment="OpenOffice_org-da less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059444" comment="OpenOffice_org-de less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059445" comment="OpenOffice_org-el less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059446" comment="OpenOffice_org-en-help less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059447" comment="OpenOffice_org-en less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059448" comment="OpenOffice_org-es less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059449" comment="OpenOffice_org-et less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059450" comment="OpenOffice_org-fi less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059451" comment="OpenOffice_org-fr less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059452" comment="OpenOffice_org-gnome less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059453" comment="OpenOffice_org-hu less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059454" comment="OpenOffice_org-it less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059455" comment="OpenOffice_org-ja less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059456" comment="OpenOffice_org-kde less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059457" comment="OpenOffice_org-ko less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059458" comment="OpenOffice_org-nl less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059459" comment="OpenOffice_org-pl less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059460" comment="OpenOffice_org-pt-BR less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059461" comment="OpenOffice_org-pt less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059462" comment="OpenOffice_org-ru less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059463" comment="OpenOffice_org-sk less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059464" comment="OpenOffice_org-sl less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059465" comment="OpenOffice_org-sv less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059466" comment="OpenOffice_org-tr less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059467" comment="OpenOffice_org-zh-CN less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059468" comment="OpenOffice_org-zh-TW less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059469" comment="OpenOffice_org less than 1.1.5-0.28"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0322</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0322" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0322" source="CVE"/>
	<description>
	drivers/firmware/dell_rbu.c in the Linux kernel before 2.6.27.13, and 2.6.28.x before 2.6.28.2, allows local users to cause a denial of service (system crash) via a read system call that specifies zero bytes from the (1) image_type or (2) packet_size file in /sys/devices/platform/dell_rbu/.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a5f830cc07634abf9262d8a651634e2b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032018" comment="kernel-default less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032019" comment="kernel-smp less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032020" comment="kernel-source less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032021" comment="kernel-syms less than 2.6.5-7.316"/>
		</criteria>
	</criteria>
	<!-- c7655805ae75e4234d9dc24b9dccb316 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032022" comment="kernel-bigsmp less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032018" comment="kernel-default less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032019" comment="kernel-smp less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032020" comment="kernel-source less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032021" comment="kernel-syms less than 2.6.5-7.316"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0386</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0386" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0386" source="CVE"/>
	<description>
	Heap-based buffer overflow in the qtdemux_parse_samples function in gst/qtdemux/qtdemux.c in GStreamer Good Plug-ins (aka gst-plugins-good) 0.10.9 through 0.10.11 might allow remote attackers to execute arbitrary code via crafted Composition Time To Sample (ctts) atom data in a malformed QuickTime media .mov file.
	</description>
 </metadata>
<!-- 79c636173a77ffa22d21bc7a2f45309c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032041" comment="gstreamer-plugins-default less than 0.8.1-8.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032042" comment="gstreamer-plugins-devel less than 0.8.1-8.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032043" comment="gstreamer-plugins-excess less than 0.8.1-8.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032044" comment="gstreamer-plugins-extra less than 0.8.1-8.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032045" comment="gstreamer-plugins less than 0.8.1-8.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0387</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0387" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0387" source="CVE"/>
	<description>
	Array index error in the qtdemux_parse_samples function in gst/qtdemux/qtdemux.c in GStreamer Good Plug-ins (aka gst-plugins-good) 0.10.9 through 0.10.11 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted Sync Sample (aka stss) atom data in a malformed QuickTime media .mov file, related to "mark keyframes."
	</description>
 </metadata>
<!-- 79c636173a77ffa22d21bc7a2f45309c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032041" comment="gstreamer-plugins-default less than 0.8.1-8.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032042" comment="gstreamer-plugins-devel less than 0.8.1-8.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032043" comment="gstreamer-plugins-excess less than 0.8.1-8.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032044" comment="gstreamer-plugins-extra less than 0.8.1-8.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032045" comment="gstreamer-plugins less than 0.8.1-8.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0397</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0397" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0397" source="CVE"/>
	<description>
	Heap-based buffer overflow in the qtdemux_parse_samples function in gst/qtdemux/qtdemux.c in GStreamer Good Plug-ins (aka gst-plugins-good) 0.10.9 through 0.10.11, and GStreamer Plug-ins (aka gstreamer-plugins) 0.8.5, might allow remote attackers to execute arbitrary code via crafted Time-to-sample (aka stts) atom data in a malformed QuickTime media .mov file.
	</description>
 </metadata>
<!-- 79c636173a77ffa22d21bc7a2f45309c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032041" comment="gstreamer-plugins-default less than 0.8.1-8.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032042" comment="gstreamer-plugins-devel less than 0.8.1-8.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032043" comment="gstreamer-plugins-excess less than 0.8.1-8.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032044" comment="gstreamer-plugins-extra less than 0.8.1-8.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032045" comment="gstreamer-plugins less than 0.8.1-8.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0519</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0519" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0519" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player 9.x before 9.0.159.0 and 10.x before 10.0.22.87 allows remote attackers to cause a denial of service (browser crash) or possibly execute arbitrary code via a crafted Shockwave Flash (aka .swf) file.
	</description>
 </metadata>
<!-- 526f8f83b86c20628b1912d0c53f6f5b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032032" comment="flash-player less than 9.0.159.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0520</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0520" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0520" source="CVE"/>
	<description>
	Adobe Flash Player 9.x before 9.0.159.0 and 10.x before 10.0.22.87 does not properly remove references to destroyed objects during Shockwave Flash file processing, which allows remote attackers to execute arbitrary code via a crafted file, related to a "buffer overflow issue."
	</description>
 </metadata>
<!-- 526f8f83b86c20628b1912d0c53f6f5b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032032" comment="flash-player less than 9.0.159.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0521</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0521" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0521" source="CVE"/>
	<description>
	Untrusted search path vulnerability in Adobe Flash Player 9.x before 9.0.159.0 and 10.x before 10.0.22.87 on Linux allows local users to obtain sensitive information or gain privileges via a crafted library in a directory contained in the RPATH.
	</description>
 </metadata>
<!-- 526f8f83b86c20628b1912d0c53f6f5b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032032" comment="flash-player less than 9.0.159.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0581</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0581" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0581" source="CVE"/>
	<description>
	Memory leak in LittleCMS (aka lcms or liblcms) before 1.18beta2, as used in Firefox 3.1beta, OpenJDK, and GIMP, allows context-dependent attackers to cause a denial of service (memory consumption and application crash) via a crafted image file.
	</description>
 </metadata>
<!-- 7ee19143f7b83e08401f5995abd73842 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032046" comment="liblcms-32bit less than 9-200903091206"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032047" comment="liblcms-devel less than 1.12-55.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032048" comment="liblcms less than 1.12-55.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0582</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0582" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0582" source="CVE"/>
	<description>
	The ntlm_challenge function in the NTLM SASL authentication mechanism in camel/camel-sasl-ntlm.c in Camel in Evolution Data Server (aka evolution-data-server) 2.24.5 and earlier, and 2.25.92 and earlier 2.25.x versions, does not validate whether a certain length value is consistent with the amount of data in a challenge packet, which allows remote mail servers to read information from the process memory of a client, or cause a denial of service (client crash), via an NTLM authentication type 2 packet with a length value that exceeds the amount of packet data.
	</description>
 </metadata>
<!-- 0db37a1d216adfa22aae59c3e9505f8d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032049" comment="evolution-devel less than 2.0.4-0.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032050" comment="evolution-pilot less than 2.0.4-0.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032051" comment="evolution less than 2.0.4-0.17"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0583</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0583" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0583" source="CVE"/>
	<description>
	Multiple integer overflows in icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allow context-dependent attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly execute arbitrary code by using a device file for a translation request that operates on a crafted image file and targets a certain "native color space," related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images.
	</description>
 </metadata>
<!-- fd792022866a1310fcb43b83ef8f4279 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032052" comment="ghostscript-fonts-other less than 7.07.1rc1-195.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032053" comment="ghostscript-fonts-rus less than 7.07.1rc1-195.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032054" comment="ghostscript-fonts-std less than 7.07.1rc1-195.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032055" comment="ghostscript-library less than 7.07.1rc1-195.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032056" comment="ghostscript-serv less than 7.07.1rc1-195.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032057" comment="ghostscript-x11 less than 7.07.1rc1-195.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032058" comment="libgimpprint-devel less than 4.2.6-46.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032059" comment="libgimpprint less than 4.2.6-46.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0584</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0584" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0584" source="CVE"/>
	<description>
	icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code by using a device file for processing a crafted image file associated with large integer values for certain sizes, related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images.
	</description>
 </metadata>
<!-- fd792022866a1310fcb43b83ef8f4279 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032052" comment="ghostscript-fonts-other less than 7.07.1rc1-195.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032053" comment="ghostscript-fonts-rus less than 7.07.1rc1-195.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032054" comment="ghostscript-fonts-std less than 7.07.1rc1-195.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032055" comment="ghostscript-library less than 7.07.1rc1-195.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032056" comment="ghostscript-serv less than 7.07.1rc1-195.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032057" comment="ghostscript-x11 less than 7.07.1rc1-195.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032058" comment="libgimpprint-devel less than 4.2.6-46.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032059" comment="libgimpprint less than 4.2.6-46.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0585</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0585" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0585" source="CVE"/>
	<description>
	Integer overflow in the soup_base64_encode function in soup-misc.c in libsoup 2.x.x before 2.2.x, and 2.x before 2.24, allows context-dependent attackers to execute arbitrary code via a long string that is converted to a base64 representation.
	</description>
 </metadata>
<!-- a31742f4610ed9fd83c14c2e81163a4b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032060" comment="libsoup-32bit less than 9-200904292143"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032061" comment="libsoup-devel-32bit less than 9-200904292143"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032062" comment="libsoup-devel less than 2.2.3-0.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032063" comment="libsoup less than 2.2.3-0.23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0590</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0590" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0590" source="CVE"/>
	<description>
	The ASN1_STRING_print_ex function in OpenSSL before 0.9.8k allows remote attackers to cause a denial of service (invalid memory access and application crash) via vectors that trigger printing of a (1) BMPString or (2) UniversalString with an invalid encoded length.
	</description>
 </metadata>
<!-- b8d3726c6ea3c28bc5ad72818e229fe7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032064" comment="openssl-32bit less than 9-200904151544"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032065" comment="openssl-devel-32bit less than 9-200904151544"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032066" comment="openssl-devel less than 0.9.7d-15.39"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032067" comment="openssl-doc less than 0.9.7d-15.39"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032068" comment="openssl less than 0.9.7d-15.39"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0642</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0642" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0642" source="CVE"/>
	<description>
	ext/openssl/ossl_ocsp.c in Ruby 1.8 and 1.9 does not properly check the return value from the OCSP_basic_verify function, which might allow remote attackers to successfully present an invalid X.509 certificate, possibly involving a revoked certificate.
	</description>
 </metadata>
<!-- bf0b463c573238d140dbff3b8165ac7b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053391" comment="ruby less than 1.8.1-42.27"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0675</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0675" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0675" source="CVE"/>
	<description>
	The skfp_ioctl function in drivers/net/skfp/skfddi.c in the Linux kernel before 2.6.28.6 permits SKFP_CLR_STATS requests only when the CAP_NET_ADMIN capability is absent, instead of when this capability is present, which allows local users to reset the driver statistics, related to an "inverted logic" issue.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a5f830cc07634abf9262d8a651634e2b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032018" comment="kernel-default less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032019" comment="kernel-smp less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032020" comment="kernel-source less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032021" comment="kernel-syms less than 2.6.5-7.316"/>
		</criteria>
	</criteria>
	<!-- c7655805ae75e4234d9dc24b9dccb316 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032022" comment="kernel-bigsmp less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032018" comment="kernel-default less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032019" comment="kernel-smp less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032020" comment="kernel-source less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032021" comment="kernel-syms less than 2.6.5-7.316"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0676</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0676" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0676" source="CVE"/>
	<description>
	The sock_getsockopt function in net/core/sock.c in the Linux kernel before 2.6.28.6 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel memory via an SO_BSDCOMPAT getsockopt request.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a5f830cc07634abf9262d8a651634e2b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032018" comment="kernel-default less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032019" comment="kernel-smp less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032020" comment="kernel-source less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032021" comment="kernel-syms less than 2.6.5-7.316"/>
		</criteria>
	</criteria>
	<!-- c7655805ae75e4234d9dc24b9dccb316 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032022" comment="kernel-bigsmp less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032018" comment="kernel-default less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032019" comment="kernel-smp less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032020" comment="kernel-source less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032021" comment="kernel-syms less than 2.6.5-7.316"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0688</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0688" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0688" source="CVE"/>
	<description>
	Multiple buffer overflows in the CMU Cyrus SASL library before 2.1.23 might allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via strings that are used as input to the sasl_encode64 function in lib/saslutil.c.
	</description>
 </metadata>
<!-- 23d20e9712582451cefed986bb80ada8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032069" comment="cyrus-sasl-32bit less than 9-200905141649"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032070" comment="cyrus-sasl-crammd5 less than 2.1.18-33.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032071" comment="cyrus-sasl-devel-32bit less than 9-200905141649"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032072" comment="cyrus-sasl-devel less than 2.1.18-33.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032073" comment="cyrus-sasl-digestmd5 less than 2.1.18-33.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032074" comment="cyrus-sasl-gssapi less than 2.1.18-33.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032075" comment="cyrus-sasl-otp less than 2.1.18-33.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032076" comment="cyrus-sasl-plain less than 2.1.18-33.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032077" comment="cyrus-sasl less than 2.1.18-33.14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0689</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0689" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0689" source="CVE"/>
	<description>
	Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD 4.5, Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4, K-Meleon 1.5.3, SeaMonkey 1.1.8, and other products, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large precision value in the format argument to a printf function, which triggers incorrect memory allocation and a heap-based buffer overflow during conversion to a floating-point number.
	</description>
 </metadata>
<!-- add72a13736156604035de7637b70fa1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056882" comment="kdelibs3-32bit less than 9-200912160015"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056883" comment="kdelibs3-devel-doc less than 3.2.1-44.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056884" comment="kdelibs3-devel less than 3.2.1-44.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056885" comment="kdelibs3 less than 3.2.1-44.77"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0692</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0692" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0692" source="CVE"/>
	<description>
	Stack-based buffer overflow in the script_write_params method in client/dhclient.c in ISC DHCP dhclient 4.1 before 4.1.0p1, 4.0 before 4.0.1p1, 3.1 before 3.1.2p1, 3.0, and 2.0 allows remote DHCP servers to execute arbitrary code via a crafted subnet-mask option.
	</description>
 </metadata>
<!-- ecae7b6a88e669baec4b55c8fb8d3b1c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053392" comment="dhcp-client less than 3.0.1rc13-28.26"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0696</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0696" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0696" source="CVE"/>
	<description>
	The dns_db_findrdataset function in db.c in named in ISC BIND 9.4 before 9.4.3-P3, 9.5 before 9.5.1-P3, and 9.6 before 9.6.1-P1, when configured as a master server, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via an ANY record in the prerequisite section of a crafted dynamic update message, as exploited in the wild in July 2009.
	</description>
 </metadata>
<!-- ef44905c50fccb6ef9e2d8a87b14b8e7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053616" comment="bind-devel less than 9.3.4-4.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053617" comment="bind-utils-32bit less than 9-200907291720"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053618" comment="bind-utils less than 9.3.4-4.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053619" comment="bind less than 9.3.4-4.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0723</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0723" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0723" source="CVE"/>
	<description>
	Multiple integer overflows in LittleCMS (aka lcms or liblcms) before 1.18beta2, as used in Firefox 3.1beta, OpenJDK, and GIMP, allow context-dependent attackers to execute arbitrary code via a crafted image file that triggers a heap-based buffer overflow.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 7ee19143f7b83e08401f5995abd73842 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032046" comment="liblcms-32bit less than 9-200903091206"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032047" comment="liblcms-devel less than 1.12-55.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032048" comment="liblcms less than 1.12-55.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0733</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0733" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0733" source="CVE"/>
	<description>
	Multiple stack-based buffer overflows in the ReadSetOfCurves function in LittleCMS (aka lcms or liblcms) before 1.18beta2, as used in Firefox 3.1beta, OpenJDK, and GIMP, allow context-dependent attackers to execute arbitrary code via a crafted image file associated with a large integer value for the (1) input or (2) output channel, related to the ReadLUT_A2B and ReadLUT_B2A functions.
	</description>
 </metadata>
<!-- 7ee19143f7b83e08401f5995abd73842 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032046" comment="liblcms-32bit less than 9-200903091206"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032047" comment="liblcms-devel less than 1.12-55.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032048" comment="liblcms less than 1.12-55.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0789</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0789" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0789" source="CVE"/>
	<description>
	OpenSSL before 0.9.8k on WIN64 and certain other platforms does not properly handle a malformed ASN.1 structure, which allows remote attackers to cause a denial of service (invalid memory access and application crash) by placing this structure in the public key of a certificate, as demonstrated by an RSA public key.
	</description>
 </metadata>
<!-- b8d3726c6ea3c28bc5ad72818e229fe7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032064" comment="openssl-32bit less than 9-200904151544"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032065" comment="openssl-devel-32bit less than 9-200904151544"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032066" comment="openssl-devel less than 0.9.7d-15.39"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032067" comment="openssl-doc less than 0.9.7d-15.39"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032068" comment="openssl less than 0.9.7d-15.39"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0791</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0791" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0791" source="CVE"/>
	<description>
	Multiple integer overflows in Xpdf 2.x and 3.x and Poppler 0.x, as used in the pdftops filter in CUPS 1.1.17, 1.1.22, and 1.3.7, GPdf, and kdegraphics KPDF, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file that triggers a heap-based buffer overflow, possibly related to (1) Decrypt.cxx, (2) FoFiTrueType.cxx, (3) gmem.c, (4) JBIG2Stream.cxx, and (5) PSOutputDev.cxx in pdftops/. NOTE: the JBIG2Stream.cxx vector may overlap CVE-2009-1179.
	</description>
 </metadata>
<!-- 2c00b2d6fa0957c52d2f1159ac07374a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032078" comment="cups-client less than 1.1.20-108.61"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032079" comment="cups-devel less than 1.1.20-108.61"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032080" comment="cups-libs-32bit less than 9-200906022331"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032081" comment="cups-libs less than 1.1.20-108.61"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032082" comment="cups less than 1.1.20-108.61"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0792</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0792" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0792" source="CVE"/>
	<description>
	Multiple integer overflows in icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allow context-dependent attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly execute arbitrary code by using a device file for a translation request that operates on a crafted image file and targets a certain "native color space," related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images.  NOTE: this issue exists because of an incomplete fix for CVE-2009-0583.
	</description>
 </metadata>
<!-- c6678e67cf231f1f6438ecd15943042f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031619" comment="ghostscript-fonts-other less than 7.07.1rc1-195.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031620" comment="ghostscript-fonts-rus less than 7.07.1rc1-195.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031621" comment="ghostscript-fonts-std less than 7.07.1rc1-195.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031622" comment="ghostscript-library less than 7.07.1rc1-195.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031623" comment="ghostscript-serv less than 7.07.1rc1-195.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031624" comment="ghostscript-x11 less than 7.07.1rc1-195.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031625" comment="libgimpprint-devel less than 4.2.6-46.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031626" comment="libgimpprint less than 4.2.6-46.17"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0799</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0799" source="CVE"/>
	<description>
	The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers an out-of-bounds read.
	</description>
 </metadata>
<!-- 403675f837530f047eb825dcb7428cf3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032034" comment="cups-client less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032035" comment="cups-devel less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032036" comment="cups-libs-32bit less than 9-200904161449"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032037" comment="cups-libs less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032038" comment="cups less than 1.1.20-108.58"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0800</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0800" source="CVE"/>
	<description>
	Multiple "input validation flaws" in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allow remote attackers to execute arbitrary code via a crafted PDF file.
	</description>
 </metadata>
<!-- 403675f837530f047eb825dcb7428cf3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032034" comment="cups-client less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032035" comment="cups-devel less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032036" comment="cups-libs-32bit less than 9-200904161449"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032037" comment="cups-libs less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032038" comment="cups less than 1.1.20-108.58"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0859</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0859" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0859" source="CVE"/>
	<description>
	The shm_get_stat function in ipc/shm.c in the shm subsystem in the Linux kernel before 2.6.28.5, when CONFIG_SHMEM is disabled, misinterprets the data type of an inode, which allows local users to cause a denial of service (system hang) via an SHM_INFO shmctl call, as demonstrated by running the ipcs program.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0709473b0d187d0b5e8b2119619bb4ec -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032083" comment="kernel-default less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032084" comment="kernel-smp less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
	<!-- 21e76be75d3a330f9158c3dee8f8717e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032087" comment="kernel-bigsmp less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032083" comment="kernel-default less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032084" comment="kernel-smp less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0901</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0901" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0901" source="CVE"/>
	<description>
	The Active Template Library (ATL) in Microsoft Visual Studio .NET 2003 SP1, Visual Studio 2005 SP1 and 2008 Gold, and Visual C++ 2005 SP1 and 2008 Gold and SP1; and Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2; does not prevent VariantClear calls on an uninitialized VARIANT, which allows remote attackers to execute arbitrary code via a malformed stream to an ATL (1) component or (2) control, related to ATL headers and error handling, aka "ATL Uninitialized Object Vulnerability."
	</description>
 </metadata>
<!-- 8195fce564597b5b4b13febd70c26995 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053690" comment="flash-player less than 9.0.246.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0922</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0922" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0922" source="CVE"/>
	<description>
	PostgreSQL before 8.3.7, 8.2.13, 8.1.17, 8.0.21, and 7.4.25 allows remote authenticated users to cause a denial of service (stack consumption and crash) by triggering a failure in the conversion of a localized error message to a client-specified encoding, as demonstrated using mismatched encoding conversion requests.
	</description>
 </metadata>
<!-- 1827efe0d587f1f3f8733b41d4902ca5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032088" comment="postgresql-contrib less than 7.4.25-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032089" comment="postgresql-devel less than 7.4.25-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032090" comment="postgresql-docs less than 7.4.25-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032091" comment="postgresql-libs-32bit less than 9-200903241522"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032092" comment="postgresql-libs less than 7.4.25-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032093" comment="postgresql-server less than 7.4.25-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032094" comment="postgresql less than 7.4.25-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0946</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0946" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0946" source="CVE"/>
	<description>
	Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c.
	</description>
 </metadata>
<!-- 7309faad573b368d279344c54e639826 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032095" comment="freetype2-32bit less than 9-200904162346"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032096" comment="freetype2-devel-32bit less than 9-200904162346"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032097" comment="freetype2-devel less than 2.1.7-53.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032098" comment="freetype2 less than 2.1.7-53.21"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0949</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0949" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0949" source="CVE"/>
	<description>
	The ippReadIO function in cups/ipp.c in cupsd in CUPS before 1.3.10 does not properly initialize memory for IPP request packets, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a scheduler request with two consecutive IPP_TAG_UNSUPPORTED tags.
	</description>
 </metadata>
<!-- 2c00b2d6fa0957c52d2f1159ac07374a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032078" comment="cups-client less than 1.1.20-108.61"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032079" comment="cups-devel less than 1.1.20-108.61"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032080" comment="cups-libs-32bit less than 9-200906022331"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032081" comment="cups-libs less than 1.1.20-108.61"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032082" comment="cups less than 1.1.20-108.61"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1072</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1072" source="CVE"/>
	<description>
	nfsd in the Linux kernel before 2.6.28.9 does not drop the CAP_MKNOD capability before handling a user request in a thread, which allows local users to create device nodes, as demonstrated on a filesystem that has been exported with the root_squash option.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0709473b0d187d0b5e8b2119619bb4ec -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032083" comment="kernel-default less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032084" comment="kernel-smp less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
	<!-- 21e76be75d3a330f9158c3dee8f8717e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032087" comment="kernel-bigsmp less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032083" comment="kernel-default less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032084" comment="kernel-smp less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1179</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1179" source="CVE"/>
	<description>
	Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file.
	</description>
 </metadata>
<!-- 403675f837530f047eb825dcb7428cf3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032034" comment="cups-client less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032035" comment="cups-devel less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032036" comment="cups-libs-32bit less than 9-200904161449"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032037" comment="cups-libs less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032038" comment="cups less than 1.1.20-108.58"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1180</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1180" source="CVE"/>
	<description>
	The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file that triggers a free of invalid data.
	</description>
 </metadata>
<!-- 403675f837530f047eb825dcb7428cf3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032034" comment="cups-client less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032035" comment="cups-devel less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032036" comment="cups-libs-32bit less than 9-200904161449"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032037" comment="cups-libs less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032038" comment="cups less than 1.1.20-108.58"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1181</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1181" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1181" source="CVE"/>
	<description>
	The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers a NULL pointer dereference.
	</description>
 </metadata>
<!-- 403675f837530f047eb825dcb7428cf3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032034" comment="cups-client less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032035" comment="cups-devel less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032036" comment="cups-libs-32bit less than 9-200904161449"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032037" comment="cups-libs less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032038" comment="cups less than 1.1.20-108.58"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1182</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1182" source="CVE"/>
	<description>
	Multiple buffer overflows in the JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allow remote attackers to execute arbitrary code via a crafted PDF file.
	</description>
 </metadata>
<!-- 403675f837530f047eb825dcb7428cf3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032034" comment="cups-client less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032035" comment="cups-devel less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032036" comment="cups-libs-32bit less than 9-200904161449"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032037" comment="cups-libs less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032038" comment="cups less than 1.1.20-108.58"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1183</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1183" source="CVE"/>
	<description>
	The JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (infinite loop and hang) via a crafted PDF file.
	</description>
 </metadata>
<!-- 403675f837530f047eb825dcb7428cf3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032034" comment="cups-client less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032035" comment="cups-devel less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032036" comment="cups-libs-32bit less than 9-200904161449"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032037" comment="cups-libs less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032038" comment="cups less than 1.1.20-108.58"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1192</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1192" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1192" source="CVE"/>
	<description>
	The (1) agp_generic_alloc_page and (2) agp_generic_alloc_pages functions in drivers/char/agp/generic.c in the agp subsystem in the Linux kernel before 2.6.30-rc3 do not zero out pages that may later be available to a user-space process, which allows local users to obtain sensitive information by reading these pages.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1f8052e3d1888101d98fed2d234ab541 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056218" comment="kernel-smp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
	<!-- eddfff721fdef5d3a5e3b7862066f07c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056223" comment="kernel-bigsmp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056218" comment="kernel-smp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1252</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1252" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1252" source="CVE"/>
	<description>
	Stack-based buffer overflow in the crypto_recv function in ntp_crypto.c in ntpd in NTP before 4.2.4p7 and 4.2.5 before 4.2.5p74, when OpenSSL and autokey are enabled, allows remote attackers to execute arbitrary code via a crafted packet containing an extension field.
	</description>
 </metadata>
<!-- b2abe13274d8a80c17f63140404ec31b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032039" comment="xntp-doc less than 4.2.0a-23.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032040" comment="xntp less than 4.2.0a-23.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1265</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1265" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1265" source="CVE"/>
	<description>
	Integer overflow in rose_sendmsg (sys/net/af_rose.c) in the Linux kernel 2.6.24.4, and other versions before 2.6.30-rc1, might allow remote attackers to obtain sensitive information via a large length value, which causes "garbage" memory to be sent.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0709473b0d187d0b5e8b2119619bb4ec -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032083" comment="kernel-default less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032084" comment="kernel-smp less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
	<!-- 21e76be75d3a330f9158c3dee8f8717e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032087" comment="kernel-bigsmp less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032083" comment="kernel-default less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032084" comment="kernel-smp less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1274</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1274" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1274" source="CVE"/>
	<description>
	Integer overflow in the qt_error parse_trak_atom function in demuxers/demux_qt.c in xine-lib 1.1.16.2 and earlier allows remote attackers to execute arbitrary code via a Quicktime movie file with a large count value in an STTS atom, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- b263b9df05a5de9e4e9a312987752628 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032099" comment="xine-lib-32bit less than 9-200905071455"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032100" comment="xine-lib less than 0.99.rc3a-106.51"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1307</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1307" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1307" source="CVE"/>
	<description>
	The view-source: URI implementation in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey does not properly implement the Same Origin Policy, which allows remote attackers to (1) bypass crossdomain.xml restrictions and connect to arbitrary web sites via a Flash file; (2) read, create, or modify Local Shared Objects via a Flash file; or (3) bypass unspecified restrictions and render content via vectors involving a jar: URI.
	</description>
 </metadata>
<!-- 5d24f63b529c9385be7c0651c0b296aa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055119" comment="epiphany-doc less than 1.2.10-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055120" comment="epiphany-extensions-devel less than 0.8.2-2.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055121" comment="epiphany-extensions less than 0.8.2-2.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055122" comment="epiphany less than 1.2.10-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055123" comment="mozilla-devel less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055124" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055125" comment="mozilla-irc less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055126" comment="mozilla-mail less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055127" comment="mozilla-venkman less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055128" comment="mozilla less than 1.8_seamonkey_1.1.17-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1311</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1311" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.9 and SeaMonkey before 1.1.17 allow user-assisted remote attackers to obtain sensitive information via a web page with an embedded frame, which causes POST data from an outer page to be sent to the inner frame's URL during a SAVEMODE_FILEONLY save of the inner frame.
	</description>
 </metadata>
<!-- 5d24f63b529c9385be7c0651c0b296aa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055119" comment="epiphany-doc less than 1.2.10-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055120" comment="epiphany-extensions-devel less than 0.8.2-2.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055121" comment="epiphany-extensions less than 0.8.2-2.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055122" comment="epiphany less than 1.2.10-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055123" comment="mozilla-devel less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055124" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055125" comment="mozilla-irc less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055126" comment="mozilla-mail less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055127" comment="mozilla-venkman less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055128" comment="mozilla less than 1.8_seamonkey_1.1.17-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1337</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1337" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1337" source="CVE"/>
	<description>
	The exit_notify function in kernel/exit.c in the Linux kernel before 2.6.30-rc1 does not restrict exit signals when the CAP_KILL capability is held, which allows local users to send an arbitrary signal to a process by running a program that modifies the exit_signal field and then uses an exec system call to launch a setuid application.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0709473b0d187d0b5e8b2119619bb4ec -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032083" comment="kernel-default less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032084" comment="kernel-smp less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
	<!-- 21e76be75d3a330f9158c3dee8f8717e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032087" comment="kernel-bigsmp less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032083" comment="kernel-default less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032084" comment="kernel-smp less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1364</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1364" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1364" source="CVE"/>
	<description>
	Use-after-free vulnerability in the embedded GD library in libwmf 0.2.8.4 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted WMF file.
	</description>
 </metadata>
<!-- d6c5eb7872326bf7f805eee6f9b21814 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032101" comment="libwmf less than 0.2.8.2-88.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1373</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1373" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1373" source="CVE"/>
	<description>
	Buffer overflow in the XMPP SOCKS5 bytestream server in Pidgin (formerly Gaim) before 2.5.6 allows remote authenticated users to execute arbitrary code via vectors involving an outbound XMPP file transfer.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 515258121f42cebfda44740a6ad6ef01 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053457" comment="gaim less than 1.2.0-0.15"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1376</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1376" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1376" source="CVE"/>
	<description>
	Multiple integer overflows in the msn_slplink_process_msg functions in the MSN protocol handler in (1) libpurple/protocols/msn/slplink.c and (2) libpurple/protocols/msnp9/slplink.c in Pidgin (formerly Gaim) before 2.5.6 on 32-bit platforms allow remote attackers to execute arbitrary code via a malformed SLP message with a crafted offset value, leading to buffer overflows.  NOTE: this issue exists because of an incomplete fix for CVE-2008-2927.
	</description>
 </metadata>
<!-- 515258121f42cebfda44740a6ad6ef01 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053457" comment="gaim less than 1.2.0-0.15"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1389</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1389" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1389" source="CVE"/>
	<description>
	Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7f8fbb0d03fe1c20b55cd009cabb90dc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054242" comment="kernel-default less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054243" comment="kernel-smp less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054244" comment="kernel-source less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054245" comment="kernel-syms less than 2.6.5-7.318"/>
		</criteria>
	</criteria>
	<!-- fc566820eb8c3318e8f061acd0a9670b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054257" comment="kernel-bigsmp less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054242" comment="kernel-default less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054243" comment="kernel-smp less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054244" comment="kernel-source less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054245" comment="kernel-syms less than 2.6.5-7.318"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1392</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1392" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1392" source="CVE"/>
	<description>
	The browser engine in Mozilla Firefox 3 before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) nsEventStateManager::GetContentState and nsNativeTheme::CheckBooleanAttr; (2) UnhookTextRunFromFrames and ClearAllTextRunReferences; (3) nsTextFrame::ClearTextRun; (4) IsPercentageAware; (5) PL_DHashTableFinish; (6) nsListBoxBodyFrame::GetNextItemBox; (7) AtomTableClearEntry, related to the atom table, DOM mutation events, and Unicode surrogates; (8) nsHTMLEditor::HideResizers; and (9) nsWindow::SetCursor, related to changing the cursor; and other vectors.
	</description>
 </metadata>
<!-- 5d24f63b529c9385be7c0651c0b296aa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055119" comment="epiphany-doc less than 1.2.10-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055120" comment="epiphany-extensions-devel less than 0.8.2-2.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055121" comment="epiphany-extensions less than 0.8.2-2.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055122" comment="epiphany less than 1.2.10-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055123" comment="mozilla-devel less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055124" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055125" comment="mozilla-irc less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055126" comment="mozilla-mail less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055127" comment="mozilla-venkman less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055128" comment="mozilla less than 1.8_seamonkey_1.1.17-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1438</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1438" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1438" source="CVE"/>
	<description>
	Integer overflow in the CSoundFile::ReadMed function (src/load_med.cpp) in libmodplug before 0.8.6, as used in gstreamer-plugins, TTPlayer, and other products, allows context-dependent attackers to execute arbitrary code via a MED file with a crafted (1) song comment or (2) song name, which triggers a heap-based buffer overflow, as exploited in the wild in August 2008.
	</description>
 </metadata>
<!-- 34d2bbfd591f5220d19a59916e9470ea -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053030" comment="gstreamer-plugins-default less than 0.8.1-8.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053031" comment="gstreamer-plugins-devel less than 0.8.1-8.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053032" comment="gstreamer-plugins-excess less than 0.8.1-8.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053033" comment="gstreamer-plugins-extra less than 0.8.1-8.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053034" comment="gstreamer-plugins less than 0.8.1-8.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1439</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1439" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1439" source="CVE"/>
	<description>
	Buffer overflow in fs/cifs/connect.c in CIFS in the Linux kernel 2.6.29 and earlier allows remote attackers to cause a denial of service (crash) via a long nativeFileSystem field in a Tree Connect response to an SMB mount request.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0709473b0d187d0b5e8b2119619bb4ec -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032083" comment="kernel-default less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032084" comment="kernel-smp less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
	<!-- 21e76be75d3a330f9158c3dee8f8717e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032087" comment="kernel-bigsmp less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032083" comment="kernel-default less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032084" comment="kernel-smp less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1632</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1632" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1632" source="CVE"/>
	<description>
	Multiple memory leaks in Ipsec-tools before 0.7.2 allow remote attackers to cause a denial of service (memory consumption) via vectors involving (1) signature verification during user authentication with X.509 certificates, related to the eay_check_x509sign function in src/racoon/crypto_openssl.c; and (2) the NAT-Traversal (aka NAT-T) keepalive implementation, related to src/racoon/nattraversal.c.
	</description>
 </metadata>
<!-- 8a08624865a04404e34f236d2417fa5a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032102" comment="ipsec-tools less than 0.3.3-1.17"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1633</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1633" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1633" source="CVE"/>
	<description>
	Multiple buffer overflows in the cifs subsystem in the Linux kernel before 2.6.29.4 allow remote CIFS servers to cause a denial of service (memory corruption) and possibly have unspecified other impact via (1) a malformed Unicode string, related to Unicode string area alignment in fs/cifs/sess.c; or (2) long Unicode characters, related to fs/cifs/cifssmb.c and the cifs_readdir function in fs/cifs/readdir.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0709473b0d187d0b5e8b2119619bb4ec -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032083" comment="kernel-default less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032084" comment="kernel-smp less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
	<!-- 1f8052e3d1888101d98fed2d234ab541 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056218" comment="kernel-smp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
	<!-- 21e76be75d3a330f9158c3dee8f8717e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032087" comment="kernel-bigsmp less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032083" comment="kernel-default less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032084" comment="kernel-smp less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
	<!-- eddfff721fdef5d3a5e3b7862066f07c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056223" comment="kernel-bigsmp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056218" comment="kernel-smp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1758</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1758" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1758" source="CVE"/>
	<description>
	The hypervisor_callback function in Xen, possibly before 3.4.0, as applied to the Linux kernel 2.6.30-rc4, 2.6.18, and probably other versions allows guest user applications to cause a denial of service (kernel oops) of the guest OS by triggering a segmentation fault in "certain address ranges."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7f8fbb0d03fe1c20b55cd009cabb90dc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054242" comment="kernel-default less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054243" comment="kernel-smp less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054244" comment="kernel-source less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054245" comment="kernel-syms less than 2.6.5-7.318"/>
		</criteria>
	</criteria>
	<!-- fc566820eb8c3318e8f061acd0a9670b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054257" comment="kernel-bigsmp less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054242" comment="kernel-default less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054243" comment="kernel-smp less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054244" comment="kernel-source less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054245" comment="kernel-syms less than 2.6.5-7.318"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1832</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1832" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1832" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors involving "double frame construction."
	</description>
 </metadata>
<!-- 5d24f63b529c9385be7c0651c0b296aa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055119" comment="epiphany-doc less than 1.2.10-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055120" comment="epiphany-extensions-devel less than 0.8.2-2.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055121" comment="epiphany-extensions less than 0.8.2-2.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055122" comment="epiphany less than 1.2.10-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055123" comment="mozilla-devel less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055124" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055125" comment="mozilla-irc less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055126" comment="mozilla-mail less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055127" comment="mozilla-venkman less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055128" comment="mozilla less than 1.8_seamonkey_1.1.17-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1833</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1833" source="CVE"/>
	<description>
	The JavaScript engine in Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) js_LeaveSharpObject, (2) ParseXMLSource, and (3) a certain assertion in jsinterp.c; and other vectors.
	</description>
 </metadata>
<!-- 5d24f63b529c9385be7c0651c0b296aa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055119" comment="epiphany-doc less than 1.2.10-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055120" comment="epiphany-extensions-devel less than 0.8.2-2.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055121" comment="epiphany-extensions less than 0.8.2-2.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055122" comment="epiphany less than 1.2.10-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055123" comment="mozilla-devel less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055124" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055125" comment="mozilla-irc less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055126" comment="mozilla-mail less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055127" comment="mozilla-venkman less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055128" comment="mozilla less than 1.8_seamonkey_1.1.17-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1835</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1835" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.11 and SeaMonkey before 1.1.17 associate local documents with external domain names located after the file:// substring in a URL, which allows user-assisted remote attackers to read arbitrary cookies via a crafted HTML document, as demonstrated by a URL with file://example.com/C:/ at the beginning.
	</description>
 </metadata>
<!-- 5d24f63b529c9385be7c0651c0b296aa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055119" comment="epiphany-doc less than 1.2.10-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055120" comment="epiphany-extensions-devel less than 0.8.2-2.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055121" comment="epiphany-extensions less than 0.8.2-2.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055122" comment="epiphany less than 1.2.10-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055123" comment="mozilla-devel less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055124" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055125" comment="mozilla-irc less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055126" comment="mozilla-mail less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055127" comment="mozilla-venkman less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055128" comment="mozilla less than 1.8_seamonkey_1.1.17-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1836</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1836" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 use the HTTP Host header to determine the context of a document provided in a non-200 CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.
	</description>
 </metadata>
<!-- 5d24f63b529c9385be7c0651c0b296aa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055119" comment="epiphany-doc less than 1.2.10-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055120" comment="epiphany-extensions-devel less than 0.8.2-2.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055121" comment="epiphany-extensions less than 0.8.2-2.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055122" comment="epiphany less than 1.2.10-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055123" comment="mozilla-devel less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055124" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055125" comment="mozilla-irc less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055126" comment="mozilla-mail less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055127" comment="mozilla-venkman less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055128" comment="mozilla less than 1.8_seamonkey_1.1.17-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1838</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1838" source="CVE"/>
	<description>
	The garbage-collection implementation in Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 sets an element's owner document to null in unspecified circumstances, which allows remote attackers to execute arbitrary JavaScript with chrome privileges via a crafted event handler, related to an incorrect context for this event handler.
	</description>
 </metadata>
<!-- 5d24f63b529c9385be7c0651c0b296aa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055119" comment="epiphany-doc less than 1.2.10-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055120" comment="epiphany-extensions-devel less than 0.8.2-2.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055121" comment="epiphany-extensions less than 0.8.2-2.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055122" comment="epiphany less than 1.2.10-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055123" comment="mozilla-devel less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055124" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055125" comment="mozilla-irc less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055126" comment="mozilla-mail less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055127" comment="mozilla-venkman less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055128" comment="mozilla less than 1.8_seamonkey_1.1.17-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1841</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1841" source="CVE"/>
	<description>
	js/src/xpconnect/src/xpcwrappedjsclass.cpp in Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 allows remote attackers to execute arbitrary web script with the privileges of a chrome object, as demonstrated by the browser sidebar and the FeedWriter.
	</description>
 </metadata>
<!-- 5d24f63b529c9385be7c0651c0b296aa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055119" comment="epiphany-doc less than 1.2.10-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055120" comment="epiphany-extensions-devel less than 0.8.2-2.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055121" comment="epiphany-extensions less than 0.8.2-2.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055122" comment="epiphany less than 1.2.10-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055123" comment="mozilla-devel less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055124" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055125" comment="mozilla-irc less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055126" comment="mozilla-mail less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055127" comment="mozilla-venkman less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055128" comment="mozilla less than 1.8_seamonkey_1.1.17-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1862</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1862" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1862" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x through 9.1.2, and Adobe Flash Player 9.x through 9.0.159.0 and 10.x through 10.0.22.87, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via (1) a crafted Flash application in a .pdf file or (2) a crafted .swf file, related to authplay.dll, as exploited in the wild in July 2009.
	</description>
 </metadata>
<!-- 8195fce564597b5b4b13febd70c26995 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053690" comment="flash-player less than 9.0.246.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1863</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1863" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1863" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.246.0 and 10.x before 10.0.32.18, and Adobe AIR before 1.5.2, allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors, related to a "privilege escalation vulnerability."
	</description>
 </metadata>
<!-- 8195fce564597b5b4b13febd70c26995 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053690" comment="flash-player less than 9.0.246.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1864</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1864" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1864" source="CVE"/>
	<description>
	Heap-based buffer overflow in Adobe Flash Player before 9.0.246.0 and 10.x before 10.0.32.18, and Adobe AIR before 1.5.2, allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 8195fce564597b5b4b13febd70c26995 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053690" comment="flash-player less than 9.0.246.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1865</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1865" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1865" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.246.0 and 10.x before 10.0.32.18, and Adobe AIR before 1.5.2, allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors, related to a "null pointer vulnerability."
	</description>
 </metadata>
<!-- 8195fce564597b5b4b13febd70c26995 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053690" comment="flash-player less than 9.0.246.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1866</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1866" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1866" source="CVE"/>
	<description>
	Stack-based buffer overflow in Adobe Flash Player before 9.0.246.0 and 10.x before 10.0.32.18, and Adobe AIR before 1.5.2, allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 8195fce564597b5b4b13febd70c26995 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053690" comment="flash-player less than 9.0.246.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1867</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1867" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1867" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.246.0 and 10.x before 10.0.32.18, and Adobe AIR before 1.5.2, allows attackers to trick a user into (1) selecting a link or (2) completing a dialog, related to a "clickjacking vulnerability."
	</description>
 </metadata>
<!-- 8195fce564597b5b4b13febd70c26995 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053690" comment="flash-player less than 9.0.246.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1868</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1868" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1868" source="CVE"/>
	<description>
	Heap-based buffer overflow in Adobe Flash Player before 9.0.246.0 and 10.x before 10.0.32.18, and Adobe AIR before 1.5.2, allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors involving URL parsing.
	</description>
 </metadata>
<!-- 8195fce564597b5b4b13febd70c26995 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053690" comment="flash-player less than 9.0.246.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1869</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1869" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1869" source="CVE"/>
	<description>
	Integer overflow in the ActionScript Virtual Machine 2 (AVM2) abcFile parser in Adobe Flash Player before 9.0.246.0 and 10.x before 10.0.32.18, and Adobe AIR before 1.5.2, allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an AVM2 file with a large intrf_count value that triggers a dereference of an out-of-bounds pointer.
	</description>
 </metadata>
<!-- 8195fce564597b5b4b13febd70c26995 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053690" comment="flash-player less than 9.0.246.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1870</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1870" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1870" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.246.0 and 10.x before 10.0.32.18, and Adobe AIR before 1.5.2, allows attackers to obtain sensitive information via vectors involving saving an SWF file to a hard drive, related to a "local sandbox vulnerability."
	</description>
 </metadata>
<!-- 8195fce564597b5b4b13febd70c26995 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053690" comment="flash-player less than 9.0.246.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1882</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1882" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1882" source="CVE"/>
	<description>
	Integer overflow in the XMakeImage function in magick/xwindow.c in ImageMagick 6.5.2-8, and GraphicsMagick, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF file, which triggers a buffer overflow.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 0e0f1d7ad8416b3b884ea953426730f1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032103" comment="ImageMagick-devel less than 5.5.7-225.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032104" comment="ImageMagick less than 5.5.7-225.41"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1889</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1889" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1889" source="CVE"/>
	<description>
	The OSCAR protocol implementation in Pidgin before 2.5.8 misinterprets the ICQWebMessage message type as the ICQSMS message type, which allows remote attackers to cause a denial of service (application crash) via a crafted ICQ web message that triggers allocation of a large amount of memory.
	</description>
 </metadata>
<!-- 515258121f42cebfda44740a6ad6ef01 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053457" comment="gaim less than 1.2.0-0.15"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1890</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1890" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1890" source="CVE"/>
	<description>
	The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which allows remote attackers to cause a denial of service (CPU consumption) via crafted requests.
	</description>
 </metadata>
<!-- 2fb3b9eca1524fb5f1da822967ea233e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055705" comment="libapr0 less than 2.0.59-1.14"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1891</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1891" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1891" source="CVE"/>
	<description>
	The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).
	</description>
 </metadata>
<!-- 2fb3b9eca1524fb5f1da822967ea233e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055705" comment="libapr0 less than 2.0.59-1.14"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1904</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1904" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1904" source="CVE"/>
	<description>
	The BigDecimal library in Ruby 1.8.6 before p369 and 1.8.7 before p173 allows context-dependent attackers to cause a denial of service (application crash) via a string argument that represents a large number, as demonstrated by an attempted conversion to the Float data type.
	</description>
 </metadata>
<!-- bf0b463c573238d140dbff3b8165ac7b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053391" comment="ruby less than 1.8.1-42.27"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2042</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-2042" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2042" source="CVE"/>
	<description>
	libpng before 1.2.37 does not properly parse 1-bit interlaced images with width values that are not divisible by 8, which causes libpng to include uninitialized bits in certain rows of a PNG file and might allow remote attackers to read portions of sensitive memory via "out-of-bounds pixels" in the file.
	</description>
 </metadata>
<!-- 67857e8f88bfae31d2ef83807ef7998a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053352" comment="libpng-32bit less than 9-200906232031"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053353" comment="libpng-devel less than 1.2.5-182.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053354" comment="libpng less than 1.2.5-182.26"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2139</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-2139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2139" source="CVE"/>
	<description>
	Heap-based buffer overflow in svtools/source/filter.vcl/wmf/enhwmf.cxx in Go-oo 2.x and 3.x before 3.0.1, previously named ooo-build and related to OpenOffice.org (OOo), allows remote attackers to execute arbitrary code via a crafted EMF file, a similar issue to CVE-2008-2238.
	</description>
 </metadata>
<!-- b1572b9156655758a7aefa7520808b38 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054545" comment="OpenOffice_org-ar less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054546" comment="OpenOffice_org-ca less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054547" comment="OpenOffice_org-cs less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054548" comment="OpenOffice_org-da less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054549" comment="OpenOffice_org-de less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054550" comment="OpenOffice_org-el less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054551" comment="OpenOffice_org-en-help less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054552" comment="OpenOffice_org-en less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054553" comment="OpenOffice_org-es less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054554" comment="OpenOffice_org-et less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054555" comment="OpenOffice_org-fi less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054556" comment="OpenOffice_org-fr less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054557" comment="OpenOffice_org-gnome less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054558" comment="OpenOffice_org-hu less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054559" comment="OpenOffice_org-it less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054560" comment="OpenOffice_org-ja less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054561" comment="OpenOffice_org-kde less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054562" comment="OpenOffice_org-ko less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054563" comment="OpenOffice_org-nl less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054564" comment="OpenOffice_org-pl less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054565" comment="OpenOffice_org-pt-BR less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054566" comment="OpenOffice_org-pt less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054567" comment="OpenOffice_org-ru less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054568" comment="OpenOffice_org-sk less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054569" comment="OpenOffice_org-sl less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054570" comment="OpenOffice_org-sv less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054571" comment="OpenOffice_org-tr less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054572" comment="OpenOffice_org-zh-CN less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054573" comment="OpenOffice_org-zh-TW less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054574" comment="OpenOffice_org less than 1.1.5-0.26"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2140</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-2140" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2140" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in cppcanvas/source/mtfrenderer/emfplus.cxx in Go-oo 2.x and 3.x before 3.0.1, previously named ooo-build and related to OpenOffice.org (OOo), allow remote attackers to execute arbitrary code via a crafted EMF+ file, a similar issue to CVE-2008-2238.
	</description>
 </metadata>
<!-- b1572b9156655758a7aefa7520808b38 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054545" comment="OpenOffice_org-ar less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054546" comment="OpenOffice_org-ca less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054547" comment="OpenOffice_org-cs less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054548" comment="OpenOffice_org-da less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054549" comment="OpenOffice_org-de less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054550" comment="OpenOffice_org-el less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054551" comment="OpenOffice_org-en-help less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054552" comment="OpenOffice_org-en less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054553" comment="OpenOffice_org-es less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054554" comment="OpenOffice_org-et less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054555" comment="OpenOffice_org-fi less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054556" comment="OpenOffice_org-fr less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054557" comment="OpenOffice_org-gnome less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054558" comment="OpenOffice_org-hu less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054559" comment="OpenOffice_org-it less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054560" comment="OpenOffice_org-ja less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054561" comment="OpenOffice_org-kde less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054562" comment="OpenOffice_org-ko less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054563" comment="OpenOffice_org-nl less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054564" comment="OpenOffice_org-pl less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054565" comment="OpenOffice_org-pt-BR less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054566" comment="OpenOffice_org-pt less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054567" comment="OpenOffice_org-ru less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054568" comment="OpenOffice_org-sk less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054569" comment="OpenOffice_org-sl less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054570" comment="OpenOffice_org-sv less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054571" comment="OpenOffice_org-tr less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054572" comment="OpenOffice_org-zh-CN less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054573" comment="OpenOffice_org-zh-TW less than 1.1.5-0.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054574" comment="OpenOffice_org less than 1.1.5-0.26"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2185</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-2185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2185" source="CVE"/>
	<description>
	The ASN.1 parser (pluto/asn1.c, libstrongswan/asn1/asn1.c, libstrongswan/asn1/asn1_parser.c) in (a) strongSwan 2.8 before 2.8.10, 4.2 before 4.2.16, and 4.3 before 4.3.2; and (b) openSwan 2.6 before 2.6.22 and 2.4 before 2.4.15 allows remote attackers to cause a denial of service (pluto IKE daemon crash) via an X.509 certificate with (1) crafted Relative Distinguished Names (RDNs), (2) a crafted UTCTIME string, or (3) a crafted GENERALIZEDTIME string.
	</description>
 </metadata>
<!-- ab576f19b311be636b2a279b8ba60205 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053444" comment="freeswan less than 2.04_1.5.4-1.26"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2210</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-2210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2210" source="CVE"/>
	<description>
	Mozilla Thunderbird before 2.0.0.22 and SeaMonkey before 1.1.17 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a multipart/alternative e-mail message containing a text/enhanced part that triggers access to an incorrect object type.
	</description>
 </metadata>
<!-- 5d24f63b529c9385be7c0651c0b296aa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055119" comment="epiphany-doc less than 1.2.10-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055120" comment="epiphany-extensions-devel less than 0.8.2-2.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055121" comment="epiphany-extensions less than 0.8.2-2.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055122" comment="epiphany less than 1.2.10-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055123" comment="mozilla-devel less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055124" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055125" comment="mozilla-irc less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055126" comment="mozilla-mail less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055127" comment="mozilla-venkman less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055128" comment="mozilla less than 1.8_seamonkey_1.1.17-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2285</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-2285" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2285" source="CVE"/>
	<description>
	Buffer underflow in the LZWDecodeCompat function in libtiff 3.8.2 allows context-dependent attackers to cause a denial of service (crash) via a crafted TIFF image, a different vulnerability than CVE-2008-2327.
	</description>
 </metadata>
<!-- 260a237893413716f08c94b6e09cdff7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053717" comment="libtiff-32bit less than 9-200904061139"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053718" comment="libtiff less than 3.6.1-38.39"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2347</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-2347" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2347" source="CVE"/>
	<description>
	Multiple integer overflows in inter-color spaces conversion tools in libtiff 3.8 through 3.8.2, 3.9, and 4.0 allow context-dependent attackers to execute arbitrary code via a TIFF image with large (1) width and (2) height values, which triggers a heap-based buffer overflow in the (a) cvt_whole_image function in tiff2rgba and (b) tiffcvt function in rgb2ycbcr.
	</description>
 </metadata>
<!-- 3e13d9abb5b97c10f372ea9f4973e4ec -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054047" comment="libtiff-32bit less than 9-200908071506"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054048" comment="libtiff less than 3.6.1-38.41"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2395</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-2395" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2395" source="CVE"/>
	<description>
	SQL injection vulnerability in the K2 (com_k2) component 1.0.1 Beta and earlier for Joomla! allows remote attackers to execute arbitrary SQL commands via the category parameter in an itemlist action to index.php.
	</description>
 </metadata>
<!-- 8195fce564597b5b4b13febd70c26995 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053690" comment="flash-player less than 9.0.246.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2404</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-2404" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2404" source="CVE"/>
	<description>
	Heap-based buffer overflow in a regular-expression parser in Mozilla Network Security Services (NSS) before 3.12.3, as used in Firefox, Thunderbird, SeaMonkey, Evolution, Pidgin, and AOL Instant Messenger (AIM), allows remote SSL servers to cause a denial of service (application crash) or possibly execute arbitrary code via a long domain name in the subject's Common Name (CN) field of an X.509 certificate, related to the cert_TestHostName function.
	</description>
 </metadata>
<!-- 0544b892a9b723761a105daea14175d0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055382" comment="epiphany-doc less than 1.2.10-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055383" comment="epiphany-extensions-devel less than 0.8.2-2.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055384" comment="epiphany-extensions less than 0.8.2-2.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055385" comment="epiphany less than 1.2.10-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055386" comment="mozilla-devel less than 1.8_seamonkey_1.1.18-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055387" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.1.18-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055388" comment="mozilla-irc less than 1.8_seamonkey_1.1.18-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055389" comment="mozilla-mail less than 1.8_seamonkey_1.1.18-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055390" comment="mozilla-venkman less than 1.8_seamonkey_1.1.18-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055391" comment="mozilla less than 1.8_seamonkey_1.1.18-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2408</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-2408" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2408" source="CVE"/>
	<description>
	Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0544b892a9b723761a105daea14175d0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055382" comment="epiphany-doc less than 1.2.10-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055383" comment="epiphany-extensions-devel less than 0.8.2-2.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055384" comment="epiphany-extensions less than 0.8.2-2.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055385" comment="epiphany less than 1.2.10-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055386" comment="mozilla-devel less than 1.8_seamonkey_1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055387" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055388" comment="mozilla-irc less than 1.8_seamonkey_1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055389" comment="mozilla-mail less than 1.8_seamonkey_1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055390" comment="mozilla-venkman less than 1.8_seamonkey_1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055391" comment="mozilla less than 1.8_seamonkey_1.1.18-0.1"/>
		</criteria>
	</criteria>
	<!-- 754c6c7cea03a8f586e6f3936262dbfe -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054892" comment="openldap2-back-ldap less than 2.2.24-4.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054893" comment="openldap2-back-meta less than 2.2.24-4.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054894" comment="openldap2-back-monitor less than 2.2.24-4.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054895" comment="openldap2-back-perl less than 2.2.24-4.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054896" comment="openldap2-client-32bit less than 9-200909091106"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054897" comment="openldap2-client less than 2.2.24-4.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054898" comment="openldap2-devel-32bit less than 9-200909091106"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054899" comment="openldap2-devel less than 2.2.24-4.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054900" comment="openldap2 less than 2.2.24-4.31"/>
		</criteria>
	</criteria>
	<!-- b86cc89c72cf739801e5261d7bfc8078 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054901" comment="mutt less than 1.5.6i-64.12"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2414</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-2414" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2414" source="CVE"/>
	<description>
	Stack consumption vulnerability in libxml2 2.5.10, 2.6.16, 2.6.26, 2.6.27, and 2.6.32, and libxml 1.8.17, allows context-dependent attackers to cause a denial of service (application crash) via a large depth of element declarations in a DTD, related to a function recursion, as demonstrated by the Codenomicon XML fuzzing framework.
	</description>
 </metadata>
<!-- e93f02978275ac1e51c88cdd7945ac87 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054810" comment="libxml-32bit less than 9-200909081614"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054811" comment="libxml-devel less than 1.8.17-366.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054812" comment="libxml less than 1.8.17-366.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2416</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-2416" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2416" source="CVE"/>
	<description>
	Multiple use-after-free vulnerabilities in libxml2 2.5.10, 2.6.16, 2.6.26, 2.6.27, and 2.6.32, and libxml 1.8.17, allow context-dependent attackers to cause a denial of service (application crash) via crafted (1) Notation or (2) Enumeration attribute types in an XML file, as demonstrated by the Codenomicon XML fuzzing framework.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- cd682b76a96c81f1df2df19ce908b7fa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053774" comment="libxml2-32bit less than 9-200908071409"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053775" comment="libxml2-devel less than 2.6.7-28.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053776" comment="libxml2 less than 2.6.7-28.22"/>
		</criteria>
	</criteria>
	<!-- e93f02978275ac1e51c88cdd7945ac87 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054810" comment="libxml-32bit less than 9-200909081614"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054811" comment="libxml-devel less than 1.8.17-366.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054812" comment="libxml less than 1.8.17-366.8"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2417</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-2417" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2417" source="CVE"/>
	<description>
	lib/ssluse.c in cURL and libcurl 7.4 through 7.19.5, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
	</description>
 </metadata>
<!-- 791924517c3765796e43ae44ca0e92db -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053893" comment="curl-32bit less than 9-200908071408"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053894" comment="curl-devel less than 7.11.0-39.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053895" comment="curl less than 7.11.0-39.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2446</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-2446" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2446" source="CVE"/>
	<description>
	Multiple format string vulnerabilities in the dispatch_command function in libmysqld/sql_parse.cc in mysqld in MySQL 4.0.0 through 5.0.83 allow remote authenticated users to cause a denial of service (daemon crash) and possibly have unspecified other impact via format string specifiers in a database name in a (1) COM_CREATE_DB or (2) COM_DROP_DB request.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 877515d582920d4f52d3e647af5b2d42 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054280" comment="mysql-Max less than 4.0.18-32.39"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054281" comment="mysql-bench less than 4.0.18-32.39"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054282" comment="mysql-client less than 4.0.18-32.39"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054283" comment="mysql-devel less than 4.0.18-32.39"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054284" comment="mysql-shared less than 4.0.18-32.39"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054285" comment="mysql less than 4.0.18-32.39"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2493</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-2493" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2493" source="CVE"/>
	<description>
	The Active Template Library (ATL) in Microsoft Visual Studio .NET 2003 SP1, Visual Studio 2005 SP1 and 2008 Gold and SP1, and Visual C++ 2005 SP1 and 2008 Gold and SP1; and Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2; does not properly restrict use of OleLoadFromStream in instantiating objects from data streams, which allows remote attackers to execute arbitrary code via a crafted HTML document with an ATL (1) component or (2) control, related to ATL headers and bypassing security policies, aka "ATL COM Initialization Vulnerability."
	</description>
 </metadata>
<!-- 8195fce564597b5b4b13febd70c26995 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053690" comment="flash-player less than 9.0.246.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2632</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-2632" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2632" source="CVE"/>
	<description>
	Buffer overflow in the SIEVE script component (sieve/script.c), as used in cyrus-imapd in Cyrus IMAP Server 2.2.13 and 2.3.14, and Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, allows local users to execute arbitrary code and read or modify arbitrary messages via a crafted SIEVE script, related to the incorrect use of the sizeof operator for determining buffer length, combined with an integer signedness error.
	</description>
 </metadata>
<!-- 6bab3e180da69d52479ace00e1a3ef0c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064554" comment="perl-Cyrus-IMAP less than 2.2.3-83.40"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064555" comment="perl-Cyrus-SIEVE-managesieve less than 2.2.3-83.40"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2661</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-2661" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2661" source="CVE"/>
	<description>
	The asn1_length function in strongSwan 2.8 before 2.8.11, 4.2 before 4.2.17, and 4.3 before 4.3.3 does not properly handle X.509 certificates with crafted Relative Distinguished Names (RDNs), which allows remote attackers to cause a denial of service (pluto IKE daemon crash) via malformed ASN.1 data.  NOTE: this is due to an incomplete fix for CVE-2009-2185.
	</description>
 </metadata>
<!-- df2b61aaee7dbf9f02125d6c45ecd3e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055011" comment="freeswan less than 2.04_1.5.4-1.28"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2666</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-2666" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2666" source="CVE"/>
	<description>
	socket.c in fetchmail before 6.3.11 does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
	</description>
 </metadata>
<!-- 9c3bb10a98ea11a0ee67cc9bac8eca71 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053777" comment="fetchmail less than 6.2.5-49.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053778" comment="fetchmailconf less than 6.2.5-49.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2692</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-2692" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2692" source="CVE"/>
	<description>
	The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not initialize all function pointers for socket operations in proto_ops structures, which allows local users to trigger a NULL pointer dereference and gain privileges by using mmap to map page zero, placing arbitrary code on this page, and then invoking an unavailable operation, as demonstrated by the sendpage operation (sock_sendpage function) on a PF_PPPOX socket.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7f8fbb0d03fe1c20b55cd009cabb90dc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054242" comment="kernel-default less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054243" comment="kernel-smp less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054244" comment="kernel-source less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054245" comment="kernel-syms less than 2.6.5-7.318"/>
		</criteria>
	</criteria>
	<!-- fc566820eb8c3318e8f061acd0a9670b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054257" comment="kernel-bigsmp less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054242" comment="kernel-default less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054243" comment="kernel-smp less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054244" comment="kernel-source less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054245" comment="kernel-syms less than 2.6.5-7.318"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2698</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-2698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2698" source="CVE"/>
	<description>
	The udp_sendmsg function in the UDP implementation in (1) net/ipv4/udp.c and (2) net/ipv6/udp.c in the Linux kernel before 2.6.19 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving the MSG_MORE flag and a UDP socket.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 03956d7519e6e0afe7667486e2c01955 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054423" comment="kernel-default less than 2.6.5-7.319"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054424" comment="kernel-smp less than 2.6.5-7.319"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054425" comment="kernel-source less than 2.6.5-7.319"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054426" comment="kernel-syms less than 2.6.5-7.319"/>
		</criteria>
	</criteria>
	<!-- d81479506ec313bba8ed9502d47553d1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054427" comment="kernel-bigsmp less than 2.6.5-7.319"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054423" comment="kernel-default less than 2.6.5-7.319"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054424" comment="kernel-smp less than 2.6.5-7.319"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054425" comment="kernel-source less than 2.6.5-7.319"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054426" comment="kernel-syms less than 2.6.5-7.319"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2730</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-2730" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2730" source="CVE"/>
	<description>
	libgnutls in GnuTLS before 2.8.2 does not properly handle a '\0' character in a domain name in the subject's (1) Common Name (CN) or (2) Subject Alternative Name (SAN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
	</description>
 </metadata>
<!-- a1d0a89cbe45ec5bf66a0631d904ff80 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054777" comment="gnutls-32bit less than 9-200909011222"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054778" comment="gnutls-devel-32bit less than 9-200909011222"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054779" comment="gnutls-devel less than 1.0.8-26.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054780" comment="gnutls less than 1.0.8-26.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2813</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-2813" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2813" source="CVE"/>
	<description>
	Samba 3.4 before 3.4.2, 3.3 before 3.3.8, 3.2 before 3.2.15, and 3.0.12 through 3.0.36, as used in the SMB subsystem in Apple Mac OS X 10.5.8 when Windows File Sharing is enabled, Fedora 11, and other operating systems, does not properly handle errors in resolving pathnames, which allows remote authenticated users to bypass intended sharing restrictions, and read, create, or modify files, in certain circumstances involving user accounts that lack home directories.
	</description>
 </metadata>
<!-- ee2dec24f34e3c2a80e8b4b4aee42488 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055459" comment="ldapsmb less than 1.34b-64.1.76"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055460" comment="libsmbclient-32bit less than 9-200910020934"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055461" comment="libsmbclient-devel less than 3.0.26a-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055462" comment="libsmbclient less than 3.0.26a-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055463" comment="samba-32bit less than 9-200910020934"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055464" comment="samba-client-32bit less than 9-200910020934"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055465" comment="samba-client less than 3.0.26a-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055466" comment="samba-doc less than 3.0.26a-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055467" comment="samba-pdb less than 3.0.26a-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055468" comment="samba-python less than 3.0.26a-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055469" comment="samba-vscan less than 0.3.6b-0.39"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055470" comment="samba-winbind-32bit less than 9-200910020934"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055471" comment="samba-winbind less than 3.0.26a-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055472" comment="samba less than 3.0.26a-0.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2848</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-2848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2848" source="CVE"/>
	<description>
	The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, does not properly clear the current-&gt;clear_child_tid pointer, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via a clone system call with CLONE_CHILD_SETTID or CLONE_CHILD_CLEARTID enabled, which is not properly handled during thread creation and exit.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1f8052e3d1888101d98fed2d234ab541 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056218" comment="kernel-smp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
	<!-- eddfff721fdef5d3a5e3b7862066f07c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056223" comment="kernel-bigsmp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056218" comment="kernel-smp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2906</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-2906" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2906" source="CVE"/>
	<description>
	smbd in Samba 3.0 before 3.0.37, 3.2 before 3.2.15, 3.3 before 3.3.8, and 3.4 before 3.4.2 allows remote authenticated users to cause a denial of service (infinite loop) via an unanticipated oplock break notification reply packet.
	</description>
 </metadata>
<!-- ee2dec24f34e3c2a80e8b4b4aee42488 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055459" comment="ldapsmb less than 1.34b-64.1.76"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055460" comment="libsmbclient-32bit less than 9-200910020934"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055461" comment="libsmbclient-devel less than 3.0.26a-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055462" comment="libsmbclient less than 3.0.26a-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055463" comment="samba-32bit less than 9-200910020934"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055464" comment="samba-client-32bit less than 9-200910020934"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055465" comment="samba-client less than 3.0.26a-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055466" comment="samba-doc less than 3.0.26a-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055467" comment="samba-pdb less than 3.0.26a-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055468" comment="samba-python less than 3.0.26a-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055469" comment="samba-vscan less than 0.3.6b-0.39"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055470" comment="samba-winbind-32bit less than 9-200910020934"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055471" comment="samba-winbind less than 3.0.26a-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055472" comment="samba less than 3.0.26a-0.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2909</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-2909" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2909" source="CVE"/>
	<description>
	Integer signedness error in the ax25_setsockopt function in net/ax25/af_ax25.c in the ax25 subsystem in the Linux kernel before 2.6.31.2 allows local users to cause a denial of service (OOPS) via a crafted optlen value in an SO_BINDTODEVICE operation.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1f8052e3d1888101d98fed2d234ab541 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056218" comment="kernel-smp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
	<!-- eddfff721fdef5d3a5e3b7862066f07c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056223" comment="kernel-bigsmp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056218" comment="kernel-smp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2910</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-2910" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2910" source="CVE"/>
	<description>
	arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 platform does not clear certain kernel registers before a return to user mode, which allows local users to read register values from an earlier process by switching an ia32 process to 64-bit mode.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1f8052e3d1888101d98fed2d234ab541 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056218" comment="kernel-smp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
	<!-- eddfff721fdef5d3a5e3b7862066f07c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056223" comment="kernel-bigsmp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056218" comment="kernel-smp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2948</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-2948" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2948" source="CVE"/>
	<description>
	mount.cifs in Samba 3.0 before 3.0.37, 3.2 before 3.2.15, 3.3 before 3.3.8 and 3.4 before 3.4.2, when mount.cifs is installed suid root, does not properly enforce permissions, which allows local users to read part of the credentials file and obtain the password by specifying the path to the credentials file and using the --verbose or -v option.
	</description>
 </metadata>
<!-- ee2dec24f34e3c2a80e8b4b4aee42488 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055459" comment="ldapsmb less than 1.34b-64.1.76"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055460" comment="libsmbclient-32bit less than 9-200910020934"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055461" comment="libsmbclient-devel less than 3.0.26a-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055462" comment="libsmbclient less than 3.0.26a-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055463" comment="samba-32bit less than 9-200910020934"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055464" comment="samba-client-32bit less than 9-200910020934"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055465" comment="samba-client less than 3.0.26a-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055466" comment="samba-doc less than 3.0.26a-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055467" comment="samba-pdb less than 3.0.26a-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055468" comment="samba-python less than 3.0.26a-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055469" comment="samba-vscan less than 0.3.6b-0.39"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055470" comment="samba-winbind-32bit less than 9-200910020934"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055471" comment="samba-winbind less than 3.0.26a-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055472" comment="samba less than 3.0.26a-0.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2949</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-2949" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2949" source="CVE"/>
	<description>
	Integer overflow in the XPMReader::ReadXPM function in filter.vcl/ixpm/svt_xpmread.cxx in OpenOffice.org (OOo) before 3.2 allows remote attackers to execute arbitrary code via a crafted XPM file that triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 087f548d901d39a770d6597289f86557 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059440" comment="OpenOffice_org-ar less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059441" comment="OpenOffice_org-ca less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059442" comment="OpenOffice_org-cs less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059443" comment="OpenOffice_org-da less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059444" comment="OpenOffice_org-de less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059445" comment="OpenOffice_org-el less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059446" comment="OpenOffice_org-en-help less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059447" comment="OpenOffice_org-en less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059448" comment="OpenOffice_org-es less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059449" comment="OpenOffice_org-et less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059450" comment="OpenOffice_org-fi less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059451" comment="OpenOffice_org-fr less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059452" comment="OpenOffice_org-gnome less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059453" comment="OpenOffice_org-hu less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059454" comment="OpenOffice_org-it less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059455" comment="OpenOffice_org-ja less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059456" comment="OpenOffice_org-kde less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059457" comment="OpenOffice_org-ko less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059458" comment="OpenOffice_org-nl less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059459" comment="OpenOffice_org-pl less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059460" comment="OpenOffice_org-pt-BR less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059461" comment="OpenOffice_org-pt less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059462" comment="OpenOffice_org-ru less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059463" comment="OpenOffice_org-sk less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059464" comment="OpenOffice_org-sl less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059465" comment="OpenOffice_org-sv less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059466" comment="OpenOffice_org-tr less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059467" comment="OpenOffice_org-zh-CN less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059468" comment="OpenOffice_org-zh-TW less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059469" comment="OpenOffice_org less than 1.1.5-0.28"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2950</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-2950" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2950" source="CVE"/>
	<description>
	Heap-based buffer overflow in the GIFLZWDecompressor::GIFLZWDecompressor function in filter.vcl/lgif/decode.cxx in OpenOffice.org (OOo) before 3.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted GIF file, related to LZW decompression.
	</description>
 </metadata>
<!-- 087f548d901d39a770d6597289f86557 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059440" comment="OpenOffice_org-ar less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059441" comment="OpenOffice_org-ca less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059442" comment="OpenOffice_org-cs less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059443" comment="OpenOffice_org-da less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059444" comment="OpenOffice_org-de less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059445" comment="OpenOffice_org-el less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059446" comment="OpenOffice_org-en-help less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059447" comment="OpenOffice_org-en less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059448" comment="OpenOffice_org-es less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059449" comment="OpenOffice_org-et less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059450" comment="OpenOffice_org-fi less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059451" comment="OpenOffice_org-fr less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059452" comment="OpenOffice_org-gnome less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059453" comment="OpenOffice_org-hu less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059454" comment="OpenOffice_org-it less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059455" comment="OpenOffice_org-ja less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059456" comment="OpenOffice_org-kde less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059457" comment="OpenOffice_org-ko less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059458" comment="OpenOffice_org-nl less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059459" comment="OpenOffice_org-pl less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059460" comment="OpenOffice_org-pt-BR less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059461" comment="OpenOffice_org-pt less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059462" comment="OpenOffice_org-ru less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059463" comment="OpenOffice_org-sk less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059464" comment="OpenOffice_org-sl less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059465" comment="OpenOffice_org-sv less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059466" comment="OpenOffice_org-tr less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059467" comment="OpenOffice_org-zh-CN less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059468" comment="OpenOffice_org-zh-TW less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059469" comment="OpenOffice_org less than 1.1.5-0.28"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3002</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-3002" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3002" source="CVE"/>
	<description>
	The Linux kernel before 2.6.31-rc7 does not initialize certain data structures within getname functions, which allows local users to read the contents of some kernel memory locations by calling getsockname on (1) an AF_APPLETALK socket, related to the atalk_getname function in net/appletalk/ddp.c; (2) an AF_IRDA socket, related to the irda_getname function in net/irda/af_irda.c; (3) an AF_ECONET socket, related to the econet_getname function in net/econet/af_econet.c; (4) an AF_NETROM socket, related to the nr_getname function in net/netrom/af_netrom.c; (5) an AF_ROSE socket, related to the rose_getname function in net/rose/af_rose.c; or (6) a raw CAN socket, related to the raw_getname function in net/can/raw.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1f8052e3d1888101d98fed2d234ab541 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056218" comment="kernel-smp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
	<!-- eddfff721fdef5d3a5e3b7862066f07c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056223" comment="kernel-bigsmp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056218" comment="kernel-smp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3094</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-3094" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3094" source="CVE"/>
	<description>
	The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.
	</description>
 </metadata>
<!-- 2fb3b9eca1524fb5f1da822967ea233e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055705" comment="libapr0 less than 2.0.59-1.14"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3095</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-3095" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3095" source="CVE"/>
	<description>
	The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11.
	</description>
 </metadata>
<!-- 2fb3b9eca1524fb5f1da822967ea233e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055705" comment="libapr0 less than 2.0.59-1.14"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3111</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-3111" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3111" source="CVE"/>
	<description>
	The rad_decode function in FreeRADIUS before 1.1.8 allows remote attackers to cause a denial of service (radiusd crash) via zero-length Tunnel-Password attributes, as demonstrated by a certain module in VulnDisco Pack Professional 7.6 through 8.11.  NOTE: this is a regression error related to CVE-2003-0967.
	</description>
 </metadata>
<!-- 4a098d8cc41ff1a048a351c0e85d198a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055108" comment="freeradius-devel less than 1.0.5-2.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055109" comment="freeradius less than 1.0.5-2.21"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3229</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-3229" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3229" source="CVE"/>
	<description>
	The core server component in PostgreSQL 8.4 before 8.4.1, 8.3 before 8.3.8, and 8.2 before 8.2.14 allows remote authenticated users to cause a denial of service (backend shutdown) by "re-LOAD-ing" libraries from a certain plugins directory.
	</description>
 </metadata>
<!-- 723ae3bf7a85462e28a0a9aa02a74216 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055012" comment="postgresql-contrib less than 7.4.26-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055013" comment="postgresql-devel less than 7.4.26-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055014" comment="postgresql-docs less than 7.4.26-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055015" comment="postgresql-libs-32bit less than 9-200909210011"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055016" comment="postgresql-libs less than 7.4.26-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055017" comment="postgresql-pl less than 7.4.26-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055018" comment="postgresql-server less than 7.4.26-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055019" comment="postgresql less than 7.4.26-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3230</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-3230" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3230" source="CVE"/>
	<description>
	The core server component in PostgreSQL 8.4 before 8.4.1, 8.3 before 8.3.8, 8.2 before 8.2.14, 8.1 before 8.1.18, 8.0 before 8.0.22, and 7.4 before 7.4.26 does not use the appropriate privileges for the (1) RESET ROLE and (2) RESET SESSION AUTHORIZATION operations, which allows remote authenticated users to gain privileges.  NOTE: this is due to an incomplete fix for CVE-2007-6600.
	</description>
 </metadata>
<!-- 723ae3bf7a85462e28a0a9aa02a74216 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055012" comment="postgresql-contrib less than 7.4.26-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055013" comment="postgresql-devel less than 7.4.26-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055014" comment="postgresql-docs less than 7.4.26-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055015" comment="postgresql-libs-32bit less than 9-200909210011"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055016" comment="postgresql-libs less than 7.4.26-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055017" comment="postgresql-pl less than 7.4.26-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055018" comment="postgresql-server less than 7.4.26-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055019" comment="postgresql less than 7.4.26-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3231</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-3231" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3231" source="CVE"/>
	<description>
	The core server component in PostgreSQL 8.3 before 8.3.8 and 8.2 before 8.2.14, when using LDAP authentication with anonymous binds, allows remote attackers to bypass authentication via an empty password.
	</description>
 </metadata>
<!-- 723ae3bf7a85462e28a0a9aa02a74216 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055012" comment="postgresql-contrib less than 7.4.26-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055013" comment="postgresql-devel less than 7.4.26-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055014" comment="postgresql-docs less than 7.4.26-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055015" comment="postgresql-libs-32bit less than 9-200909210011"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055016" comment="postgresql-libs less than 7.4.26-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055017" comment="postgresql-pl less than 7.4.26-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055018" comment="postgresql-server less than 7.4.26-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055019" comment="postgresql less than 7.4.26-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3235</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-3235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3235" source="CVE"/>
	<description>
	Multiple stack-based buffer overflows in the Sieve plugin in Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, as derived from Cyrus libsieve, allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SIEVE script, as demonstrated by forwarding an e-mail message to a large number of recipients, a different vulnerability than CVE-2009-2632.
	</description>
 </metadata>
<!-- 1046da9c81cb362da527913ebd87f0a3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055770" comment="perl-Cyrus-IMAP less than 2.2.3-83.42"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055771" comment="perl-Cyrus-SIEVE-managesieve less than 2.2.3-83.42"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3301</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-3301" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3301" source="CVE"/>
	<description>
	Integer underflow in filter/ww8/ww8par2.cxx in OpenOffice.org (OOo) before 3.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted sprmTDefTable table property modifier in a Word document.
	</description>
 </metadata>
<!-- 087f548d901d39a770d6597289f86557 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059440" comment="OpenOffice_org-ar less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059441" comment="OpenOffice_org-ca less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059442" comment="OpenOffice_org-cs less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059443" comment="OpenOffice_org-da less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059444" comment="OpenOffice_org-de less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059445" comment="OpenOffice_org-el less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059446" comment="OpenOffice_org-en-help less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059447" comment="OpenOffice_org-en less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059448" comment="OpenOffice_org-es less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059449" comment="OpenOffice_org-et less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059450" comment="OpenOffice_org-fi less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059451" comment="OpenOffice_org-fr less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059452" comment="OpenOffice_org-gnome less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059453" comment="OpenOffice_org-hu less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059454" comment="OpenOffice_org-it less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059455" comment="OpenOffice_org-ja less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059456" comment="OpenOffice_org-kde less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059457" comment="OpenOffice_org-ko less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059458" comment="OpenOffice_org-nl less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059459" comment="OpenOffice_org-pl less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059460" comment="OpenOffice_org-pt-BR less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059461" comment="OpenOffice_org-pt less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059462" comment="OpenOffice_org-ru less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059463" comment="OpenOffice_org-sk less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059464" comment="OpenOffice_org-sl less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059465" comment="OpenOffice_org-sv less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059466" comment="OpenOffice_org-tr less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059467" comment="OpenOffice_org-zh-CN less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059468" comment="OpenOffice_org-zh-TW less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059469" comment="OpenOffice_org less than 1.1.5-0.28"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3302</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-3302" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3302" source="CVE"/>
	<description>
	filter/ww8/ww8par2.cxx in OpenOffice.org (OOo) before 3.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted sprmTSetBrc table property modifier in a Word document, related to a "boundary error flaw."
	</description>
 </metadata>
<!-- 087f548d901d39a770d6597289f86557 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059440" comment="OpenOffice_org-ar less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059441" comment="OpenOffice_org-ca less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059442" comment="OpenOffice_org-cs less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059443" comment="OpenOffice_org-da less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059444" comment="OpenOffice_org-de less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059445" comment="OpenOffice_org-el less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059446" comment="OpenOffice_org-en-help less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059447" comment="OpenOffice_org-en less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059448" comment="OpenOffice_org-es less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059449" comment="OpenOffice_org-et less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059450" comment="OpenOffice_org-fi less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059451" comment="OpenOffice_org-fr less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059452" comment="OpenOffice_org-gnome less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059453" comment="OpenOffice_org-hu less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059454" comment="OpenOffice_org-it less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059455" comment="OpenOffice_org-ja less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059456" comment="OpenOffice_org-kde less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059457" comment="OpenOffice_org-ko less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059458" comment="OpenOffice_org-nl less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059459" comment="OpenOffice_org-pl less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059460" comment="OpenOffice_org-pt-BR less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059461" comment="OpenOffice_org-pt less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059462" comment="OpenOffice_org-ru less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059463" comment="OpenOffice_org-sk less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059464" comment="OpenOffice_org-sl less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059465" comment="OpenOffice_org-sv less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059466" comment="OpenOffice_org-tr less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059467" comment="OpenOffice_org-zh-CN less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059468" comment="OpenOffice_org-zh-TW less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059469" comment="OpenOffice_org less than 1.1.5-0.28"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3547</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-3547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3547" source="CVE"/>
	<description>
	Multiple race conditions in fs/pipe.c in the Linux kernel before 2.6.32-rc6 allow local users to cause a denial of service (NULL pointer dereference and system crash) or gain privileges by attempting to open an anonymous pipe via a /proc/*/fd/ pathname.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1f8052e3d1888101d98fed2d234ab541 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056218" comment="kernel-smp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
	<!-- eddfff721fdef5d3a5e3b7862066f07c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056223" comment="kernel-bigsmp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056218" comment="kernel-smp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3553</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-3553" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3553" source="CVE"/>
	<description>
	Use-after-free vulnerability in the abstract file-descriptor handling interface in the cupsdDoSelect function in scheduler/select.c in the scheduler in cupsd in CUPS 1.3.7 and 1.3.10 allows remote attackers to cause a denial of service (daemon crash or hang) via a client disconnection during listing of a large number of print jobs, related to improperly maintaining a reference count.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 6db1b7a6b1ce521ca8715091dfbc9716 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056987" comment="cups-client less than 1.1.20-108.63"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056988" comment="cups-devel less than 1.1.20-108.63"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056989" comment="cups-libs-32bit less than 9-200912011928"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056990" comment="cups-libs less than 1.1.20-108.63"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056991" comment="cups less than 1.1.20-108.63"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3555</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-3555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555" source="CVE"/>
	<description>
	The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
	</description>
 </metadata>
<!-- 966f4c625ed61db11e3e99daf4715b56 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056276" comment="openssl-32bit less than 9-200911130943"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056277" comment="openssl-devel-32bit less than 9-200911130943"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056278" comment="openssl-devel less than 0.9.7d-15.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056279" comment="openssl-doc less than 0.9.7d-15.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056280" comment="openssl less than 0.9.7d-15.41"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3560</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-3560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3560" source="CVE"/>
	<description>
	The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8e502c324db4da917dfadb04239032d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057198" comment="expat-32bit less than 9-201001081624"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057199" comment="expat less than 1.95.7-37.8"/>
		</criteria>
	</criteria>
	<!-- fba25695a17a176da3149d508dff0ec7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056825" comment="expat-32bit less than 9-200912070059"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056826" comment="expat less than 1.95.7-37.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3563</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-3563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3563" source="CVE"/>
	<description>
	ntp_request.c in ntpd in NTP before 4.2.4p8, and 4.2.5, allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by using MODE_PRIVATE to send a spoofed (1) request or (2) response packet that triggers a continuous exchange of MODE_PRIVATE error responses between two NTP daemons.
	</description>
 </metadata>
<!-- f69b5cf790bec7136eb63d475e008c89 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056878" comment="xntp-doc less than 4.2.0a-23.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056879" comment="xntp less than 4.2.0a-23.22"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3609</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-3609" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3609" source="CVE"/>
	<description>
	Integer overflow in the ImageStream::ImageStream function in Stream.cc in Xpdf before 3.02pl4 and Poppler before 0.12.1, as used in GPdf, kdegraphics KPDF, and CUPS pdftops, allows remote attackers to cause a denial of service (application crash) via a crafted PDF document that triggers a NULL pointer dereference or buffer over-read.
	</description>
 </metadata>
<!-- 6db1b7a6b1ce521ca8715091dfbc9716 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056987" comment="cups-client less than 1.1.20-108.63"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056988" comment="cups-devel less than 1.1.20-108.63"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056989" comment="cups-libs-32bit less than 9-200912011928"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056990" comment="cups-libs less than 1.1.20-108.63"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056991" comment="cups less than 1.1.20-108.63"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3720</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-3720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3720" source="CVE"/>
	<description>
	The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.
	</description>
 </metadata>
<!-- 0989ee5c5681499fbd30756b5f37607b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056322" comment="expat-32bit less than 9-200910300949"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056323" comment="expat less than 1.95.7-37.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3726</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-3726" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3726" source="CVE"/>
	<description>
	The nfs4_proc_lock function in fs/nfs/nfs4proc.c in the NFSv4 client in the Linux kernel before 2.6.31-rc4 allows remote NFS servers to cause a denial of service (NULL pointer dereference and panic) by sending a certain response containing incorrect file attributes, which trigger attempted use of an open file that lacks NFSv4 state.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1f8052e3d1888101d98fed2d234ab541 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056218" comment="kernel-smp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
	<!-- eddfff721fdef5d3a5e3b7862066f07c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056223" comment="kernel-bigsmp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056218" comment="kernel-smp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3736</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-3736" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3736" source="CVE"/>
	<description>
	ltdl.c in libltdl in GNU Libtool 1.5.x, and 2.2.6 before 2.2.6b, as used in Ham Radio Control Libraries, Q, and possibly other products, attempts to open a .la file in the current working directory, which allows local users to gain privileges via a Trojan horse file.
	</description>
 </metadata>
<!-- 3830dae3e641295cba5e23781e1d720e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058468" comment="libtool-32bit less than 9-200912011711"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058469" comment="libtool less than 1.5.2-56.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3794</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-3794" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3794" source="CVE"/>
	<description>
	Heap-based buffer overflow in Adobe Flash Player before 10.0.42.34 and Adobe AIR before 1.5.3 allows remote attackers to execute arbitrary code via crafted dimensions of JPEG data in an SWF file.
	</description>
 </metadata>
<!-- a6455799b50922e87d6ba59452e784ce -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057157" comment="flash-player less than 9.0.260.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3796</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-3796" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3796" source="CVE"/>
	<description>
	Adobe Flash Player before 10.0.42.34 and Adobe AIR before 1.5.3 might allow attackers to execute arbitrary code via unspecified vectors, related to a "data injection vulnerability."
	</description>
 </metadata>
<!-- a6455799b50922e87d6ba59452e784ce -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057157" comment="flash-player less than 9.0.260.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3797</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-3797" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3797" source="CVE"/>
	<description>
	Adobe Flash Player 10.x before 10.0.42.34 and Adobe AIR before 1.5.3 might allow attackers to execute arbitrary code via unspecified vectors that trigger memory corruption.
	</description>
 </metadata>
<!-- a6455799b50922e87d6ba59452e784ce -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057157" comment="flash-player less than 9.0.260.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3798</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-3798" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3798" source="CVE"/>
	<description>
	Adobe Flash Player before 10.0.42.34 and Adobe AIR before 1.5.3 might allow attackers to execute arbitrary code via unspecified vectors that trigger memory corruption.
	</description>
 </metadata>
<!-- a6455799b50922e87d6ba59452e784ce -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057157" comment="flash-player less than 9.0.260.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3799</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-3799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3799" source="CVE"/>
	<description>
	Integer overflow in the Verifier::parseExceptionHandlers function in Adobe Flash Player before 10.0.42.34 and Adobe AIR before 1.5.3 allows remote attackers to execute arbitrary code via an SWF file with a large exception_count value that triggers memory corruption, related to "generation of ActionScript exception handlers."
	</description>
 </metadata>
<!-- a6455799b50922e87d6ba59452e784ce -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057157" comment="flash-player less than 9.0.260.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3800</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-3800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3800" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Adobe Flash Player before 10.0.42.34 and Adobe AIR before 1.5.3 allow attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- a6455799b50922e87d6ba59452e784ce -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057157" comment="flash-player less than 9.0.260.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3951</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-3951" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3951" source="CVE"/>
	<description>
	Unspecified vulnerability in the Flash Player ActiveX control in Adobe Flash Player before 10.0.42.34 and Adobe AIR before 1.5.3 on Windows allows remote attackers to obtain the names of local files via unknown vectors.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4820.
	</description>
 </metadata>
<!-- a6455799b50922e87d6ba59452e784ce -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057157" comment="flash-player less than 9.0.260.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4034</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-4034" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4034" source="CVE"/>
	<description>
	PostgreSQL 7.4.x before 7.4.27, 8.0.x before 8.0.23, 8.1.x before 8.1.19, 8.2.x before 8.2.15, 8.3.x before 8.3.9, and 8.4.x before 8.4.2 does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which (1) allows man-in-the-middle attackers to spoof arbitrary SSL-based PostgreSQL servers via a crafted server certificate issued by a legitimate Certification Authority, and (2) allows remote attackers to bypass intended client-hostname restrictions via a crafted client certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
	</description>
 </metadata>
<!-- 84292b9f8d7063024f7e9beff78f1bc7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057268" comment="postgresql-contrib less than 7.4.27-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057269" comment="postgresql-devel less than 7.4.27-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057270" comment="postgresql-docs less than 7.4.27-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057271" comment="postgresql-libs-32bit less than 9-201001081716"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057272" comment="postgresql-libs less than 7.4.27-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057273" comment="postgresql-pl less than 7.4.27-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057274" comment="postgresql-server less than 7.4.27-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057275" comment="postgresql less than 7.4.27-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4136</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-4136" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4136" source="CVE"/>
	<description>
	PostgreSQL 7.4.x before 7.4.27, 8.0.x before 8.0.23, 8.1.x before 8.1.19, 8.2.x before 8.2.15, 8.3.x before 8.3.9, and 8.4.x before 8.4.2 does not properly manage session-local state during execution of an index function by a database superuser, which allows remote authenticated users to gain privileges via a table with crafted index functions, as demonstrated by functions that modify (1) search_path or (2) a prepared statement, a related issue to CVE-2007-6600 and CVE-2009-3230.
	</description>
 </metadata>
<!-- 84292b9f8d7063024f7e9beff78f1bc7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057268" comment="postgresql-contrib less than 7.4.27-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057269" comment="postgresql-devel less than 7.4.27-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057270" comment="postgresql-docs less than 7.4.27-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057271" comment="postgresql-libs-32bit less than 9-201001081716"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057272" comment="postgresql-libs less than 7.4.27-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057273" comment="postgresql-pl less than 7.4.27-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057274" comment="postgresql-server less than 7.4.27-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057275" comment="postgresql less than 7.4.27-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0001</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-0001" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0001" source="CVE"/>
	<description>
	Integer underflow in the unlzw function in unlzw.c in gzip before 1.4 on 64-bit platforms, as used in ncompress and probably others, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted archive that uses LZW compression, leading to an array index error.
	</description>
 </metadata>
<!-- 61555e3bdebb1ff4f9ac9dfdf0b48711 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057425" comment="gzip less than 1.3.5-136.16"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0136</title>
	<affected family="unix">
		<platform>Novell Linux Desktop 9 for x86</platform>
		<platform>Novell Linux Desktop 9 for x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-0136" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0136" source="CVE"/>
	<description>
	OpenOffice.org (OOo) 2.0.4, 2.4.1, and 3.1.1 does not properly enforce Visual Basic for Applications (VBA) macro security settings, which allows remote attackers to run arbitrary macros via a crafted document.
	</description>
 </metadata>
<!-- 087f548d901d39a770d6597289f86557 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009030400" comment="sles9-nld is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059440" comment="OpenOffice_org-ar less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059441" comment="OpenOffice_org-ca less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059442" comment="OpenOffice_org-cs less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059443" comment="OpenOffice_org-da less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059444" comment="OpenOffice_org-de less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059445" comment="OpenOffice_org-el less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059446" comment="OpenOffice_org-en-help less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059447" comment="OpenOffice_org-en less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059448" comment="OpenOffice_org-es less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059449" comment="OpenOffice_org-et less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059450" comment="OpenOffice_org-fi less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059451" comment="OpenOffice_org-fr less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059452" comment="OpenOffice_org-gnome less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059453" comment="OpenOffice_org-hu less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059454" comment="OpenOffice_org-it less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059455" comment="OpenOffice_org-ja less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059456" comment="OpenOffice_org-kde less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059457" comment="OpenOffice_org-ko less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059458" comment="OpenOffice_org-nl less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059459" comment="OpenOffice_org-pl less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059460" comment="OpenOffice_org-pt-BR less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059461" comment="OpenOffice_org-pt less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059462" comment="OpenOffice_org-ru less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059463" comment="OpenOffice_org-sk less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059464" comment="OpenOffice_org-sl less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059465" comment="OpenOffice_org-sv less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059466" comment="OpenOffice_org-tr less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059467" comment="OpenOffice_org-zh-CN less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059468" comment="OpenOffice_org-zh-TW less than 1.1.5-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059469" comment="OpenOffice_org less than 1.1.5-0.28"/>
	</criteria>
</criteria>
</definition>
 </definitions>
 <tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030400" version="1" comment="sld-release is ==9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030401" version="1" comment="tar is &lt;1.13.25-325.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030402" version="1" comment="tar is &lt;1.13.25-325.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030403" version="1" comment="libapr0 is &lt;2.0.59-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030404" version="1" comment="openssh is &lt;3.8p1-37.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030405" version="1" comment="iproute2 is &lt;2.4.7-866.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030406" version="1" comment="libxml2-devel is &lt;2.6.7-28.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030407" version="1" comment="libxml2 is &lt;2.6.7-28.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030408" version="1" comment="libxml2-python is &lt;2.6.7-46.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030409" version="1" comment="libxml-devel is &lt;1.8.17-366.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030410" version="1" comment="libxml is &lt;1.8.17-366.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030411" version="1" comment="perl is &lt;5.8.3-32.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030412" version="1" comment="gnome-vfs2-32bit is &lt;9-200504132212" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030413" version="1" comment="gnome-vfs2-doc is &lt;2.6.1-6.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030414" version="1" comment="gnome-vfs2 is &lt;2.6.1-6.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030415" version="1" comment="XFree86-libs is &lt;4.3.99.902-43.35.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030416" version="1" comment="kdegraphics3-fax is &lt;3.2.1-67.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030417" version="1" comment="kernel-default is &lt;2.6.5-7.151" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030418" version="1" comment="kernel-smp is &lt;2.6.5-7.151" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030419" version="1" comment="kernel-source is &lt;2.6.5-7.151" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030420" version="1" comment="kernel-syms is &lt;2.6.5-7.151" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030421" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.151" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030422" version="1" comment="ImageMagick-devel is &lt;5.5.7-225.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030423" version="1" comment="ImageMagick is &lt;5.5.7-225.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030424" version="1" comment="mysql-Max is &lt;4.0.18-32.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030425" version="1" comment="mysql is &lt;4.0.18-32.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030426" version="1" comment="mysql is &lt;4.0.18-32.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030427" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030428" version="1" comment="kernel-default is &lt;2.6.5-7.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030429" version="1" comment="kernel-smp is &lt;2.6.5-7.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030430" version="1" comment="kernel-source is &lt;2.6.5-7.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030431" version="1" comment="kernel-syms is &lt;2.6.5-7.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030432" version="1" comment="libapr0 is &lt;2.0.49-27.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030433" version="1" comment="cups-client is &lt;1.1.20-108.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030434" version="1" comment="cups-devel is &lt;1.1.20-108.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030435" version="1" comment="cups-libs is &lt;1.1.20-108.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030436" version="1" comment="cups is &lt;1.1.20-108.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030437" version="1" comment="samba is &lt;3.0.4-1.34.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030438" version="1" comment="unarj is &lt;2.65-131.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030439" version="1" comment="ruby is &lt;1.8.1-42.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030440" version="1" comment="iptables is &lt;1.2.9-95.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030441" version="1" comment="mc is &lt;4.6.0-324.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030442" version="1" comment="zip is &lt;2.3-732.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030443" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.111.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030444" version="1" comment="kernel-default is &lt;2.6.5-7.111.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030445" version="1" comment="kernel-smp is &lt;2.6.5-7.111.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030446" version="1" comment="kernel-source is &lt;2.6.5-7.111.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030447" version="1" comment="kernel-syms is &lt;2.6.5-7.111.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030448" version="1" comment="imlib-devel is &lt;1.9.14-180.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030449" version="1" comment="imlib is &lt;1.9.14-180.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030450" version="1" comment="java2-jre is &lt;1.4.2-129.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030451" version="1" comment="java2 is &lt;1.4.2-129.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030452" version="1" comment="cups-client is &lt;1.1.20-108.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030453" version="1" comment="cups-devel is &lt;1.1.20-108.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030454" version="1" comment="cups-libs is &lt;1.1.20-108.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030455" version="1" comment="cups is &lt;1.1.20-108.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030456" version="1" comment="kdelibs3 is &lt;3.2.1-44.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030457" version="1" comment="acroread is &lt;5.010-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030458" version="1" comment="libsmbclient-devel is &lt;3.0.9-2.1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030459" version="1" comment="libsmbclient is &lt;3.0.9-2.1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030460" version="1" comment="samba-client is &lt;3.0.9-2.1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030461" version="1" comment="samba-doc is &lt;3.0.9-2.1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030462" version="1" comment="samba-pdb is &lt;3.0.9-2.1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030463" version="1" comment="samba-python is &lt;3.0.9-2.1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030464" version="1" comment="samba-vscan is &lt;0.3.5-11.7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030465" version="1" comment="samba-winbind is &lt;3.0.9-2.1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030466" version="1" comment="samba is &lt;3.0.9-2.1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030467" version="1" comment="kdebase3 is &lt;3.2.1-68.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030468" version="1" comment="mailman is &lt;2.1.4-83.16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030469" version="1" comment="hylafax is &lt;4.1.8-24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030470" version="1" comment="libtiff is &lt;3.6.1-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030471" version="1" comment="tiff is &lt;3.6.1-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030472" version="1" comment="enscript is &lt;1.6.2-814.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030473" version="1" comment="xine-lib is &lt;0.99.rc3a-106.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030474" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.111.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030475" version="1" comment="kernel-default is &lt;2.6.5-7.111.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030476" version="1" comment="kernel-smp is &lt;2.6.5-7.111.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030477" version="1" comment="kernel-source is &lt;2.6.5-7.111.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030478" version="1" comment="kernel-syms is &lt;2.6.5-7.111.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030479" version="1" comment="file is &lt;4.07-48.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030480" version="1" comment="wget is &lt;1.9.1-45.10.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030481" version="1" comment="wget is &lt;1.9.1-45.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030482" version="1" comment="sharutils is &lt;4.2c-710.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030483" version="1" comment="snort is &lt;2.3.2-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030484" version="1" comment="ncpfs is &lt;2.2.4-25.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030485" version="1" comment="perl-DBI is &lt;1.41-28.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030486" version="1" comment="htdig is &lt;3.1.6-402.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030487" version="1" comment="python is &lt;2.3.3-88.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030488" version="1" comment="evolution-pilot is &lt;2.0.1-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030489" version="1" comment="evolution is &lt;2.0.1-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030490" version="1" comment="unace is &lt;1.2b-621.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030491" version="1" comment="mailman is &lt;2.1.4-83.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030492" version="1" comment="mailman is &lt;2.1.4-83.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030493" version="1" comment="gaim is &lt;1.0.3-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030494" version="1" comment="postgresql-contrib is &lt;7.4.8-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030495" version="1" comment="postgresql-devel is &lt;7.4.8-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030496" version="1" comment="postgresql-docs is &lt;7.4.8-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030497" version="1" comment="postgresql-libs is &lt;7.4.8-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030498" version="1" comment="postgresql-pl is &lt;7.4.8-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030499" version="1" comment="postgresql-server is &lt;7.4.8-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030500" version="1" comment="postgresql is &lt;7.4.8-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030501" version="1" comment="postgresql-contrib is &lt;7.4.7-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030502" version="1" comment="postgresql-devel is &lt;7.4.7-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030503" version="1" comment="postgresql-docs is &lt;7.4.7-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030504" version="1" comment="postgresql-libs is &lt;7.4.7-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030505" version="1" comment="postgresql-pl is &lt;7.4.7-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030506" version="1" comment="postgresql-server is &lt;7.4.7-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030507" version="1" comment="postgresql is &lt;7.4.7-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030508" version="1" comment="MozillaFirefox-translations is &lt;1.0.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030509" version="1" comment="MozillaFirefox is &lt;1.0.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030510" version="1" comment="gpg is &lt;1.2.4-68.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030511" version="1" comment="cyrus-sasl is &lt;2.1.18-33.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030512" version="1" comment="ImageMagick-devel is &lt;5.5.7-225.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030513" version="1" comment="ImageMagick is &lt;5.5.7-225.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030514" version="1" comment="kernel-default is &lt;2.6.5-7.155.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030515" version="1" comment="kernel-smp is &lt;2.6.5-7.155.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030516" version="1" comment="kernel-source is &lt;2.6.5-7.155.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030517" version="1" comment="kernel-syms is &lt;2.6.5-7.155.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030518" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.155.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030519" version="1" comment="RealPlayer is &lt;10.0.3-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030520" version="1" comment="telnet is &lt;1.1-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030521" version="1" comment="heimdal-devel is &lt;0.6.1rc3-55.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030522" version="1" comment="heimdal-lib is &lt;0.6.1rc3-55.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030523" version="1" comment="heimdal is &lt;0.6.1rc3-55.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030524" version="1" comment="telnet is &lt;1.1-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030525" version="1" comment="XFree86-libs is &lt;4.3.99.902-43.42.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030526" version="1" comment="libexif is &lt;0.5.12-118.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030527" version="1" comment="MozillaFirefox-translations is &lt;1.0.3-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030528" version="1" comment="MozillaFirefox is &lt;1.0.3-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030529" version="1" comment="java2-jre is &lt;1.4.2-129.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030530" version="1" comment="java2 is &lt;1.4.2-129.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030531" version="1" comment="OpenOffice_org-cs is &lt;1.1.3-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030532" version="1" comment="OpenOffice_org-da is &lt;1.1.3-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030533" version="1" comment="OpenOffice_org-de is &lt;1.1.3-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030534" version="1" comment="OpenOffice_org-en-help is &lt;1.1.3-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030535" version="1" comment="OpenOffice_org-en is &lt;1.1.3-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030536" version="1" comment="OpenOffice_org-es is &lt;1.1.3-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030537" version="1" comment="OpenOffice_org-fi is &lt;1.1.3-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030538" version="1" comment="OpenOffice_org-fr is &lt;1.1.3-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030539" version="1" comment="OpenOffice_org-gnome is &lt;1.1.3-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030540" version="1" comment="OpenOffice_org-hu is &lt;1.1.3-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030541" version="1" comment="OpenOffice_org-it is &lt;1.1.3-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030542" version="1" comment="OpenOffice_org-ja is &lt;1.1.3-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030543" version="1" comment="OpenOffice_org-kde is &lt;1.1.3-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030544" version="1" comment="OpenOffice_org-pl is &lt;1.1.3-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030545" version="1" comment="OpenOffice_org-pt is &lt;1.1.3-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030546" version="1" comment="OpenOffice_org-ru is &lt;1.1.3-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030547" version="1" comment="OpenOffice_org-sk is &lt;1.1.3-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030548" version="1" comment="OpenOffice_org-sv is &lt;1.1.3-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030549" version="1" comment="OpenOffice_org-zh-CN is &lt;1.1.3-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030550" version="1" comment="OpenOffice_org-zh-TW is &lt;1.1.3-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030551" version="1" comment="OpenOffice_org is &lt;1.1.3-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030552" version="1" comment="kernel-default is &lt;2.6.5-7.202.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030553" version="1" comment="kernel-smp is &lt;2.6.5-7.202.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030554" version="1" comment="kernel-source is &lt;2.6.5-7.202.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030555" version="1" comment="kernel-syms is &lt;2.6.5-7.202.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030556" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.202.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030557" version="1" comment="kdelibs3 is &lt;3.2.1-44.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030558" version="1" comment="cpio is &lt;2.5-324.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030559" version="1" comment="qpopper is &lt;4.0.5-175.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030560" version="1" comment="xine-lib is &lt;0.99.rc3a-106.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030561" version="1" comment="bzip2 is &lt;1.0.2-346.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030562" version="1" comment="gaim is &lt;1.0.3-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030563" version="1" comment="libapr0 is &lt;2.0.49-27.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030564" version="1" comment="tcpdump is &lt;3.8.1-49.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030565" version="1" comment="libredcarpet-python is &lt;2.4.8-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030566" version="1" comment="libredcarpet-tools is &lt;2.4.8-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030567" version="1" comment="libredcarpet is &lt;2.4.8-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030568" version="1" comment="libsoup-32bit is &lt;9-200508251319" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030569" version="1" comment="libsoup-devel-32bit is &lt;9-200508251319" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030570" version="1" comment="libsoup-devel is &lt;2.2.3-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030571" version="1" comment="libsoup is &lt;2.2.3-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030572" version="1" comment="rcd-devel is &lt;2.4.8-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030573" version="1" comment="rcd-modules-devel is &lt;2.4.8-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030574" version="1" comment="rcd-modules is &lt;2.4.8-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030575" version="1" comment="rcd is &lt;2.4.8-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030576" version="1" comment="red-carpet is &lt;2.4.4-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030577" version="1" comment="rug is &lt;2.4.8-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030578" version="1" comment="gnutls-devel is &lt;1.0.8-26.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030579" version="1" comment="gnutls is &lt;1.0.8-26.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030580" version="1" comment="libtiff is &lt;3.6.1-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030581" version="1" comment="acroread is &lt;7.0.0-5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030582" version="1" comment="atk-32bit is &lt;9-200508151719" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030583" version="1" comment="atk-doc is &lt;1.6.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030584" version="1" comment="atk is &lt;1.6.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030585" version="1" comment="curl-32bit is &lt;9-200508151719" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030586" version="1" comment="glib2-32bit is &lt;9-200508151719" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030587" version="1" comment="glib2 is &lt;2.4.6-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030588" version="1" comment="glibc-locale-32bit is &lt;9-200508151719" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030589" version="1" comment="gtk2-32bit is &lt;9-200508151719" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030590" version="1" comment="gtk2-devel is &lt;2.4.14-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030591" version="1" comment="gtk2-doc is &lt;2.4.14-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030592" version="1" comment="gtk2 is &lt;2.4.14-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030593" version="1" comment="pango-32bit is &lt;9-200508151719" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030594" version="1" comment="pango is &lt;1.4.1-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030595" version="1" comment="curl-32bit is &lt;9-200507130235" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030596" version="1" comment="glibc-locale-32bit is &lt;9-200507130235" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030597" version="1" comment="atk-32bit is &lt;9-200507191046" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030598" version="1" comment="atk-doc is &lt;1.6.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030599" version="1" comment="atk is &lt;1.6.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030600" version="1" comment="curl-32bit is &lt;9-200507191046" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030601" version="1" comment="glib2-32bit is &lt;9-200507191046" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030602" version="1" comment="glib2 is &lt;2.4.6-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030603" version="1" comment="glibc-locale-32bit is &lt;9-200507191046" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030604" version="1" comment="gtk2-32bit is &lt;9-200507191046" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030605" version="1" comment="gtk2 is &lt;2.4.9-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030606" version="1" comment="pango-32bit is &lt;9-200507191046" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030607" version="1" comment="pango is &lt;1.4.1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030608" version="1" comment="atk-32bit is &lt;9-200508261636" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030609" version="1" comment="curl-32bit is &lt;9-200508261636" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030610" version="1" comment="glib2-32bit is &lt;9-200508261636" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030611" version="1" comment="glibc-locale-32bit is &lt;9-200508261636" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030612" version="1" comment="gtk2-32bit is &lt;9-200508261636" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030613" version="1" comment="pango-32bit is &lt;9-200508261636" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030614" version="1" comment="gedit is &lt;2.6.1-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030615" version="1" comment="kernel-default is &lt;2.6.5-7.201" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030616" version="1" comment="kernel-smp is &lt;2.6.5-7.201" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030617" version="1" comment="kernel-source is &lt;2.6.5-7.201" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030618" version="1" comment="kernel-syms is &lt;2.6.5-7.201" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030619" version="1" comment="kernel-default is &lt;2.6.5-7.193" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030620" version="1" comment="kernel-smp is &lt;2.6.5-7.193" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030621" version="1" comment="kernel-source is &lt;2.6.5-7.193" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030622" version="1" comment="kernel-syms is &lt;2.6.5-7.193" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030623" version="1" comment="dhcpcd is &lt;1.3.22pl4-193.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030624" version="1" comment="zlib-devel is &lt;1.2.1-70.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030625" version="1" comment="zlib is &lt;1.2.1-70.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030626" version="1" comment="kdenetwork3-nld-InstantMessenger is &lt;3.3.0-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030627" version="1" comment="gaim is &lt;1.2.0-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030628" version="1" comment="kdelibs3-devel is &lt;3.2.1-44.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030629" version="1" comment="kdelibs3 is &lt;3.2.1-44.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030630" version="1" comment="ruby is &lt;1.8.1-42.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030631" version="1" comment="sudo is &lt;1.6.7p5-117.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030632" version="1" comment="heimdal is &lt;0.6.1rc3-55.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030633" version="1" comment="openldap2-client is &lt;2.2.24-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030634" version="1" comment="openldap2-devel is &lt;2.2.24-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030635" version="1" comment="pam_ldap is &lt;169-28.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030636" version="1" comment="jakarta-tomcat is &lt;5.0.19-29.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030637" version="1" comment="zlib-devel is &lt;1.2.1-70.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030638" version="1" comment="zlib is &lt;1.2.1-70.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030639" version="1" comment="perl-Compress-Zlib is &lt;1.33-30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030640" version="1" comment="net-snmp is &lt;5.1-80.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030641" version="1" comment="fetchmail is &lt;6.2.5-49.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030642" version="1" comment="ruby is &lt;1.8.1-42.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030643" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.201" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030644" version="1" comment="acroread is &lt;7.0.1-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030645" version="1" comment="libnetpbm is &lt;1.0.0-618.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030646" version="1" comment="netpbm is &lt;10.11.4-172.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030647" version="1" comment="python-32bit is &lt;9-200712110030" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030648" version="1" comment="python-curses is &lt;2.3.3-88.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030649" version="1" comment="python-demo is &lt;2.3.3-88.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030650" version="1" comment="python-devel is &lt;2.3.3-88.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030651" version="1" comment="python-doc-pdf is &lt;2.3.3-88.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030652" version="1" comment="python-doc is &lt;2.3.3-88.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030653" version="1" comment="python-gdbm is &lt;2.3.3-88.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030654" version="1" comment="python-idle is &lt;2.3.3-88.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030655" version="1" comment="python-mpz is &lt;2.3.3-88.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030656" version="1" comment="python-tk is &lt;2.3.3-88.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030657" version="1" comment="python-xml is &lt;2.3.3-88.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030658" version="1" comment="python is &lt;2.3.3-88.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030659" version="1" comment="pcre-devel is &lt;4.4-109.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030660" version="1" comment="pcre is &lt;4.4-109.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030661" version="1" comment="libapr0 is &lt;2.0.49-27.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030662" version="1" comment="XFree86-Xvnc is &lt;4.3.99.902-43.50.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030663" version="1" comment="XFree86-server is &lt;4.3.99.902-43.50.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030664" version="1" comment="evolution-devel is &lt;2.0.4-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030665" version="1" comment="evolution-pilot is &lt;2.0.4-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030666" version="1" comment="evolution is &lt;2.0.4-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030667" version="1" comment="mysql-Max is &lt;4.0.18-32.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030668" version="1" comment="mysql-devel is &lt;4.0.18-32.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030669" version="1" comment="mysql is &lt;4.0.18-32.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030670" version="1" comment="MozillaFirefox-translations is &lt;1.0.7-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030671" version="1" comment="MozillaFirefox is &lt;1.0.7-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030672" version="1" comment="mozilla-cs is &lt;1.7.5-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030673" version="1" comment="mozilla-deat is &lt;1.7.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030674" version="1" comment="mozilla-devel is &lt;1.7.8-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030675" version="1" comment="mozilla-dom-inspector is &lt;1.7.8-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030676" version="1" comment="mozilla-hu is &lt;1.78-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030677" version="1" comment="mozilla-irc is &lt;1.7.8-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030678" version="1" comment="mozilla-ja is &lt;1.7.7-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030679" version="1" comment="mozilla-ko is &lt;1.75-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030680" version="1" comment="mozilla-lib64 is &lt;1.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030681" version="1" comment="mozilla-mail is &lt;1.7.8-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030682" version="1" comment="mozilla-venkman is &lt;1.7.8-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030683" version="1" comment="mozilla is &lt;1.7.8-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030684" version="1" comment="RealPlayer is &lt;10.0.6-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030685" version="1" comment="openssh-askpass is &lt;4.1p1-11.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030686" version="1" comment="openssh is &lt;4.1p1-11.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030687" version="1" comment="MozillaFirefox-translations is &lt;1.0.6-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030688" version="1" comment="MozillaFirefox is &lt;1.0.6-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030689" version="1" comment="util-linux is &lt;2.12-72.39.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030690" version="1" comment="RealPlayer is &lt;10.0.7-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030691" version="1" comment="libgda-devel is &lt;1.0.3-54.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030692" version="1" comment="libgda is &lt;1.0.3-54.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030693" version="1" comment="xine-lib is &lt;0.99.rc3a-106.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030694" version="1" comment="openssl-devel is &lt;0.9.7d-15.15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030695" version="1" comment="openssl is &lt;0.9.7d-15.15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030696" version="1" comment="libungif is &lt;4.1.0b1-585.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030697" version="1" comment="gdk-pixbuf-devel is &lt;0.22.0-62.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030698" version="1" comment="gdk-pixbuf is &lt;0.22.0-62.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030699" version="1" comment="gtk2-32bit is &lt;9-200511031328" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030700" version="1" comment="gtk2-devel is &lt;2.4.14-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030701" version="1" comment="gtk2 is &lt;2.4.14-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030702" version="1" comment="netpbm is &lt;10.11.4-172.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030703" version="1" comment="texinfo is &lt;4.6-61.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030704" version="1" comment="liby2util-devel is &lt;2.9.27-0.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030705" version="1" comment="liby2util is &lt;2.9.27-0.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030706" version="1" comment="curl-devel is &lt;7.11.0-39.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030707" version="1" comment="curl is &lt;7.11.0-39.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030708" version="1" comment="cups is &lt;1.1.20-108.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030709" version="1" comment="snort is &lt;2.3.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030710" version="1" comment="mozilla-mail is &lt;1.7.8-5.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030711" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.252" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030712" version="1" comment="kernel-default is &lt;2.6.5-7.252" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030713" version="1" comment="kernel-smp is &lt;2.6.5-7.252" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030714" version="1" comment="kernel-source is &lt;2.6.5-7.252" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030715" version="1" comment="kernel-syms is &lt;2.6.5-7.252" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030716" version="1" comment="jakarta-tomcat is &lt;5.0.19-29.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030717" version="1" comment="libnetpbm is &lt;1.0.0-618.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030718" version="1" comment="netpbm is &lt;10.11.4-172.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030719" version="1" comment="netpbm is &lt;10.11.4-172.6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030720" version="1" comment="freeswan is &lt;2.04_1.5.4-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030721" version="1" comment="ipsec-tools is &lt;0.3.3-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030722" version="1" comment="java2-jre is &lt;1.4.2-129.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030723" version="1" comment="java2 is &lt;1.4.2-129.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030724" version="1" comment="perl-32bit is &lt;9-200512171950" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030725" version="1" comment="perl is &lt;5.8.3-32.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030726" version="1" comment="fetchmail is &lt;6.2.5-49.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030727" version="1" comment="ImageMagick-devel is &lt;5.5.7-225.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030728" version="1" comment="ImageMagick is &lt;5.5.7-225.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030729" version="1" comment="kdelibs3-32bit is &lt;9-200601130434" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030730" version="1" comment="kdelibs3-devel is &lt;3.2.1-44.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030731" version="1" comment="kdelibs3 is &lt;3.2.1-44.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030732" version="1" comment="flash-player is &lt;7.0.63.0-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030733" version="1" comment="gpg is &lt;1.2.4-68.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030734" version="1" comment="mailman is &lt;2.1.4-83.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030735" version="1" comment="kernel-default is &lt;2.6.5-7.257" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030736" version="1" comment="kernel-smp is &lt;2.6.5-7.257" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030737" version="1" comment="kernel-source is &lt;2.6.5-7.257" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030738" version="1" comment="kernel-syms is &lt;2.6.5-7.257" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030739" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.257" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030740" version="1" comment="openssh-askpass is &lt;4.1p1-11.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030741" version="1" comment="openssh is &lt;4.1p1-11.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030742" version="1" comment="gpg is &lt;1.2.4-68.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030743" version="1" comment="gpg2 is &lt;1.9.10-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030744" version="1" comment="heimdal-devel-32bit is &lt;9-200602210430" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030745" version="1" comment="heimdal-devel is &lt;0.6.1rc3-55.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030746" version="1" comment="heimdal-lib-32bit is &lt;9-200602210430" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030747" version="1" comment="heimdal-lib is &lt;0.6.1rc3-55.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030748" version="1" comment="heimdal is &lt;0.6.1rc3-55.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030749" version="1" comment="gnutls-32bit is &lt;9-200602210534" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030750" version="1" comment="gnutls-devel-32bit is &lt;9-200602210534" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030751" version="1" comment="gnutls-devel is &lt;1.0.8-26.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030752" version="1" comment="gnutls is &lt;1.0.8-26.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030753" version="1" comment="dia is &lt;0.94-13.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030754" version="1" comment="binutils-32bit is &lt;9-200601210802" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030755" version="1" comment="binutils is &lt;2.15.90.0.1.1-32.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030756" version="1" comment="kernel-default is &lt;2.6.5-7.276" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030757" version="1" comment="kernel-smp is &lt;2.6.5-7.276" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030758" version="1" comment="kernel-source is &lt;2.6.5-7.276" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030759" version="1" comment="kernel-syms is &lt;2.6.5-7.276" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030760" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.276" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030761" version="1" comment="freetype2-32bit is &lt;9-200606132344" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030762" version="1" comment="freetype2-devel-32bit is &lt;9-200606132344" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030763" version="1" comment="freetype2-devel is &lt;2.1.7-53.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030764" version="1" comment="freetype2 is &lt;2.1.7-53.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030765" version="1" comment="MozillaFirefox-translations is &lt;1.0.8-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030766" version="1" comment="MozillaFirefox is &lt;1.0.8-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030767" version="1" comment="mozilla-cs is &lt;1.7.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030768" version="1" comment="mozilla-deat is &lt;1.7.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030769" version="1" comment="mozilla-devel is &lt;1.7.8-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030770" version="1" comment="mozilla-dom-inspector is &lt;1.7.8-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030771" version="1" comment="mozilla-hu is &lt;1.78-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030772" version="1" comment="mozilla-irc is &lt;1.7.8-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030773" version="1" comment="mozilla-ja is &lt;1.7.7-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030774" version="1" comment="mozilla-ko is &lt;1.75-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030775" version="1" comment="mozilla-lib64 is &lt;1.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030776" version="1" comment="mozilla-mail is &lt;1.7.8-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030777" version="1" comment="mozilla-venkman is &lt;1.7.8-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030778" version="1" comment="mozilla is &lt;1.7.8-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030779" version="1" comment="liby2util-devel is &lt;2.9.27-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030780" version="1" comment="liby2util is &lt;2.9.27-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030781" version="1" comment="zoo is &lt;2.10-851.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030782" version="1" comment="zoo is &lt;2.10-851.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030783" version="1" comment="mysql is &lt;4.0.18-32.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030784" version="1" comment="mysql-Max is &lt;4.0.18-32.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030785" version="1" comment="dia is &lt;0.94-13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030786" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.18-33.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030787" version="1" comment="XFree86-server is &lt;4.3.99.902-43.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030788" version="1" comment="ruby is &lt;1.8.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030789" version="1" comment="libtiff-32bit is &lt;9-200604240415" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030790" version="1" comment="libtiff is &lt;3.6.1-38.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030791" version="1" comment="mailman is &lt;2.1.4-83.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030792" version="1" comment="OpenOffice_org-ar is &lt;1.1.5-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030793" version="1" comment="OpenOffice_org-ca is &lt;1.1.5-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030794" version="1" comment="OpenOffice_org-cs is &lt;1.1.5-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030795" version="1" comment="OpenOffice_org-da is &lt;1.1.5-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030796" version="1" comment="OpenOffice_org-de is &lt;1.1.5-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030797" version="1" comment="OpenOffice_org-el is &lt;1.1.5-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030798" version="1" comment="OpenOffice_org-en is &lt;1.1.5-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030799" version="1" comment="OpenOffice_org-es is &lt;1.1.5-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030800" version="1" comment="OpenOffice_org-et is &lt;1.1.5-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030801" version="1" comment="OpenOffice_org-fi is &lt;1.1.5-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030802" version="1" comment="OpenOffice_org-fr is &lt;1.1.5-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030803" version="1" comment="OpenOffice_org-gnome is &lt;1.1.5-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030804" version="1" comment="OpenOffice_org-hu is &lt;1.1.5-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030805" version="1" comment="OpenOffice_org-it is &lt;1.1.5-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030806" version="1" comment="OpenOffice_org-ja is &lt;1.1.5-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030807" version="1" comment="OpenOffice_org-kde is &lt;1.1.5-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030808" version="1" comment="OpenOffice_org-ko is &lt;1.1.5-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030809" version="1" comment="OpenOffice_org-nl is &lt;1.1.5-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030810" version="1" comment="OpenOffice_org-pl is &lt;1.1.5-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030811" version="1" comment="OpenOffice_org-pt-BR is &lt;1.1.5-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030812" version="1" comment="OpenOffice_org-pt is &lt;1.1.5-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030813" version="1" comment="OpenOffice_org-ru is &lt;1.1.5-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030814" version="1" comment="OpenOffice_org-sk is &lt;1.1.5-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030815" version="1" comment="OpenOffice_org-sl is &lt;1.1.5-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030816" version="1" comment="OpenOffice_org-sv is &lt;1.1.5-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030817" version="1" comment="OpenOffice_org-tr is &lt;1.1.5-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030818" version="1" comment="OpenOffice_org-zh-CN is &lt;1.1.5-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030819" version="1" comment="OpenOffice_org-zh-TW is &lt;1.1.5-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030820" version="1" comment="OpenOffice_org is &lt;1.1.5-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030821" version="1" comment="postgresql-contrib is &lt;7.4.13-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030822" version="1" comment="postgresql-devel is &lt;7.4.13-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030823" version="1" comment="postgresql-docs is &lt;7.4.13-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030824" version="1" comment="postgresql-libs-32bit is &lt;9-200605291910" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030825" version="1" comment="postgresql-libs is &lt;7.4.13-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030826" version="1" comment="postgresql-pl is &lt;7.4.13-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030827" version="1" comment="postgresql-server is &lt;7.4.13-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030828" version="1" comment="postgresql is &lt;7.4.13-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030829" version="1" comment="binutils-32bit is &lt;9-200610302219" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030830" version="1" comment="binutils is &lt;2.15.90.0.1.1-32.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030831" version="1" comment="perl-spamassassin is &lt;2.64-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030832" version="1" comment="kdebase3-kdm-SLD is &lt;3.2.1-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030833" version="1" comment="gdm is &lt;2.6.0.0-2.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030834" version="1" comment="dia is &lt;0.94-13.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030835" version="1" comment="cron is &lt;3.0.1-920.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030836" version="1" comment="tiff is &lt;3.6.1-38.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030837" version="1" comment="snort is &lt;2.3.2-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030838" version="1" comment="xine-lib-32bit is &lt;9-200606081412" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030839" version="1" comment="xine-lib is &lt;0.99.rc3a-106.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030840" version="1" comment="MozillaFirefox-translations is &lt;1.5.0.12-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030841" version="1" comment="MozillaFirefox is &lt;1.5.0.12-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030842" version="1" comment="mozilla-cs is &lt;1.8_seamonkey_1.0.4-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030843" version="1" comment="mozilla-deat is &lt;1.8_seamonkey_1.0.4-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030844" version="1" comment="mozilla-devel is &lt;1.8_seamonkey_1.0.9-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030845" version="1" comment="mozilla-dom-inspector is &lt;1.8_seamonkey_1.0.9-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030846" version="1" comment="mozilla-hu is &lt;1.80_seamonkey_1.0.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030847" version="1" comment="mozilla-irc is &lt;1.8_seamonkey_1.0.9-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030848" version="1" comment="mozilla-lib64 is &lt;1.8_seamonkey_1.0.9-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030849" version="1" comment="mozilla-mail is &lt;1.8_seamonkey_1.0.9-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030850" version="1" comment="mozilla-venkman is &lt;1.8_seamonkey_1.0.9-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030851" version="1" comment="mozilla is &lt;1.8_seamonkey_1.0.9-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030852" version="1" comment="arts-32bit is &lt;9-200606211826" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030853" version="1" comment="arts is &lt;1.2.1-35.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030854" version="1" comment="kernel-default is &lt;2.6.5-7.286" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030855" version="1" comment="kernel-smp is &lt;2.6.5-7.286" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030856" version="1" comment="kernel-source is &lt;2.6.5-7.286" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030857" version="1" comment="kernel-syms is &lt;2.6.5-7.286" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030858" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.286" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030859" version="1" comment="openssl-32bit is &lt;9-200609270654" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030860" version="1" comment="openssl-devel-32bit is &lt;9-200609270654" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030861" version="1" comment="openssl-devel is &lt;0.9.7d-15.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030862" version="1" comment="openssl is &lt;0.9.7d-15.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030863" version="1" comment="openssl-32bit is &lt;9-200610132325" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030864" version="1" comment="openssl-devel-32bit is &lt;9-200610132325" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030865" version="1" comment="openssl-devel is &lt;0.9.7d-15.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030866" version="1" comment="openssl is &lt;0.9.7d-15.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030867" version="1" comment="gpg is &lt;1.2.4-68.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030868" version="1" comment="gpg2 is &lt;1.9.10-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030869" version="1" comment="acroread is &lt;7.0.8-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030870" version="1" comment="MozillaFirefox-translations is &lt;1.5.0.6-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030871" version="1" comment="MozillaFirefox is &lt;1.5.0.6-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030872" version="1" comment="capi4hylafax is &lt;4.1.8-24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030873" version="1" comment="mutt is &lt;1.5.6i-64.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030874" version="1" comment="flash-player is &lt;7.0.68.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030875" version="1" comment="libpng-32bit is &lt;9-200612010115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030876" version="1" comment="libpng-devel is &lt;1.2.5-182.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030877" version="1" comment="libpng is &lt;1.2.5-182.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030878" version="1" comment="libwmf is &lt;0.2.8.2-88.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030879" version="1" comment="samba is &lt;3.0.20b-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030880" version="1" comment="gimp is &lt;2.0.2-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030881" version="1" comment="libtiff-32bit is &lt;9-200607271200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030882" version="1" comment="libtiff is &lt;3.6.1-38.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030883" version="1" comment="freetype2-32bit is &lt;9-200607282027" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030884" version="1" comment="freetype2-devel-32bit is &lt;9-200607282027" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030885" version="1" comment="freetype2-devel is &lt;2.1.7-53.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030886" version="1" comment="freetype2 is &lt;2.1.7-53.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030887" version="1" comment="kernel-default is &lt;2.6.5-7.282" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030888" version="1" comment="kernel-smp is &lt;2.6.5-7.282" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030889" version="1" comment="kernel-source is &lt;2.6.5-7.282" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030890" version="1" comment="kernel-syms is &lt;2.6.5-7.282" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030891" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.282" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030892" version="1" comment="ruby is &lt;1.8.1-42.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030893" version="1" comment="XFree86-server is &lt;4.3.99.902-43.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030894" version="1" comment="kernel-default is &lt;2.6.5-7.283" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030895" version="1" comment="kernel-smp is &lt;2.6.5-7.283" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030896" version="1" comment="kernel-source is &lt;2.6.5-7.283" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030897" version="1" comment="kernel-syms is &lt;2.6.5-7.283" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030898" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.283" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030899" version="1" comment="ImageMagick-devel is &lt;5.5.7-225.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030900" version="1" comment="ImageMagick is &lt;5.5.7-225.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030901" version="1" comment="gpg2 is &lt;1.9.10-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030902" version="1" comment="gpg is &lt;1.2.4-68.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030903" version="1" comment="apache-devel is &lt;1.3.29-71.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030904" version="1" comment="apache is &lt;1.3.29-71.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030905" version="1" comment="mysql-Max is &lt;4.0.18-32.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030906" version="1" comment="mysql is &lt;4.0.18-32.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030907" version="1" comment="ImageMagick-devel is &lt;5.5.7-225.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030908" version="1" comment="ImageMagick is &lt;5.5.7-225.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030909" version="1" comment="libmusicbrainz is &lt;2.0.2-110.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030910" version="1" comment="man is &lt;2.4.1-214.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030911" version="1" comment="MozillaFirefox-translations is &lt;1.5.0.7-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030912" version="1" comment="MozillaFirefox is &lt;1.5.0.7-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030913" version="1" comment="gzip is &lt;1.3.5-136.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030914" version="1" comment="bind-utils-32bit is &lt;9-200611140525" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030915" version="1" comment="bind-utils is &lt;9.2.3-76.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030916" version="1" comment="bind is &lt;9.2.3-76.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030917" version="1" comment="openssl-32bit is &lt;9-200609140529" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030918" version="1" comment="openssl-devel-32bit is &lt;9-200609140529" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030919" version="1" comment="openssl-devel is &lt;0.9.7d-15.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030920" version="1" comment="openssl is &lt;0.9.7d-15.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030921" version="1" comment="perl-Tk is &lt;800.024-429.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030922" version="1" comment="libgsf-32bit is &lt;9-200612081114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030923" version="1" comment="libgsf is &lt;1.11.1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030924" version="1" comment="gimp-devel is &lt;2.0.2-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030925" version="1" comment="gimp is &lt;2.0.2-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030926" version="1" comment="screen is &lt;4.0.2-41.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030927" version="1" comment="openldap2 is &lt;2.2.24-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030928" version="1" comment="gnutls-devel is &lt;1.0.8-26.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030929" version="1" comment="gnutls is &lt;1.0.8-26.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030930" version="1" comment="xine-lib-32bit is &lt;9-200611230135" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030931" version="1" comment="xine-lib is &lt;0.99.rc3a-106.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030932" version="1" comment="texinfo is &lt;4.6-61.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030933" version="1" comment="qt3-32bit is &lt;9-200610230741" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030934" version="1" comment="qt3-devel-32bit is &lt;9-200610230741" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030935" version="1" comment="qt3-devel-doc is &lt;3.3.1-36.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030936" version="1" comment="qt3-devel is &lt;3.3.1-36.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030937" version="1" comment="qt3-non-mt is &lt;3.3.1-41.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030938" version="1" comment="qt3 is &lt;3.3.1-36.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030939" version="1" comment="openssh-askpass is &lt;4.1p1-11.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030940" version="1" comment="openssh is &lt;4.1p1-11.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030941" version="1" comment="python-32bit is &lt;9-200610132325" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030942" version="1" comment="python-devel is &lt;2.3.3-88.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030943" version="1" comment="python is &lt;2.3.3-88.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030944" version="1" comment="pam_ldap-32bit is &lt;9-200610241503" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030945" version="1" comment="pam_ldap is &lt;169-28.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030946" version="1" comment="flash-player is &lt;7.0.69.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030947" version="1" comment="ImageMagick-devel is &lt;5.5.7-225.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030948" version="1" comment="ImageMagick is &lt;5.5.7-225.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030949" version="1" comment="ImageMagick-devel is &lt;5.5.7-225.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030950" version="1" comment="ImageMagick is &lt;5.5.7-225.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030951" version="1" comment="MozillaFirefox-translations is &lt;1.5.0.8-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030952" version="1" comment="MozillaFirefox is &lt;1.5.0.8-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030953" version="1" comment="ruby is &lt;1.8.1-42.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030954" version="1" comment="postgresql-contrib is &lt;7.4.13-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030955" version="1" comment="postgresql-devel is &lt;7.4.13-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030956" version="1" comment="postgresql-docs is &lt;7.4.13-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030957" version="1" comment="postgresql-libs-32bit is &lt;9-200611160118" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030958" version="1" comment="postgresql-libs is &lt;7.4.13-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030959" version="1" comment="postgresql-pl is &lt;7.4.13-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030960" version="1" comment="postgresql-server is &lt;7.4.13-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030961" version="1" comment="postgresql is &lt;7.4.13-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030962" version="1" comment="xsupplicant is &lt;1.2.8-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030963" version="1" comment="libapr0 is &lt;2.0.59-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030964" version="1" comment="apache2-devel is &lt;2.0.59-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030965" version="1" comment="apache2-prefork is &lt;2.0.59-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030966" version="1" comment="apache2-worker is &lt;2.0.59-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030967" version="1" comment="apache2 is &lt;2.0.59-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030968" version="1" comment="openldap2-client-32bit is &lt;9-200611171828" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030969" version="1" comment="openldap2-client is &lt;2.2.24-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030970" version="1" comment="openssh-askpass is &lt;4.1p1-11.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030971" version="1" comment="openssh is &lt;4.1p1-11.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030972" version="1" comment="acroread is &lt;7.0.9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030973" version="1" comment="gv is &lt;3.5.8-1129.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030974" version="1" comment="gv is &lt;3.5.8-1129.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030975" version="1" comment="OpenOffice_org-ar is &lt;1.1.5-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030976" version="1" comment="OpenOffice_org-ca is &lt;1.1.5-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030977" version="1" comment="OpenOffice_org-cs is &lt;1.1.5-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030978" version="1" comment="OpenOffice_org-da is &lt;1.1.5-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030979" version="1" comment="OpenOffice_org-de is &lt;1.1.5-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030980" version="1" comment="OpenOffice_org-el is &lt;1.1.5-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030981" version="1" comment="OpenOffice_org-en is &lt;1.1.5-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030982" version="1" comment="OpenOffice_org-es is &lt;1.1.5-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030983" version="1" comment="OpenOffice_org-et is &lt;1.1.5-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030984" version="1" comment="OpenOffice_org-fi is &lt;1.1.5-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030985" version="1" comment="OpenOffice_org-fr is &lt;1.1.5-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030986" version="1" comment="OpenOffice_org-gnome is &lt;1.1.5-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030987" version="1" comment="OpenOffice_org-hu is &lt;1.1.5-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030988" version="1" comment="OpenOffice_org-it is &lt;1.1.5-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030989" version="1" comment="OpenOffice_org-ja is &lt;1.1.5-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030990" version="1" comment="OpenOffice_org-kde is &lt;1.1.5-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030991" version="1" comment="OpenOffice_org-ko is &lt;1.1.5-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030992" version="1" comment="OpenOffice_org-nl is &lt;1.1.5-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030993" version="1" comment="OpenOffice_org-pl is &lt;1.1.5-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030994" version="1" comment="OpenOffice_org-pt-BR is &lt;1.1.5-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030995" version="1" comment="OpenOffice_org-pt is &lt;1.1.5-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030996" version="1" comment="OpenOffice_org-ru is &lt;1.1.5-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030997" version="1" comment="OpenOffice_org-sk is &lt;1.1.5-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030998" version="1" comment="OpenOffice_org-sl is &lt;1.1.5-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030999" version="1" comment="OpenOffice_org-sv is &lt;1.1.5-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031000" version="1" comment="OpenOffice_org-tr is &lt;1.1.5-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031001" version="1" comment="OpenOffice_org-zh-CN is &lt;1.1.5-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031002" version="1" comment="OpenOffice_org-zh-TW is &lt;1.1.5-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031003" version="1" comment="OpenOffice_org is &lt;1.1.5-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031004" version="1" comment="libredcarpet-python is &lt;2.4.9-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031005" version="1" comment="libredcarpet-tools is &lt;2.4.9-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031006" version="1" comment="libredcarpet is &lt;2.4.9-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031007" version="1" comment="python-openssl is &lt;0.6-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031008" version="1" comment="rcd-devel is &lt;2.4.9-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031009" version="1" comment="rcd-modules-devel is &lt;2.4.9-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031010" version="1" comment="rcd-modules is &lt;2.4.9-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031011" version="1" comment="rcd is &lt;2.4.9-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031012" version="1" comment="red-carpet is &lt;2.4.9-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031013" version="1" comment="rug is &lt;2.4.9-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031014" version="1" comment="xmlrpc-c-devel is &lt;0.9.10-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031015" version="1" comment="xmlrpc-c is &lt;0.9.10-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031016" version="1" comment="libsoup-32bit is &lt;9-200701182000" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031017" version="1" comment="libsoup-devel-32bit is &lt;9-200701182000" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031018" version="1" comment="libsoup-devel is &lt;2.2.3-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031019" version="1" comment="libsoup is &lt;2.2.3-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031020" version="1" comment="rcd-devel is &lt;2.4.9-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031021" version="1" comment="rcd is &lt;2.4.9-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031022" version="1" comment="MozillaFirefox-translations is &lt;1.5.0.10-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031023" version="1" comment="MozillaFirefox is &lt;1.5.0.10-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031024" version="1" comment="mozilla-cs is &lt;1.8_seamonkey_1.0.4-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031025" version="1" comment="mozilla-deat is &lt;1.8_seamonkey_1.0.4-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031026" version="1" comment="mozilla-devel is &lt;1.8_seamonkey_1.0.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031027" version="1" comment="mozilla-dom-inspector is &lt;1.8_seamonkey_1.0.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031028" version="1" comment="mozilla-hu is &lt;1.80_seamonkey_1.0.4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031029" version="1" comment="mozilla-irc is &lt;1.8_seamonkey_1.0.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031030" version="1" comment="mozilla-lib64 is &lt;1.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031031" version="1" comment="mozilla-mail is &lt;1.8_seamonkey_1.0.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031032" version="1" comment="mozilla-venkman is &lt;1.8_seamonkey_1.0.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031033" version="1" comment="mozilla is &lt;1.8_seamonkey_1.0.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031034" version="1" comment="tar is &lt;1.13.25-325.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031035" version="1" comment="XFree86-server is &lt;4.3.99.902-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031036" version="1" comment="gpg is &lt;1.2.4-68.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031037" version="1" comment="gpg2 is &lt;1.9.10-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031038" version="1" comment="kdegraphics3 is &lt;3.2.1-67.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031039" version="1" comment="ruby is &lt;1.8.1-42.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031040" version="1" comment="MozillaFirefox-translations is &lt;1.5.0.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031041" version="1" comment="MozillaFirefox is &lt;1.5.0.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031042" version="1" comment="java2-jre is &lt;1.4.2-129.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031043" version="1" comment="java2 is &lt;1.4.2-129.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031044" version="1" comment="w3m is &lt;0.4.1_m17n_20030308-201.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031045" version="1" comment="pcre-32bit is &lt;9-200711150229" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031046" version="1" comment="pcre-devel is &lt;4.4-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031047" version="1" comment="pcre is &lt;4.4-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031048" version="1" comment="mod_php4-core is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031049" version="1" comment="php4-bcmath is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031050" version="1" comment="php4-bz2 is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031051" version="1" comment="php4-calendar is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031052" version="1" comment="php4-ctype is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031053" version="1" comment="php4-curl is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031054" version="1" comment="php4-dba is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031055" version="1" comment="php4-dbase is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031056" version="1" comment="php4-devel is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031057" version="1" comment="php4-domxml is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031058" version="1" comment="php4-exif is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031059" version="1" comment="php4-fastcgi is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031060" version="1" comment="php4-filepro is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031061" version="1" comment="php4-ftp is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031062" version="1" comment="php4-gd is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031063" version="1" comment="php4-gettext is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031064" version="1" comment="php4-gmp is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031065" version="1" comment="php4-iconv is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031066" version="1" comment="php4-imap is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031067" version="1" comment="php4-ldap is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031068" version="1" comment="php4-mbstring is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031069" version="1" comment="php4-mcal is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031070" version="1" comment="php4-mcrypt is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031071" version="1" comment="php4-mhash is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031072" version="1" comment="php4-mime_magic is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031073" version="1" comment="php4-mysql is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031074" version="1" comment="php4-pear is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031075" version="1" comment="php4-pgsql is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031076" version="1" comment="php4-qtdom is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031077" version="1" comment="php4-readline is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031078" version="1" comment="php4-recode is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031079" version="1" comment="php4-servlet is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031080" version="1" comment="php4-session is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031081" version="1" comment="php4-shmop is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031082" version="1" comment="php4-snmp is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031083" version="1" comment="php4-sockets is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031084" version="1" comment="php4-swf is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031085" version="1" comment="php4-sysvsem is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031086" version="1" comment="php4-sysvshm is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031087" version="1" comment="php4-unixODBC is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031088" version="1" comment="php4-wddx is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031089" version="1" comment="php4-xslt is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031090" version="1" comment="php4-yp is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031091" version="1" comment="php4-zlib is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031092" version="1" comment="php4 is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031093" version="1" comment="libapr0 is &lt;2.0.59-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031094" version="1" comment="apache2-devel is &lt;2.0.59-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031095" version="1" comment="apache2-prefork is &lt;2.0.59-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031096" version="1" comment="apache2-worker is &lt;2.0.59-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031097" version="1" comment="apache2 is &lt;2.0.59-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031098" version="1" comment="pcre-32bit is &lt;9-200711270035" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031099" version="1" comment="pcre-devel is &lt;4.4-109.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031100" version="1" comment="pcre is &lt;4.4-109.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031101" version="1" comment="pcre-32bit is &lt;9-200711192343" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031102" version="1" comment="pcre-devel is &lt;4.4-109.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031103" version="1" comment="pcre is &lt;4.4-109.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031104" version="1" comment="mysql-Max is &lt;4.0.18-32.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031105" version="1" comment="mysql-bench is &lt;4.0.18-32.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031106" version="1" comment="mysql-client is &lt;4.0.18-32.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031107" version="1" comment="mysql-devel is &lt;4.0.18-32.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031108" version="1" comment="mysql-shared is &lt;4.0.18-32.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031109" version="1" comment="mysql is &lt;4.0.18-32.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031110" version="1" comment="lynx is &lt;2.8.5-30.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031111" version="1" comment="OpenOffice_org-ar is &lt;1.1.5-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031112" version="1" comment="OpenOffice_org-ca is &lt;1.1.5-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031113" version="1" comment="OpenOffice_org-cs is &lt;1.1.5-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031114" version="1" comment="OpenOffice_org-da is &lt;1.1.5-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031115" version="1" comment="OpenOffice_org-de is &lt;1.1.5-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031116" version="1" comment="OpenOffice_org-el is &lt;1.1.5-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031117" version="1" comment="OpenOffice_org-en is &lt;1.1.5-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031118" version="1" comment="OpenOffice_org-es is &lt;1.1.5-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031119" version="1" comment="OpenOffice_org-et is &lt;1.1.5-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031120" version="1" comment="OpenOffice_org-fi is &lt;1.1.5-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031121" version="1" comment="OpenOffice_org-fr is &lt;1.1.5-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031122" version="1" comment="OpenOffice_org-gnome is &lt;1.1.5-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031123" version="1" comment="OpenOffice_org-hu is &lt;1.1.5-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031124" version="1" comment="OpenOffice_org-it is &lt;1.1.5-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031125" version="1" comment="OpenOffice_org-ja is &lt;1.1.5-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031126" version="1" comment="OpenOffice_org-kde is &lt;1.1.5-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031127" version="1" comment="OpenOffice_org-ko is &lt;1.1.5-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031128" version="1" comment="OpenOffice_org-nl is &lt;1.1.5-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031129" version="1" comment="OpenOffice_org-pl is &lt;1.1.5-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031130" version="1" comment="OpenOffice_org-pt-BR is &lt;1.1.5-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031131" version="1" comment="OpenOffice_org-pt is &lt;1.1.5-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031132" version="1" comment="OpenOffice_org-ru is &lt;1.1.5-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031133" version="1" comment="OpenOffice_org-sk is &lt;1.1.5-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031134" version="1" comment="OpenOffice_org-sl is &lt;1.1.5-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031135" version="1" comment="OpenOffice_org-sv is &lt;1.1.5-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031136" version="1" comment="OpenOffice_org-tr is &lt;1.1.5-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031137" version="1" comment="OpenOffice_org-zh-CN is &lt;1.1.5-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031138" version="1" comment="OpenOffice_org-zh-TW is &lt;1.1.5-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031139" version="1" comment="OpenOffice_org is &lt;1.1.5-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031140" version="1" comment="gtk2-32bit is &lt;9-200701182000" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031141" version="1" comment="gtk2-devel is &lt;2.4.14-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031142" version="1" comment="gtk2-doc is &lt;2.4.14-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031143" version="1" comment="gtk2 is &lt;2.4.14-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031144" version="1" comment="xine-lib-32bit is &lt;9-200701161730" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031145" version="1" comment="xine-lib is &lt;0.99.rc3a-106.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031146" version="1" comment="dhcp-client is &lt;3.0.1rc13-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031147" version="1" comment="dhcp-devel is &lt;3.0.1rc13-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031148" version="1" comment="dhcp-server is &lt;3.0.1rc13-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031149" version="1" comment="dhcp is &lt;3.0.1rc13-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031150" version="1" comment="flash-player is &lt;9.0.124.0-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031151" version="1" comment="cups-client is &lt;1.1.20-108.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031152" version="1" comment="cups-devel is &lt;1.1.20-108.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031153" version="1" comment="cups-libs-32bit is &lt;9-200701262020" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031154" version="1" comment="cups-libs is &lt;1.1.20-108.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031155" version="1" comment="cups is &lt;1.1.20-108.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031156" version="1" comment="libgtop-devel is &lt;2.5.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031157" version="1" comment="libgtop is &lt;2.5.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031158" version="1" comment="zope is &lt;2.7.7-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031159" version="1" comment="qt3-32bit is &lt;9-200704031835" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031160" version="1" comment="qt3-devel-32bit is &lt;9-200704031835" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031161" version="1" comment="qt3-devel is &lt;3.3.1-36.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031162" version="1" comment="qt3-non-mt is &lt;3.3.1-41.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031163" version="1" comment="qt3 is &lt;3.3.1-36.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031164" version="1" comment="java2-jre is &lt;1.4.2-129.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031165" version="1" comment="java2 is &lt;1.4.2-129.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031166" version="1" comment="OpenOffice_org-ar is &lt;1.1.5-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031167" version="1" comment="OpenOffice_org-ca is &lt;1.1.5-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031168" version="1" comment="OpenOffice_org-cs is &lt;1.1.5-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031169" version="1" comment="OpenOffice_org-da is &lt;1.1.5-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031170" version="1" comment="OpenOffice_org-de is &lt;1.1.5-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031171" version="1" comment="OpenOffice_org-el is &lt;1.1.5-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031172" version="1" comment="OpenOffice_org-en is &lt;1.1.5-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031173" version="1" comment="OpenOffice_org-es is &lt;1.1.5-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031174" version="1" comment="OpenOffice_org-et is &lt;1.1.5-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031175" version="1" comment="OpenOffice_org-fi is &lt;1.1.5-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031176" version="1" comment="OpenOffice_org-fr is &lt;1.1.5-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031177" version="1" comment="OpenOffice_org-gnome is &lt;1.1.5-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031178" version="1" comment="OpenOffice_org-hu is &lt;1.1.5-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031179" version="1" comment="OpenOffice_org-it is &lt;1.1.5-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031180" version="1" comment="OpenOffice_org-ja is &lt;1.1.5-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031181" version="1" comment="OpenOffice_org-kde is &lt;1.1.5-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031182" version="1" comment="OpenOffice_org-ko is &lt;1.1.5-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031183" version="1" comment="OpenOffice_org-nl is &lt;1.1.5-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031184" version="1" comment="OpenOffice_org-pl is &lt;1.1.5-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031185" version="1" comment="OpenOffice_org-pt-BR is &lt;1.1.5-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031186" version="1" comment="OpenOffice_org-pt is &lt;1.1.5-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031187" version="1" comment="OpenOffice_org-ru is &lt;1.1.5-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031188" version="1" comment="OpenOffice_org-sk is &lt;1.1.5-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031189" version="1" comment="OpenOffice_org-sl is &lt;1.1.5-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031190" version="1" comment="OpenOffice_org-sv is &lt;1.1.5-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031191" version="1" comment="OpenOffice_org-tr is &lt;1.1.5-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031192" version="1" comment="OpenOffice_org-zh-CN is &lt;1.1.5-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031193" version="1" comment="OpenOffice_org-zh-TW is &lt;1.1.5-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031194" version="1" comment="OpenOffice_org is &lt;1.1.5-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031195" version="1" comment="samba is &lt;3.0.20b-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031196" version="1" comment="kdelibs3-32bit is &lt;9-200704031835" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031197" version="1" comment="kdelibs3-devel is &lt;3.2.1-44.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031198" version="1" comment="kdelibs3 is &lt;3.2.1-44.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031199" version="1" comment="postgresql-contrib is &lt;7.4.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031200" version="1" comment="postgresql-devel is &lt;7.4.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031201" version="1" comment="postgresql-docs is &lt;7.4.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031202" version="1" comment="postgresql-libs-32bit is &lt;9-200704271846" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031203" version="1" comment="postgresql-libs is &lt;7.4.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031204" version="1" comment="postgresql-pl is &lt;7.4.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031205" version="1" comment="postgresql-server is &lt;7.4.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031206" version="1" comment="postgresql is &lt;7.4.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031207" version="1" comment="xmms-32bit is &lt;9-200704052143" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031208" version="1" comment="xmms is &lt;1.2.10-44.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031209" version="1" comment="cups-client is &lt;1.1.20-108.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031210" version="1" comment="cups-devel is &lt;1.1.20-108.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031211" version="1" comment="cups-libs-32bit is &lt;9-200704210224" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031212" version="1" comment="cups-libs is &lt;1.1.20-108.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031213" version="1" comment="cups is &lt;1.1.20-108.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031214" version="1" comment="cups-client is &lt;1.1.20-108.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031215" version="1" comment="cups-devel is &lt;1.1.20-108.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031216" version="1" comment="cups-libs-32bit is &lt;9-200706090005" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031217" version="1" comment="cups-libs is &lt;1.1.20-108.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031218" version="1" comment="cups is &lt;1.1.20-108.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031219" version="1" comment="unrar is &lt;3.3.6-28.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031220" version="1" comment="XFree86-Xnest is &lt;4.3.99.902-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031221" version="1" comment="XFree86-Xprt is &lt;4.3.99.902-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031222" version="1" comment="XFree86-Xvfb is &lt;4.3.99.902-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031223" version="1" comment="XFree86-Xvnc is &lt;4.3.99.902-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031224" version="1" comment="XFree86-libs-32bit is &lt;9-200704052143" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031225" version="1" comment="XFree86-libs is &lt;4.3.99.902-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031226" version="1" comment="XFree86-server is &lt;4.3.99.902-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031227" version="1" comment="gnomemeeting is &lt;1.0.1-11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031228" version="1" comment="xine-lib-32bit is &lt;9-200703221214" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031229" version="1" comment="xine-lib is &lt;0.99.rc3a-106.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031230" version="1" comment="gpg is &lt;1.2.4-68.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031231" version="1" comment="freetype2-32bit is &lt;9-200704052143" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031232" version="1" comment="freetype2-devel-32bit is &lt;9-200704052143" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031233" version="1" comment="freetype2-devel is &lt;2.1.7-53.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031234" version="1" comment="freetype2 is &lt;2.1.7-53.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031235" version="1" comment="mozilla-cs is &lt;1.8_seamonkey_1.0.4-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031236" version="1" comment="mozilla-deat is &lt;1.8_seamonkey_1.0.4-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031237" version="1" comment="mozilla-devel is &lt;1.8_seamonkey_1.0.9-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031238" version="1" comment="mozilla-dom-inspector is &lt;1.8_seamonkey_1.0.9-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031239" version="1" comment="mozilla-hu is &lt;1.80_seamonkey_1.0.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031240" version="1" comment="mozilla-irc is &lt;1.8_seamonkey_1.0.9-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031241" version="1" comment="mozilla-lib64 is &lt;1.6-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031242" version="1" comment="mozilla-mail is &lt;1.8_seamonkey_1.0.9-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031243" version="1" comment="mozilla-venkman is &lt;1.8_seamonkey_1.0.9-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031244" version="1" comment="mozilla is &lt;1.8_seamonkey_1.0.9-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031245" version="1" comment="MozillaFirefox-translations is &lt;1.5.0.12-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031246" version="1" comment="MozillaFirefox is &lt;1.5.0.12-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031247" version="1" comment="file-32bit is &lt;9-200703261521" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031248" version="1" comment="file is &lt;4.09-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031249" version="1" comment="ImageMagick-devel is &lt;5.5.7-225.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031250" version="1" comment="ImageMagick is &lt;5.5.7-225.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031251" version="1" comment="ipsec-tools is &lt;0.3.3-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031252" version="1" comment="jakarta-tomcat is &lt;5.0.19-29.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031253" version="1" comment="xscreensaver is &lt;4.16-2.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031254" version="1" comment="flash-player is &lt;7.0.70.0-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031255" version="1" comment="kdebase3-32bit is &lt;9-200705221253" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031256" version="1" comment="kdebase3 is &lt;3.2.1-68.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031257" version="1" comment="python-32bit is &lt;9-200705260110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031258" version="1" comment="python-devel is &lt;2.3.3-88.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031259" version="1" comment="python is &lt;2.3.3-88.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031260" version="1" comment="gimp is &lt;2.0.2-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031261" version="1" comment="libpng-32bit is &lt;9-200705260110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031262" version="1" comment="libpng-devel is &lt;1.2.5-182.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031263" version="1" comment="libpng is &lt;1.2.5-182.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031264" version="1" comment="libsmbclient-32bit is &lt;9-200705181249" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031265" version="1" comment="libsmbclient-devel is &lt;3.0.20b-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031266" version="1" comment="libsmbclient is &lt;3.0.20b-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031267" version="1" comment="samba-client is &lt;3.0.20b-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031268" version="1" comment="samba-doc is &lt;3.0.20b-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031269" version="1" comment="samba-pdb is &lt;3.0.20b-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031270" version="1" comment="samba-python is &lt;3.0.20b-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031271" version="1" comment="samba-vscan is &lt;0.3.6b-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031272" version="1" comment="samba-winbind is &lt;3.0.20b-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031273" version="1" comment="samba is &lt;3.0.20b-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031274" version="1" comment="ldapsmb is &lt;1.33-6.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031275" version="1" comment="libsmbclient-32bit is &lt;9-200706251737" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031276" version="1" comment="libsmbclient-devel is &lt;3.0.20b-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031277" version="1" comment="libsmbclient is &lt;3.0.20b-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031278" version="1" comment="samba-client is &lt;3.0.20b-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031279" version="1" comment="samba-doc is &lt;3.0.20b-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031280" version="1" comment="samba-pdb is &lt;3.0.20b-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031281" version="1" comment="samba-python is &lt;3.0.20b-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031282" version="1" comment="samba-vscan is &lt;0.3.6b-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031283" version="1" comment="samba-winbind is &lt;3.0.20b-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031284" version="1" comment="samba is &lt;3.0.20b-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031285" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.287.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031286" version="1" comment="kernel-default is &lt;2.6.5-7.287.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031287" version="1" comment="kernel-smp is &lt;2.6.5-7.287.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031288" version="1" comment="kernel-source is &lt;2.6.5-7.287.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031289" version="1" comment="kernel-syms is &lt;2.6.5-7.287.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031290" version="1" comment="mysql-Max is &lt;4.0.18-32.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031291" version="1" comment="mysql-bench is &lt;4.0.18-32.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031292" version="1" comment="mysql-client is &lt;4.0.18-32.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031293" version="1" comment="mysql-devel is &lt;4.0.18-32.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031294" version="1" comment="mysql-shared is &lt;4.0.18-32.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031295" version="1" comment="mysql is &lt;4.0.18-32.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031296" version="1" comment="libexif-32bit is &lt;9-200706190007" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031297" version="1" comment="libexif is &lt;0.5.12-118.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031298" version="1" comment="xfsdump is &lt;2.2.25-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031299" version="1" comment="liblcms-32bit is &lt;9-200711060115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031300" version="1" comment="liblcms-devel is &lt;1.12-55.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031301" version="1" comment="liblcms is &lt;1.12-55.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031302" version="1" comment="freetype2-32bit is &lt;9-200706182342" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031303" version="1" comment="freetype2-devel-32bit is &lt;9-200706182342" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031304" version="1" comment="freetype2-devel is &lt;2.1.7-53.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031305" version="1" comment="freetype2 is &lt;2.1.7-53.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031306" version="1" comment="OpenOffice_org-ar is &lt;1.1.5-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031307" version="1" comment="OpenOffice_org-ca is &lt;1.1.5-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031308" version="1" comment="OpenOffice_org-cs is &lt;1.1.5-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031309" version="1" comment="OpenOffice_org-da is &lt;1.1.5-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031310" version="1" comment="OpenOffice_org-de is &lt;1.1.5-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031311" version="1" comment="OpenOffice_org-el is &lt;1.1.5-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031312" version="1" comment="OpenOffice_org-en-help is &lt;1.1.5-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031313" version="1" comment="OpenOffice_org-en is &lt;1.1.5-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031314" version="1" comment="OpenOffice_org-es is &lt;1.1.5-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031315" version="1" comment="OpenOffice_org-et is &lt;1.1.5-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031316" version="1" comment="OpenOffice_org-fi is &lt;1.1.5-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031317" version="1" comment="OpenOffice_org-fr is &lt;1.1.5-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031318" version="1" comment="OpenOffice_org-gnome is &lt;1.1.5-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031319" version="1" comment="OpenOffice_org-hu is &lt;1.1.5-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031320" version="1" comment="OpenOffice_org-it is &lt;1.1.5-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031321" version="1" comment="OpenOffice_org-ja is &lt;1.1.5-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031322" version="1" comment="OpenOffice_org-kde is &lt;1.1.5-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031323" version="1" comment="OpenOffice_org-ko is &lt;1.1.5-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031324" version="1" comment="OpenOffice_org-nl is &lt;1.1.5-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031325" version="1" comment="OpenOffice_org-pl is &lt;1.1.5-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031326" version="1" comment="OpenOffice_org-pt-BR is &lt;1.1.5-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031327" version="1" comment="OpenOffice_org-pt is &lt;1.1.5-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031328" version="1" comment="OpenOffice_org-ru is &lt;1.1.5-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031329" version="1" comment="OpenOffice_org-sk is &lt;1.1.5-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031330" version="1" comment="OpenOffice_org-sl is &lt;1.1.5-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031331" version="1" comment="OpenOffice_org-sv is &lt;1.1.5-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031332" version="1" comment="OpenOffice_org-tr is &lt;1.1.5-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031333" version="1" comment="OpenOffice_org-zh-CN is &lt;1.1.5-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031334" version="1" comment="OpenOffice_org-zh-TW is &lt;1.1.5-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031335" version="1" comment="OpenOffice_org is &lt;1.1.5-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031336" version="1" comment="bind-devel is &lt;9.2.3-76.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031337" version="1" comment="bind-utils-32bit is &lt;9-200707301447" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031338" version="1" comment="bind-utils is &lt;9.2.3-76.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031339" version="1" comment="bind is &lt;9.2.3-76.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031340" version="1" comment="gimp-devel is &lt;2.0.2-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031341" version="1" comment="gimp is &lt;2.0.2-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031342" version="1" comment="gvim is &lt;6.2-235.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031343" version="1" comment="MozillaFirefox-translations is &lt;1.5.0.12-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031344" version="1" comment="MozillaFirefox is &lt;1.5.0.12-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031345" version="1" comment="mozilla-cs is &lt;1.8_seamonkey_1.0.4-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031346" version="1" comment="mozilla-deat is &lt;1.8_seamonkey_1.0.4-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031347" version="1" comment="mozilla-devel is &lt;1.8_seamonkey_1.0.9-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031348" version="1" comment="mozilla-dom-inspector is &lt;1.8_seamonkey_1.0.9-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031349" version="1" comment="mozilla-hu is &lt;1.80_seamonkey_1.0.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031350" version="1" comment="mozilla-irc is &lt;1.8_seamonkey_1.0.9-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031351" version="1" comment="mozilla-lib64 is &lt;1.6-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031352" version="1" comment="mozilla-mail is &lt;1.8_seamonkey_1.0.9-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031353" version="1" comment="mozilla-venkman is &lt;1.8_seamonkey_1.0.9-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031354" version="1" comment="mozilla is &lt;1.8_seamonkey_1.0.9-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031355" version="1" comment="libvorbis-32bit is &lt;9-200707091633" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031356" version="1" comment="libvorbis-devel is &lt;1.0.1-56.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031357" version="1" comment="libvorbis is &lt;1.0.1-56.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031358" version="1" comment="evolution-devel is &lt;2.0.4-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031359" version="1" comment="evolution-pilot is &lt;2.0.4-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031360" version="1" comment="evolution is &lt;2.0.4-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031361" version="1" comment="evolution-devel is &lt;2.0.4-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031362" version="1" comment="evolution-pilot is &lt;2.0.4-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031363" version="1" comment="evolution is &lt;2.0.4-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031364" version="1" comment="perl-Net-DNS is &lt;0.46-27.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031365" version="1" comment="cups-client is &lt;1.1.20-108.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031366" version="1" comment="cups-devel is &lt;1.1.20-108.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031367" version="1" comment="cups-libs-32bit is &lt;9-200708071552" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031368" version="1" comment="cups-libs is &lt;1.1.20-108.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031369" version="1" comment="cups is &lt;1.1.20-108.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031370" version="1" comment="qt3-32bit is &lt;9-200707170221" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031371" version="1" comment="qt3-devel-32bit is &lt;9-200707170221" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031372" version="1" comment="qt3-devel is &lt;3.3.1-36.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031373" version="1" comment="qt3-non-mt is &lt;3.3.1-41.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031374" version="1" comment="qt3 is &lt;3.3.1-36.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031375" version="1" comment="ethereal is &lt;0.10.13-2.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031376" version="1" comment="tcpdump is &lt;3.8.1-49.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031377" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.311" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031378" version="1" comment="kernel-default is &lt;2.6.5-7.311" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031379" version="1" comment="kernel-smp is &lt;2.6.5-7.311" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031380" version="1" comment="kernel-source is &lt;2.6.5-7.311" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031381" version="1" comment="kernel-syms is &lt;2.6.5-7.311" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031382" version="1" comment="libvorbis-32bit is &lt;9-200710221440" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031383" version="1" comment="libvorbis-devel is &lt;1.0.1-56.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031384" version="1" comment="libvorbis is &lt;1.0.1-56.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031385" version="1" comment="t1lib-devel is &lt;1.3.1-569.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031386" version="1" comment="t1lib is &lt;1.3.1-569.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031387" version="1" comment="rsync is &lt;2.6.2-8.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031388" version="1" comment="qt3-32bit is &lt;9-200709191359" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031389" version="1" comment="qt3-devel-32bit is &lt;9-200709191359" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031390" version="1" comment="qt3-devel-doc is &lt;3.3.1-36.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031391" version="1" comment="qt3-devel-tools is &lt;3.3.1-35.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031392" version="1" comment="qt3-devel is &lt;3.3.1-36.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031393" version="1" comment="qt3-non-mt is &lt;3.3.1-41.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031394" version="1" comment="qt3 is &lt;3.3.1-36.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031395" version="1" comment="kdelibs3-32bit is &lt;9-200709251619" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031396" version="1" comment="kdelibs3-devel-doc is &lt;3.2.1-44.71.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031397" version="1" comment="kdelibs3-devel is &lt;3.2.1-44.71.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031398" version="1" comment="kdelibs3 is &lt;3.2.1-44.71.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031399" version="1" comment="flash-player is &lt;9.0.48.0-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031400" version="1" comment="flash-player is &lt;9.0.115.0-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031401" version="1" comment="flash-player is &lt;9.0.151.0-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031402" version="1" comment="cups-client is &lt;1.1.20-108.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031403" version="1" comment="cups-devel is &lt;1.1.20-108.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031404" version="1" comment="cups-libs-32bit is &lt;9-200711080439" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031405" version="1" comment="cups-libs is &lt;1.1.20-108.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031406" version="1" comment="cups is &lt;1.1.20-108.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031407" version="1" comment="findutils-locate is &lt;4.1.7-860.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031408" version="1" comment="id3lib-devel is &lt;3.8.3-86.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031409" version="1" comment="id3lib-examples is &lt;3.8.3-86.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031410" version="1" comment="id3lib is &lt;3.8.3-86.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031411" version="1" comment="cpio is &lt;2.5-324.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031412" version="1" comment="fetchmail is &lt;6.2.5-49.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031413" version="1" comment="fetchmailconf is &lt;6.2.5-49.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031414" version="1" comment="ldapsmb is &lt;1.33-6.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031415" version="1" comment="libsmbclient-32bit is &lt;9-200711231829" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031416" version="1" comment="libsmbclient-devel is &lt;3.0.20b-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031417" version="1" comment="libsmbclient is &lt;3.0.20b-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031418" version="1" comment="samba-32bit is &lt;9-200711231829" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031419" version="1" comment="samba-client-32bit is &lt;9-200711231829" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031420" version="1" comment="samba-client is &lt;3.0.20b-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031421" version="1" comment="samba-doc is &lt;3.0.20b-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031422" version="1" comment="samba-pdb is &lt;3.0.20b-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031423" version="1" comment="samba-python is &lt;3.0.20b-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031424" version="1" comment="samba-vscan is &lt;0.3.6b-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031425" version="1" comment="samba-winbind-32bit is &lt;9-200711231829" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031426" version="1" comment="samba-winbind is &lt;3.0.20b-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031427" version="1" comment="samba is &lt;3.0.20b-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031428" version="1" comment="flac-32bit is &lt;9-200710182357" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031429" version="1" comment="flac-devel is &lt;1.1.0-387.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031430" version="1" comment="flac is &lt;1.1.0-387.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031431" version="1" comment="openssh-askpass is &lt;4.1p1-11.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031432" version="1" comment="openssh is &lt;4.1p1-11.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031433" version="1" comment="postgresql-contrib is &lt;7.4.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031434" version="1" comment="postgresql-devel is &lt;7.4.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031435" version="1" comment="postgresql-docs is &lt;7.4.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031436" version="1" comment="postgresql-libs-32bit is &lt;9-200801312100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031437" version="1" comment="postgresql-libs is &lt;7.4.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031438" version="1" comment="postgresql-pl is &lt;7.4.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031439" version="1" comment="postgresql-server is &lt;7.4.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031440" version="1" comment="postgresql is &lt;7.4.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031441" version="1" comment="icu-data is &lt;2.6.2-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031442" version="1" comment="icu-i18ndata is &lt;2.6.2-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031443" version="1" comment="icu is &lt;2.6.2-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031444" version="1" comment="libicu-devel is &lt;2.6.2-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031445" version="1" comment="libicu26-32bit is &lt;9-200802280045" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031446" version="1" comment="libicu26 is &lt;2.6.2-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031447" version="1" comment="OpenOffice_org-ar is &lt;1.1.5-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031448" version="1" comment="OpenOffice_org-ca is &lt;1.1.5-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031449" version="1" comment="OpenOffice_org-cs is &lt;1.1.5-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031450" version="1" comment="OpenOffice_org-da is &lt;1.1.5-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031451" version="1" comment="OpenOffice_org-de is &lt;1.1.5-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031452" version="1" comment="OpenOffice_org-el is &lt;1.1.5-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031453" version="1" comment="OpenOffice_org-en-help is &lt;1.1.5-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031454" version="1" comment="OpenOffice_org-en is &lt;1.1.5-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031455" version="1" comment="OpenOffice_org-es is &lt;1.1.5-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031456" version="1" comment="OpenOffice_org-et is &lt;1.1.5-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031457" version="1" comment="OpenOffice_org-fi is &lt;1.1.5-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031458" version="1" comment="OpenOffice_org-fr is &lt;1.1.5-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031459" version="1" comment="OpenOffice_org-gnome is &lt;1.1.5-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031460" version="1" comment="OpenOffice_org-hu is &lt;1.1.5-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031461" version="1" comment="OpenOffice_org-it is &lt;1.1.5-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031462" version="1" comment="OpenOffice_org-ja is &lt;1.1.5-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031463" version="1" comment="OpenOffice_org-kde is &lt;1.1.5-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031464" version="1" comment="OpenOffice_org-ko is &lt;1.1.5-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031465" version="1" comment="OpenOffice_org-nl is &lt;1.1.5-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031466" version="1" comment="OpenOffice_org-pl is &lt;1.1.5-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031467" version="1" comment="OpenOffice_org-pt-BR is &lt;1.1.5-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031468" version="1" comment="OpenOffice_org-pt is &lt;1.1.5-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031469" version="1" comment="OpenOffice_org-ru is &lt;1.1.5-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031470" version="1" comment="OpenOffice_org-sk is &lt;1.1.5-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031471" version="1" comment="OpenOffice_org-sl is &lt;1.1.5-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031472" version="1" comment="OpenOffice_org-sv is &lt;1.1.5-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031473" version="1" comment="OpenOffice_org-tr is &lt;1.1.5-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031474" version="1" comment="OpenOffice_org-zh-CN is &lt;1.1.5-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031475" version="1" comment="OpenOffice_org-zh-TW is &lt;1.1.5-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031476" version="1" comment="OpenOffice_org is &lt;1.1.5-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031477" version="1" comment="mozilla-cs is &lt;1.8_seamonkey_1.0.4-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031478" version="1" comment="mozilla-deat is &lt;1.8_seamonkey_1.0.4-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031479" version="1" comment="mozilla-devel is &lt;1.8_seamonkey_1.0.9-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031480" version="1" comment="mozilla-dom-inspector is &lt;1.8_seamonkey_1.0.9-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031481" version="1" comment="mozilla-hu is &lt;1.80_seamonkey_1.0.4-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031482" version="1" comment="mozilla-irc is &lt;1.8_seamonkey_1.0.9-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031483" version="1" comment="mozilla-lib64 is &lt;1.8_seamonkey_1.0.9-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031484" version="1" comment="mozilla-mail is &lt;1.8_seamonkey_1.0.9-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031485" version="1" comment="mozilla-venkman is &lt;1.8_seamonkey_1.0.9-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031486" version="1" comment="mozilla is &lt;1.8_seamonkey_1.0.9-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031487" version="1" comment="MozillaFirefox-translations is &lt;1.5.0.12-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031488" version="1" comment="MozillaFirefox is &lt;1.5.0.12-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031489" version="1" comment="python-32bit is &lt;9-200801101709" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031490" version="1" comment="python-curses is &lt;2.3.3-88.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031491" version="1" comment="python-demo is &lt;2.3.3-88.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031492" version="1" comment="python-devel is &lt;2.3.3-88.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031493" version="1" comment="python-doc-pdf is &lt;2.3.3-88.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031494" version="1" comment="python-doc is &lt;2.3.3-88.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031495" version="1" comment="python-gdbm is &lt;2.3.3-88.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031496" version="1" comment="python-idle is &lt;2.3.3-88.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031497" version="1" comment="python-mpz is &lt;2.3.3-88.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031498" version="1" comment="python-tk is &lt;2.3.3-88.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031499" version="1" comment="python-xml is &lt;2.3.3-88.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031500" version="1" comment="python is &lt;2.3.3-88.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031501" version="1" comment="ImageMagick-devel is &lt;5.5.7-225.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031502" version="1" comment="ImageMagick is &lt;5.5.7-225.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031503" version="1" comment="libapr0 is &lt;2.0.59-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031504" version="1" comment="apache2-devel is &lt;2.0.59-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031505" version="1" comment="apache2-prefork is &lt;2.0.59-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031506" version="1" comment="apache2-worker is &lt;2.0.59-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031507" version="1" comment="apache2 is &lt;2.0.59-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031508" version="1" comment="perl-32bit is &lt;9-200711080056" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031509" version="1" comment="perl is &lt;5.8.3-32.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031510" version="1" comment="openssl-32bit is &lt;9-200710031457" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031511" version="1" comment="openssl-devel-32bit is &lt;9-200710031457" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031512" version="1" comment="openssl-devel is &lt;0.9.7d-15.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031513" version="1" comment="openssl-doc is &lt;0.9.7d-15.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031514" version="1" comment="openssl is &lt;0.9.7d-15.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031515" version="1" comment="tk-32bit is &lt;9-200710031447" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031516" version="1" comment="tk-devel is &lt;8.4.6-41.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031517" version="1" comment="tk is &lt;8.4.6-41.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031518" version="1" comment="java2-jre is &lt;1.4.2-129.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031519" version="1" comment="java2 is &lt;1.4.2-129.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031520" version="1" comment="libpng-32bit is &lt;9-200711060115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031521" version="1" comment="libpng-devel is &lt;1.2.5-182.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031522" version="1" comment="libpng is &lt;1.2.5-182.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031523" version="1" comment="RealPlayer is &lt;10.0.9-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031524" version="1" comment="e2fsprogs-32bit is &lt;9-200711231622" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031525" version="1" comment="e2fsprogs-devel-32bit is &lt;9-200711231622" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031526" version="1" comment="e2fsprogs-devel is &lt;1.38-4.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031527" version="1" comment="e2fsprogs is &lt;1.38-4.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031528" version="1" comment="XFree86-libs-32bit is &lt;9-200801062003" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031529" version="1" comment="XFree86-libs is &lt;4.3.99.902-43.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031530" version="1" comment="XFree86-server is &lt;4.3.99.902-43.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031531" version="1" comment="XFree86-Xnest is &lt;4.3.99.902-43.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031532" version="1" comment="XFree86-Xvfb is &lt;4.3.99.902-43.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031533" version="1" comment="nss_ldap-32bit is &lt;9-200712041546" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031534" version="1" comment="nss_ldap is &lt;215-59.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031535" version="1" comment="net-snmp-devel is &lt;5.1.3.1-0.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031536" version="1" comment="net-snmp is &lt;5.1.3.1-0.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031537" version="1" comment="perl-SNMP is &lt;5.1.3.1-0.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031538" version="1" comment="cups-client is &lt;1.1.20-108.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031539" version="1" comment="cups-devel is &lt;1.1.20-108.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031540" version="1" comment="cups-libs-32bit is &lt;9-200712111651" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031541" version="1" comment="cups-libs is &lt;1.1.20-108.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031542" version="1" comment="cups is &lt;1.1.20-108.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031543" version="1" comment="te_ams is &lt;2.0.2-195.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031544" version="1" comment="te_cont is &lt;2.0.2-195.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031545" version="1" comment="te_dvilj is &lt;2.0.2-195.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031546" version="1" comment="te_eplai is &lt;2.0.2-195.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031547" version="1" comment="te_etex is &lt;2.0.2-195.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031548" version="1" comment="te_kpath is &lt;2.0.2-195.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031549" version="1" comment="te_latex is &lt;2.0.2-195.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031550" version="1" comment="te_mpost is &lt;2.0.2-195.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031551" version="1" comment="te_omega is &lt;2.0.2-195.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031552" version="1" comment="te_pdf is &lt;2.0.2-195.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031553" version="1" comment="te_ptex is &lt;2.0.2-195.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031554" version="1" comment="te_web is &lt;2.0.2-195.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031555" version="1" comment="tetex is &lt;2.0.2-195.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031556" version="1" comment="heimdal-devel-32bit is &lt;9-200712111659" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031557" version="1" comment="heimdal-devel is &lt;0.6.1rc3-55.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031558" version="1" comment="heimdal-lib-32bit is &lt;9-200712111659" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031559" version="1" comment="heimdal-lib is &lt;0.6.1rc3-55.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031560" version="1" comment="heimdal-tools is &lt;0.6.1rc3-55.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031561" version="1" comment="heimdal is &lt;0.6.1rc3-55.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031562" version="1" comment="mozilla-cs is &lt;1.8_seamonkey_1.0.4-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031563" version="1" comment="mozilla-deat is &lt;1.8_seamonkey_1.0.4-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031564" version="1" comment="mozilla-devel is &lt;1.8_seamonkey_1.0.9-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031565" version="1" comment="mozilla-dom-inspector is &lt;1.8_seamonkey_1.0.9-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031566" version="1" comment="mozilla-hu is &lt;1.80_seamonkey_1.0.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031567" version="1" comment="mozilla-irc is &lt;1.8_seamonkey_1.0.9-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031568" version="1" comment="mozilla-lib64 is &lt;1.8_seamonkey_1.0.9-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031569" version="1" comment="mozilla-mail is &lt;1.8_seamonkey_1.0.9-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031570" version="1" comment="mozilla-venkman is &lt;1.8_seamonkey_1.0.9-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031571" version="1" comment="mozilla is &lt;1.8_seamonkey_1.0.9-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031572" version="1" comment="MozillaFirefox-translations is &lt;1.5.0.12-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031573" version="1" comment="MozillaFirefox is &lt;1.5.0.12-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031574" version="1" comment="ldapsmb is &lt;1.33-6.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031575" version="1" comment="libsmbclient-32bit is &lt;9-200712041731" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031576" version="1" comment="libsmbclient-devel is &lt;3.0.20b-3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031577" version="1" comment="libsmbclient is &lt;3.0.20b-3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031578" version="1" comment="samba-32bit is &lt;9-200712041731" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031579" version="1" comment="samba-client-32bit is &lt;9-200712041731" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031580" version="1" comment="samba-client is &lt;3.0.20b-3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031581" version="1" comment="samba-doc is &lt;3.0.20b-3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031582" version="1" comment="samba-pdb is &lt;3.0.20b-3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031583" version="1" comment="samba-python is &lt;3.0.20b-3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031584" version="1" comment="samba-vscan is &lt;0.3.6b-0.26.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031585" version="1" comment="samba-winbind-32bit is &lt;9-200712041731" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031586" version="1" comment="samba-winbind is &lt;3.0.20b-3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031587" version="1" comment="samba is &lt;3.0.20b-3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031588" version="1" comment="ethereal is &lt;0.10.13-2.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031589" version="1" comment="yast2-core-devel is &lt;2.9.98.1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031590" version="1" comment="yast2-core is &lt;2.9.98.1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031591" version="1" comment="rsync is &lt;2.6.8-53.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031592" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.312" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031593" version="1" comment="kernel-default is &lt;2.6.5-7.312" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031594" version="1" comment="kernel-smp is &lt;2.6.5-7.312" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031595" version="1" comment="kernel-source is &lt;2.6.5-7.312" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031596" version="1" comment="kernel-syms is &lt;2.6.5-7.312" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031597" version="1" comment="libxml2-32bit is &lt;9-200712191220" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031598" version="1" comment="libxml2-devel is &lt;2.6.7-28.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031599" version="1" comment="libxml2-python is &lt;2.6.7-46.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031600" version="1" comment="libxml2 is &lt;2.6.7-28.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031601" version="1" comment="libexif-32bit is &lt;9-200801091453" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031602" version="1" comment="libexif is &lt;0.5.12-118.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031603" version="1" comment="openldap2-back-ldap is &lt;2.2.24-4.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031604" version="1" comment="openldap2-back-meta is &lt;2.2.24-4.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031605" version="1" comment="openldap2-back-monitor is &lt;2.2.24-4.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031606" version="1" comment="openldap2-back-perl is &lt;2.2.24-4.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031607" version="1" comment="openldap2-client-32bit is &lt;9-200802110138" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031608" version="1" comment="openldap2-client is &lt;2.2.24-4.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031609" version="1" comment="openldap2-devel-32bit is &lt;9-200802110138" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031610" version="1" comment="openldap2-devel is &lt;2.2.24-4.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031611" version="1" comment="openldap2 is &lt;2.2.24-4.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031612" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.314" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031613" version="1" comment="kernel-default is &lt;2.6.5-7.314" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031614" version="1" comment="kernel-smp is &lt;2.6.5-7.314" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031615" version="1" comment="kernel-source is &lt;2.6.5-7.314" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031616" version="1" comment="kernel-syms is &lt;2.6.5-7.314" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031617" version="1" comment="libmikmod-32bit is &lt;9-200902271558" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031618" version="1" comment="libmikmod is &lt;3.1.10-662.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031619" version="1" comment="ghostscript-fonts-other is &lt;7.07.1rc1-195.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031620" version="1" comment="ghostscript-fonts-rus is &lt;7.07.1rc1-195.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031621" version="1" comment="ghostscript-fonts-std is &lt;7.07.1rc1-195.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031622" version="1" comment="ghostscript-library is &lt;7.07.1rc1-195.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031623" version="1" comment="ghostscript-serv is &lt;7.07.1rc1-195.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031624" version="1" comment="ghostscript-x11 is &lt;7.07.1rc1-195.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031625" version="1" comment="libgimpprint-devel is &lt;4.2.6-46.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031626" version="1" comment="libgimpprint is &lt;4.2.6-46.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031627" version="1" comment="epiphany-doc is &lt;1.2.10-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031628" version="1" comment="epiphany-extensions-devel is &lt;0.8.2-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031629" version="1" comment="epiphany-extensions is &lt;0.8.2-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031630" version="1" comment="epiphany is &lt;1.2.10-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031631" version="1" comment="mozilla-cs is &lt;1.8_seamonkey_1.0.4-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031632" version="1" comment="mozilla-deat is &lt;1.8_seamonkey_1.0.4-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031633" version="1" comment="mozilla-devel is &lt;1.8_seamonkey_1.0.9-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031634" version="1" comment="mozilla-dom-inspector is &lt;1.8_seamonkey_1.0.9-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031635" version="1" comment="mozilla-hu is &lt;1.80_seamonkey_1.0.4-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031636" version="1" comment="mozilla-irc is &lt;1.8_seamonkey_1.0.9-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031637" version="1" comment="mozilla-lib64 is &lt;1.8_seamonkey_1.0.9-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031638" version="1" comment="mozilla-mail is &lt;1.8_seamonkey_1.0.9-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031639" version="1" comment="mozilla-venkman is &lt;1.8_seamonkey_1.0.9-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031640" version="1" comment="mozilla is &lt;1.8_seamonkey_1.0.9-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031641" version="1" comment="MozillaFirefox-translations is &lt;1.5.0.12-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031642" version="1" comment="MozillaFirefox is &lt;1.5.0.12-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031643" version="1" comment="MozillaFirefox-translations is &lt;1.5.0.12-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031644" version="1" comment="MozillaFirefox is &lt;1.5.0.12-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031645" version="1" comment="mozilla-cs is &lt;1.8_seamonkey_1.0.4-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031646" version="1" comment="mozilla-deat is &lt;1.8_seamonkey_1.0.4-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031647" version="1" comment="mozilla-devel is &lt;1.8_seamonkey_1.0.9-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031648" version="1" comment="mozilla-dom-inspector is &lt;1.8_seamonkey_1.0.9-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031649" version="1" comment="mozilla-hu is &lt;1.80_seamonkey_1.0.4-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031650" version="1" comment="mozilla-irc is &lt;1.8_seamonkey_1.0.9-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031651" version="1" comment="mozilla-lib64 is &lt;1.8_seamonkey_1.0.9-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031652" version="1" comment="mozilla-mail is &lt;1.8_seamonkey_1.0.9-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031653" version="1" comment="mozilla-venkman is &lt;1.8_seamonkey_1.0.9-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031654" version="1" comment="mozilla is &lt;1.8_seamonkey_1.0.9-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031655" version="1" comment="cups-client is &lt;1.1.20-108.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031656" version="1" comment="cups-devel is &lt;1.1.20-108.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031657" version="1" comment="cups-libs-32bit is &lt;9-200803201838" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031658" version="1" comment="cups-libs is &lt;1.1.20-108.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031659" version="1" comment="cups is &lt;1.1.20-108.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031660" version="1" comment="evolution-devel is &lt;2.0.4-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031661" version="1" comment="evolution-pilot is &lt;2.0.4-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031662" version="1" comment="evolution is &lt;2.0.4-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031663" version="1" comment="xine-lib-32bit is &lt;9-200803202027" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031664" version="1" comment="xine-lib is &lt;0.99.rc3a-106.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031665" version="1" comment="xine-devel is &lt;0.99.rc3a-106.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031666" version="1" comment="xine-extra is &lt;0.99.rc3a-106.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031667" version="1" comment="xine-ui is &lt;0.99.rc3a-106.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031668" version="1" comment="bind-devel is &lt;9.3.4-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031669" version="1" comment="bind-utils-32bit is &lt;9-200801211531" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031670" version="1" comment="bind-utils is &lt;9.3.4-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031671" version="1" comment="bind is &lt;9.3.4-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031672" version="1" comment="xine-lib-32bit is &lt;9-200801171028" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031673" version="1" comment="xine-lib is &lt;0.99.rc3a-106.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031674" version="1" comment="xine-devel is &lt;0.99.rc3a-106.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031675" version="1" comment="xine-extra is &lt;0.99.rc3a-106.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031676" version="1" comment="xine-ui is &lt;0.99.rc3a-106.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031677" version="1" comment="ghostscript-fonts-other is &lt;7.07.1rc1-195.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031678" version="1" comment="ghostscript-fonts-rus is &lt;7.07.1rc1-195.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031679" version="1" comment="ghostscript-fonts-std is &lt;7.07.1rc1-195.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031680" version="1" comment="ghostscript-library is &lt;7.07.1rc1-195.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031681" version="1" comment="ghostscript-serv is &lt;7.07.1rc1-195.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031682" version="1" comment="ghostscript-x11 is &lt;7.07.1rc1-195.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031683" version="1" comment="libgimpprint-devel is &lt;4.2.6-46.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031684" version="1" comment="libgimpprint is &lt;4.2.6-46.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031685" version="1" comment="MozillaFirefox-translations is &lt;1.5.0.12-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031686" version="1" comment="MozillaFirefox is &lt;1.5.0.12-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031687" version="1" comment="mozilla-cs is &lt;1.8_seamonkey_1.0.4-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031688" version="1" comment="mozilla-deat is &lt;1.8_seamonkey_1.0.4-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031689" version="1" comment="mozilla-devel is &lt;1.8_seamonkey_1.0.9-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031690" version="1" comment="mozilla-dom-inspector is &lt;1.8_seamonkey_1.0.9-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031691" version="1" comment="mozilla-hu is &lt;1.80_seamonkey_1.0.4-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031692" version="1" comment="mozilla-irc is &lt;1.8_seamonkey_1.0.9-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031693" version="1" comment="mozilla-lib64 is &lt;1.8_seamonkey_1.0.9-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031694" version="1" comment="mozilla-mail is &lt;1.8_seamonkey_1.0.9-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031695" version="1" comment="mozilla-venkman is &lt;1.8_seamonkey_1.0.9-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031696" version="1" comment="mozilla is &lt;1.8_seamonkey_1.0.9-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031697" version="1" comment="tk-32bit is &lt;9-200802060128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031698" version="1" comment="tk-devel is &lt;8.4.6-41.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031699" version="1" comment="tk is &lt;8.4.6-41.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031700" version="1" comment="libnetpbm is &lt;1.0.0-618.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031701" version="1" comment="netpbm is &lt;10.11.4-172.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031702" version="1" comment="mailman is &lt;2.1.4-83.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031703" version="1" comment="cups-client is &lt;1.1.20-108.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031704" version="1" comment="cups-devel is &lt;1.1.20-108.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031705" version="1" comment="cups-libs-32bit is &lt;9-200803040015" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031706" version="1" comment="cups-libs is &lt;1.1.20-108.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031707" version="1" comment="cups is &lt;1.1.20-108.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031708" version="1" comment="gnumeric is &lt;1.4.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031709" version="1" comment="net-snmp-devel is &lt;5.1.3.1-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031710" version="1" comment="net-snmp is &lt;5.1.3.1-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031711" version="1" comment="perl-SNMP is &lt;5.1.3.1-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031712" version="1" comment="ethereal is &lt;0.10.13-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031713" version="1" comment="ImageMagick-devel is &lt;5.5.7-225.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031714" version="1" comment="ImageMagick is &lt;5.5.7-225.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031715" version="1" comment="ImageMagick-Magick++ is &lt;5.5.7-225.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031716" version="1" comment="perl-PerlMagick is &lt;5.5.7-225.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031717" version="1" comment="ldapsmb is &lt;1.34b-64.1.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031718" version="1" comment="libsmbclient-32bit is &lt;9-200805282142" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031719" version="1" comment="libsmbclient-devel is &lt;3.0.26a-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031720" version="1" comment="libsmbclient is &lt;3.0.26a-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031721" version="1" comment="samba-32bit is &lt;9-200805282142" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031722" version="1" comment="samba-client-32bit is &lt;9-200805282142" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031723" version="1" comment="samba-client is &lt;3.0.26a-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031724" version="1" comment="samba-doc is &lt;3.0.26a-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031725" version="1" comment="samba-pdb is &lt;3.0.26a-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031726" version="1" comment="samba-python is &lt;3.0.26a-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031727" version="1" comment="samba-vscan is &lt;0.3.6b-0.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031728" version="1" comment="samba-winbind-32bit is &lt;9-200805282142" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031729" version="1" comment="samba-winbind is &lt;3.0.26a-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031730" version="1" comment="samba is &lt;3.0.26a-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031731" version="1" comment="evolution-devel is &lt;2.0.4-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031732" version="1" comment="evolution-pilot is &lt;2.0.4-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031733" version="1" comment="evolution is &lt;2.0.4-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031734" version="1" comment="ruby is &lt;1.8.1-42.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031735" version="1" comment="java2-jre is &lt;1.4.2-129.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031736" version="1" comment="java2 is &lt;1.4.2-129.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031737" version="1" comment="jakarta-tomcat is &lt;5.0.19-29.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031738" version="1" comment="bzip2-32bit is &lt;9-200803201535" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031739" version="1" comment="bzip2 is &lt;1.0.2-346.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031740" version="1" comment="XFree86-Xnest is &lt;4.3.99.902-43.96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031741" version="1" comment="XFree86-Xprt is &lt;4.3.99.902-43.96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031742" version="1" comment="XFree86-Xvfb is &lt;4.3.99.902-43.96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031743" version="1" comment="XFree86-Xvnc is &lt;4.3.99.902-43.96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031744" version="1" comment="XFree86-server is &lt;4.3.99.902-43.96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031745" version="1" comment="libpng-32bit is &lt;9-200804151618" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031746" version="1" comment="libpng-devel is &lt;1.2.5-182.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031747" version="1" comment="libpng is &lt;1.2.5-182.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031748" version="1" comment="libvorbis-32bit is &lt;9-200805201623" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031749" version="1" comment="libvorbis-devel is &lt;1.0.1-56.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031750" version="1" comment="libvorbis is &lt;1.0.1-56.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031751" version="1" comment="bind-devel is &lt;9.3.4-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031752" version="1" comment="bind-utils-32bit is &lt;9-200806172350" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031753" version="1" comment="bind-utils is &lt;9.3.4-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031754" version="1" comment="bind is &lt;9.3.4-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031755" version="1" comment="xine-lib-32bit is &lt;9-200803271417" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031756" version="1" comment="xine-lib is &lt;0.99.rc3a-106.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031757" version="1" comment="xine-devel is &lt;0.99.rc3a-106.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031758" version="1" comment="xine-extra is &lt;0.99.rc3a-106.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031759" version="1" comment="xine-ui is &lt;0.99.rc3a-106.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031760" version="1" comment="openssh-askpass is &lt;4.1p1-11.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031761" version="1" comment="openssh is &lt;4.1p1-11.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031762" version="1" comment="python-32bit is &lt;9-200808010009" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031763" version="1" comment="python-curses is &lt;2.3.3-88.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031764" version="1" comment="python-demo is &lt;2.3.3-88.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031765" version="1" comment="python-devel is &lt;2.3.3-88.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031766" version="1" comment="python-doc-pdf is &lt;2.3.3-88.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031767" version="1" comment="python-doc is &lt;2.3.3-88.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031768" version="1" comment="python-gdbm is &lt;2.3.3-88.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031769" version="1" comment="python-idle is &lt;2.3.3-88.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031770" version="1" comment="python-mpz is &lt;2.3.3-88.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031771" version="1" comment="python-tk is &lt;2.3.3-88.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031772" version="1" comment="python-xml is &lt;2.3.3-88.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031773" version="1" comment="python is &lt;2.3.3-88.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031774" version="1" comment="xscreensaver-gnome is &lt;4.16-2.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031775" version="1" comment="xscreensaver is &lt;4.16-2.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031776" version="1" comment="speex-32bit is &lt;9-200806201343" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031777" version="1" comment="speex is &lt;1.0.3-54.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031778" version="1" comment="speex-devel is &lt;1.0.3-54.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031779" version="1" comment="vorbis-tools is &lt;1.0.1-86.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031780" version="1" comment="xine-lib-32bit is &lt;9-200804211655" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031781" version="1" comment="xine-lib is &lt;0.99.rc3a-106.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031782" version="1" comment="xine-devel is &lt;0.99.rc3a-106.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031783" version="1" comment="xine-extra is &lt;0.99.rc3a-106.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031784" version="1" comment="xine-ui is &lt;0.99.rc3a-106.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031785" version="1" comment="cups-client is &lt;1.1.20-108.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031786" version="1" comment="cups-devel is &lt;1.1.20-108.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031787" version="1" comment="cups-libs-32bit is &lt;9-200804172236" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031788" version="1" comment="cups-libs is &lt;1.1.20-108.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031789" version="1" comment="cups is &lt;1.1.20-108.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031790" version="1" comment="libxslt-32bit is &lt;9-200805201632" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031791" version="1" comment="libxslt-devel is &lt;1.1.2-58.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031792" version="1" comment="libxslt is &lt;1.1.2-58.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031793" version="1" comment="rdesktop is &lt;1.3.1-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031794" version="1" comment="freetype2-32bit is &lt;9-200806170342" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031795" version="1" comment="freetype2-devel-32bit is &lt;9-200806170342" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031796" version="1" comment="freetype2-devel is &lt;2.1.7-53.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031797" version="1" comment="freetype2 is &lt;2.1.7-53.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031798" version="1" comment="perl-32bit is &lt;9-200807111457" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031799" version="1" comment="perl is &lt;5.8.3-32.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031800" version="1" comment="gnutls-32bit is &lt;9-200808211659" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031801" version="1" comment="gnutls-devel-32bit is &lt;9-200808211659" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031802" version="1" comment="gnutls-devel is &lt;1.0.8-26.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031803" version="1" comment="gnutls is &lt;1.0.8-26.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031804" version="1" comment="java2-jre is &lt;1.4.2-129.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031805" version="1" comment="java2 is &lt;1.4.2-129.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031806" version="1" comment="xemacs-packages-el is &lt;20040202-54.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031807" version="1" comment="xemacs-packages-info is &lt;20040202-54.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031808" version="1" comment="xemacs-packages is &lt;20040202-54.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031809" version="1" comment="emacs-info is &lt;21.3-185.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031810" version="1" comment="emacs-nox is &lt;21.3-185.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031811" version="1" comment="emacs is &lt;21.3-185.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031812" version="1" comment="opensc-devel is &lt;0.8.0-194.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031813" version="1" comment="opensc is &lt;0.8.0-194.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031814" version="1" comment="opensc-devel is &lt;0.8.0-194.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031815" version="1" comment="opensc is &lt;0.8.0-194.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031816" version="1" comment="OpenOffice_org-ar is &lt;1.1.5-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031817" version="1" comment="OpenOffice_org-ca is &lt;1.1.5-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031818" version="1" comment="OpenOffice_org-cs is &lt;1.1.5-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031819" version="1" comment="OpenOffice_org-da is &lt;1.1.5-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031820" version="1" comment="OpenOffice_org-de is &lt;1.1.5-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031821" version="1" comment="OpenOffice_org-el is &lt;1.1.5-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031822" version="1" comment="OpenOffice_org-en-help is &lt;1.1.5-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031823" version="1" comment="OpenOffice_org-en is &lt;1.1.5-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031824" version="1" comment="OpenOffice_org-es is &lt;1.1.5-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031825" version="1" comment="OpenOffice_org-et is &lt;1.1.5-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031826" version="1" comment="OpenOffice_org-fi is &lt;1.1.5-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031827" version="1" comment="OpenOffice_org-fr is &lt;1.1.5-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031828" version="1" comment="OpenOffice_org-gnome is &lt;1.1.5-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031829" version="1" comment="OpenOffice_org-hu is &lt;1.1.5-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031830" version="1" comment="OpenOffice_org-it is &lt;1.1.5-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031831" version="1" comment="OpenOffice_org-ja is &lt;1.1.5-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031832" version="1" comment="OpenOffice_org-kde is &lt;1.1.5-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031833" version="1" comment="OpenOffice_org-ko is &lt;1.1.5-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031834" version="1" comment="OpenOffice_org-nl is &lt;1.1.5-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031835" version="1" comment="OpenOffice_org-pl is &lt;1.1.5-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031836" version="1" comment="OpenOffice_org-pt-BR is &lt;1.1.5-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031837" version="1" comment="OpenOffice_org-pt is &lt;1.1.5-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031838" version="1" comment="OpenOffice_org-ru is &lt;1.1.5-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031839" version="1" comment="OpenOffice_org-sk is &lt;1.1.5-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031840" version="1" comment="OpenOffice_org-sl is &lt;1.1.5-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031841" version="1" comment="OpenOffice_org-sv is &lt;1.1.5-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031842" version="1" comment="OpenOffice_org-tr is &lt;1.1.5-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031843" version="1" comment="OpenOffice_org-zh-CN is &lt;1.1.5-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031844" version="1" comment="OpenOffice_org-zh-TW is &lt;1.1.5-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031845" version="1" comment="OpenOffice_org is &lt;1.1.5-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031846" version="1" comment="libtiff-32bit is &lt;9-200808201417" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031847" version="1" comment="libtiff is &lt;3.6.1-38.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031848" version="1" comment="XFree86-server is &lt;4.3.99.902-43.98" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031849" version="1" comment="XFree86 is &lt;4.3.99.902-43.98" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031850" version="1" comment="acroread is &lt;7.0.9-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031851" version="1" comment="gvim is &lt;6.2-235.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031852" version="1" comment="postfix is &lt;2.1.1-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031853" version="1" comment="libapr0 is &lt;2.0.59-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031854" version="1" comment="apache2-devel is &lt;2.0.59-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031855" version="1" comment="apache2-prefork is &lt;2.0.59-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031856" version="1" comment="apache2-worker is &lt;2.0.59-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031857" version="1" comment="apache2 is &lt;2.0.59-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031858" version="1" comment="openldap2-back-ldap is &lt;2.2.24-4.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031859" version="1" comment="openldap2-back-meta is &lt;2.2.24-4.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031860" version="1" comment="openldap2-back-monitor is &lt;2.2.24-4.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031861" version="1" comment="openldap2-back-perl is &lt;2.2.24-4.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031862" version="1" comment="openldap2-client-32bit is &lt;9-200808130009" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031863" version="1" comment="openldap2-client is &lt;2.2.24-4.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031864" version="1" comment="openldap2-devel-32bit is &lt;9-200808130009" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031865" version="1" comment="openldap2-devel is &lt;2.2.24-4.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031866" version="1" comment="openldap2 is &lt;2.2.24-4.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031867" version="1" comment="java2-jre is &lt;1.4.2-129.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031868" version="1" comment="java2 is &lt;1.4.2-129.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031869" version="1" comment="ethereal is &lt;0.10.13-2.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031870" version="1" comment="xine-lib-32bit is &lt;9-200901281640" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031871" version="1" comment="xine-lib is &lt;0.99.rc3a-106.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031872" version="1" comment="xine-devel is &lt;0.99.rc3a-106.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031873" version="1" comment="xine-extra is &lt;0.99.rc3a-106.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031874" version="1" comment="xine-ui is &lt;0.99.rc3a-106.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031875" version="1" comment="jakarta-tomcat is &lt;5.0.19-29.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031876" version="1" comment="libxml2-32bit is &lt;9-200809051309" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031877" version="1" comment="libxml2-devel is &lt;2.6.7-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031878" version="1" comment="libxml2-python is &lt;2.6.7-46.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031879" version="1" comment="libxml2 is &lt;2.6.7-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031880" version="1" comment="mono-devel is &lt;1.1.7-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031881" version="1" comment="mono is &lt;1.1.7-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053391" version="1" comment="ruby is &lt;1.8.1-42.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031882" version="1" comment="libjasper-32bit is &lt;9-200811141502" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031883" version="1" comment="libjasper is &lt;1.701.0-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031884" version="1" comment="kernel-default is &lt;2.6.5-7.315" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031885" version="1" comment="kernel-smp is &lt;2.6.5-7.315" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031886" version="1" comment="kernel-source is &lt;2.6.5-7.315" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031887" version="1" comment="kernel-syms is &lt;2.6.5-7.315" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031888" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.315" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031889" version="1" comment="cups-client is &lt;1.1.20-108.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031890" version="1" comment="cups-devel is &lt;1.1.20-108.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031891" version="1" comment="cups-libs-32bit is &lt;9-200810021549" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031892" version="1" comment="cups-libs is &lt;1.1.20-108.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031893" version="1" comment="cups is &lt;1.1.20-108.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031894" version="1" comment="cups-client is &lt;1.1.20-108.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031895" version="1" comment="cups-devel is &lt;1.1.20-108.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031896" version="1" comment="cups-libs-32bit is &lt;9-200812030152" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031897" version="1" comment="cups-libs is &lt;1.1.20-108.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031898" version="1" comment="cups is &lt;1.1.20-108.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031899" version="1" comment="ipsec-tools is &lt;0.3.3-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031900" version="1" comment="mod_php4-core is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031901" version="1" comment="php4-bcmath is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031902" version="1" comment="php4-bz2 is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031903" version="1" comment="php4-calendar is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031904" version="1" comment="php4-ctype is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031905" version="1" comment="php4-curl is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031906" version="1" comment="php4-dba is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031907" version="1" comment="php4-dbase is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031908" version="1" comment="php4-devel is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031909" version="1" comment="php4-domxml is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031910" version="1" comment="php4-exif is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031911" version="1" comment="php4-fastcgi is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031912" version="1" comment="php4-filepro is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031913" version="1" comment="php4-ftp is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031914" version="1" comment="php4-gd is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031915" version="1" comment="php4-gettext is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031916" version="1" comment="php4-gmp is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031917" version="1" comment="php4-iconv is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031918" version="1" comment="php4-imap is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031919" version="1" comment="php4-ldap is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031920" version="1" comment="php4-mbstring is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031921" version="1" comment="php4-mcal is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031922" version="1" comment="php4-mcrypt is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031923" version="1" comment="php4-mhash is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031924" version="1" comment="php4-mime_magic is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031925" version="1" comment="php4-mysql is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031926" version="1" comment="php4-pear is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031927" version="1" comment="php4-pgsql is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031928" version="1" comment="php4-qtdom is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031929" version="1" comment="php4-readline is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031930" version="1" comment="php4-recode is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031931" version="1" comment="php4-servlet is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031932" version="1" comment="php4-session is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031933" version="1" comment="php4-shmop is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031934" version="1" comment="php4-snmp is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031935" version="1" comment="php4-sockets is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031936" version="1" comment="php4-swf is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031937" version="1" comment="php4-sysvsem is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031938" version="1" comment="php4-sysvshm is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031939" version="1" comment="php4-unixODBC is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031940" version="1" comment="php4-wddx is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031941" version="1" comment="php4-xslt is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031942" version="1" comment="php4-yp is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031943" version="1" comment="php4-zlib is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031944" version="1" comment="php4 is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031945" version="1" comment="enscript is &lt;1.6.2-814.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031946" version="1" comment="ethereal is &lt;0.10.13-2.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031947" version="1" comment="mysql-Max is &lt;4.0.18-32.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031948" version="1" comment="mysql-bench is &lt;4.0.18-32.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031949" version="1" comment="mysql-client is &lt;4.0.18-32.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031950" version="1" comment="mysql-devel is &lt;4.0.18-32.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031951" version="1" comment="mysql-shared is &lt;4.0.18-32.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031952" version="1" comment="mysql is &lt;4.0.18-32.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031953" version="1" comment="openssh-askpass is &lt;4.1p1-11.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031954" version="1" comment="openssh is &lt;4.1p1-11.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031955" version="1" comment="libxml2-32bit is &lt;9-200811201357" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031956" version="1" comment="libxml2-devel is &lt;2.6.7-28.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031957" version="1" comment="libxml2-python is &lt;2.6.7-46.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031958" version="1" comment="libxml2 is &lt;2.6.7-28.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031959" version="1" comment="libxml2-32bit is &lt;9-200811071633" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031960" version="1" comment="libxml2 is &lt;2.6.7-28.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031961" version="1" comment="libxml2-devel is &lt;2.6.7-28.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031962" version="1" comment="net-snmp-devel is &lt;5.1.3.1-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031963" version="1" comment="net-snmp is &lt;5.1.3.1-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031964" version="1" comment="perl-SNMP is &lt;5.1.3.1-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031965" version="1" comment="km_ndiswrapper is &lt;1.1-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054280" version="1" comment="mysql-Max is &lt;4.0.18-32.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054281" version="1" comment="mysql-bench is &lt;4.0.18-32.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054282" version="1" comment="mysql-client is &lt;4.0.18-32.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054283" version="1" comment="mysql-devel is &lt;4.0.18-32.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054284" version="1" comment="mysql-shared is &lt;4.0.18-32.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054285" version="1" comment="mysql is &lt;4.0.18-32.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031966" version="1" comment="nfs-utils is &lt;1.0.6-103.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031967" version="1" comment="graphviz-devel is &lt;1.11-34.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031968" version="1" comment="graphviz-graphs is &lt;1.11-34.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031969" version="1" comment="graphviz-tcl is &lt;1.11-34.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031970" version="1" comment="graphviz is &lt;1.11-34.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031971" version="1" comment="yast2-backup is &lt;2.9.22-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031972" version="1" comment="python-32bit is &lt;9-200812011728" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031973" version="1" comment="python-curses is &lt;2.3.3-88.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031974" version="1" comment="python-demo is &lt;2.3.3-88.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031975" version="1" comment="python-devel is &lt;2.3.3-88.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031976" version="1" comment="python-doc-pdf is &lt;2.3.3-88.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031977" version="1" comment="python-doc is &lt;2.3.3-88.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031978" version="1" comment="python-gdbm is &lt;2.3.3-88.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031979" version="1" comment="python-idle is &lt;2.3.3-88.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031980" version="1" comment="python-mpz is &lt;2.3.3-88.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031981" version="1" comment="python-tk is &lt;2.3.3-88.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031982" version="1" comment="python-xml is &lt;2.3.3-88.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031983" version="1" comment="python is &lt;2.3.3-88.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031984" version="1" comment="valgrind is &lt;3.2.3-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031985" version="1" comment="openssl-32bit is &lt;9-200901211340" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031986" version="1" comment="openssl-devel-32bit is &lt;9-200901211340" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031987" version="1" comment="openssl-devel is &lt;0.9.7d-15.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031988" version="1" comment="openssl-doc is &lt;0.9.7d-15.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031989" version="1" comment="openssl is &lt;0.9.7d-15.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031990" version="1" comment="enscript is &lt;1.6.2-814.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031991" version="1" comment="flash-player is &lt;9.0.152.0-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031992" version="1" comment="mozilla-cs is &lt;1.8_seamonkey_1.0.4-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031993" version="1" comment="mozilla-deat is &lt;1.8_seamonkey_1.0.4-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031994" version="1" comment="mozilla-devel is &lt;1.8_seamonkey_1.0.9-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031995" version="1" comment="mozilla-dom-inspector is &lt;1.8_seamonkey_1.0.9-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031996" version="1" comment="mozilla-hu is &lt;1.80_seamonkey_1.0.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031997" version="1" comment="mozilla-irc is &lt;1.8_seamonkey_1.0.9-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031998" version="1" comment="mozilla-lib64 is &lt;1.8_seamonkey_1.0.9-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031999" version="1" comment="mozilla-mail is &lt;1.8_seamonkey_1.0.9-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032000" version="1" comment="mozilla-venkman is &lt;1.8_seamonkey_1.0.9-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032001" version="1" comment="mozilla is &lt;1.8_seamonkey_1.0.9-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032002" version="1" comment="MozillaFirefox-translations is &lt;1.5.0.12-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032003" version="1" comment="MozillaFirefox is &lt;1.5.0.12-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032004" version="1" comment="audiofile-32bit is &lt;9-200901211334" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032005" version="1" comment="audiofile is &lt;0.2.5-37.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032006" version="1" comment="libpng-32bit is &lt;9-200901202355" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032007" version="1" comment="libpng-devel is &lt;1.2.5-182.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032008" version="1" comment="libpng is &lt;1.2.5-182.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032009" version="1" comment="net-snmp-devel is &lt;5.1.3.1-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032010" version="1" comment="net-snmp is &lt;5.1.3.1-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032011" version="1" comment="perl-SNMP is &lt;5.1.3.1-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032012" version="1" comment="xntp-doc is &lt;4.2.0a-23.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032013" version="1" comment="xntp is &lt;4.2.0a-23.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032014" version="1" comment="bind-devel is &lt;9.3.4-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032015" version="1" comment="bind-utils-32bit is &lt;9-200901120120" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032016" version="1" comment="bind-utils is &lt;9.3.4-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032017" version="1" comment="bind is &lt;9.3.4-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032018" version="1" comment="kernel-default is &lt;2.6.5-7.316" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032019" version="1" comment="kernel-smp is &lt;2.6.5-7.316" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032020" version="1" comment="kernel-source is &lt;2.6.5-7.316" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032021" version="1" comment="kernel-syms is &lt;2.6.5-7.316" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032022" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.316" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032023" version="1" comment="curl-32bit is &lt;9-200902201554" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032024" version="1" comment="curl-devel is &lt;7.11.0-39.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032025" version="1" comment="curl is &lt;7.11.0-39.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032026" version="1" comment="libpng-32bit is &lt;9-200902171046" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032027" version="1" comment="libpng-devel is &lt;1.2.5-182.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032028" version="1" comment="libpng is &lt;1.2.5-182.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032029" version="1" comment="libpng-32bit is &lt;9-200902251715" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032030" version="1" comment="libpng-devel is &lt;1.2.5-182.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032031" version="1" comment="libpng is &lt;1.2.5-182.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032032" version="1" comment="flash-player is &lt;9.0.159.0-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032033" version="1" comment="multipath-tools is &lt;0.4.7-75.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032034" version="1" comment="cups-client is &lt;1.1.20-108.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032035" version="1" comment="cups-devel is &lt;1.1.20-108.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032036" version="1" comment="cups-libs-32bit is &lt;9-200904161449" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032037" version="1" comment="cups-libs is &lt;1.1.20-108.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032038" version="1" comment="cups is &lt;1.1.20-108.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032039" version="1" comment="xntp-doc is &lt;4.2.0a-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032040" version="1" comment="xntp is &lt;4.2.0a-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054545" version="1" comment="OpenOffice_org-ar is &lt;1.1.5-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054546" version="1" comment="OpenOffice_org-ca is &lt;1.1.5-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054547" version="1" comment="OpenOffice_org-cs is &lt;1.1.5-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054548" version="1" comment="OpenOffice_org-da is &lt;1.1.5-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054549" version="1" comment="OpenOffice_org-de is &lt;1.1.5-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054550" version="1" comment="OpenOffice_org-el is &lt;1.1.5-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054551" version="1" comment="OpenOffice_org-en-help is &lt;1.1.5-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054552" version="1" comment="OpenOffice_org-en is &lt;1.1.5-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054553" version="1" comment="OpenOffice_org-es is &lt;1.1.5-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054554" version="1" comment="OpenOffice_org-et is &lt;1.1.5-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054555" version="1" comment="OpenOffice_org-fi is &lt;1.1.5-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054556" version="1" comment="OpenOffice_org-fr is &lt;1.1.5-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054557" version="1" comment="OpenOffice_org-gnome is &lt;1.1.5-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054558" version="1" comment="OpenOffice_org-hu is &lt;1.1.5-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054559" version="1" comment="OpenOffice_org-it is &lt;1.1.5-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054560" version="1" comment="OpenOffice_org-ja is &lt;1.1.5-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054561" version="1" comment="OpenOffice_org-kde is &lt;1.1.5-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054562" version="1" comment="OpenOffice_org-ko is &lt;1.1.5-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054563" version="1" comment="OpenOffice_org-nl is &lt;1.1.5-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054564" version="1" comment="OpenOffice_org-pl is &lt;1.1.5-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054565" version="1" comment="OpenOffice_org-pt-BR is &lt;1.1.5-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054566" version="1" comment="OpenOffice_org-pt is &lt;1.1.5-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054567" version="1" comment="OpenOffice_org-ru is &lt;1.1.5-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054568" version="1" comment="OpenOffice_org-sk is &lt;1.1.5-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054569" version="1" comment="OpenOffice_org-sl is &lt;1.1.5-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054570" version="1" comment="OpenOffice_org-sv is &lt;1.1.5-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054571" version="1" comment="OpenOffice_org-tr is &lt;1.1.5-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054572" version="1" comment="OpenOffice_org-zh-CN is &lt;1.1.5-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054573" version="1" comment="OpenOffice_org-zh-TW is &lt;1.1.5-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054574" version="1" comment="OpenOffice_org is &lt;1.1.5-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059440" version="1" comment="OpenOffice_org-ar is &lt;1.1.5-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059441" version="1" comment="OpenOffice_org-ca is &lt;1.1.5-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059442" version="1" comment="OpenOffice_org-cs is &lt;1.1.5-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059443" version="1" comment="OpenOffice_org-da is &lt;1.1.5-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059444" version="1" comment="OpenOffice_org-de is &lt;1.1.5-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059445" version="1" comment="OpenOffice_org-el is &lt;1.1.5-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059446" version="1" comment="OpenOffice_org-en-help is &lt;1.1.5-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059447" version="1" comment="OpenOffice_org-en is &lt;1.1.5-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059448" version="1" comment="OpenOffice_org-es is &lt;1.1.5-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059449" version="1" comment="OpenOffice_org-et is &lt;1.1.5-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059450" version="1" comment="OpenOffice_org-fi is &lt;1.1.5-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059451" version="1" comment="OpenOffice_org-fr is &lt;1.1.5-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059452" version="1" comment="OpenOffice_org-gnome is &lt;1.1.5-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059453" version="1" comment="OpenOffice_org-hu is &lt;1.1.5-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059454" version="1" comment="OpenOffice_org-it is &lt;1.1.5-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059455" version="1" comment="OpenOffice_org-ja is &lt;1.1.5-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059456" version="1" comment="OpenOffice_org-kde is &lt;1.1.5-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059457" version="1" comment="OpenOffice_org-ko is &lt;1.1.5-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059458" version="1" comment="OpenOffice_org-nl is &lt;1.1.5-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059459" version="1" comment="OpenOffice_org-pl is &lt;1.1.5-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059460" version="1" comment="OpenOffice_org-pt-BR is &lt;1.1.5-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059461" version="1" comment="OpenOffice_org-pt is &lt;1.1.5-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059462" version="1" comment="OpenOffice_org-ru is &lt;1.1.5-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059463" version="1" comment="OpenOffice_org-sk is &lt;1.1.5-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059464" version="1" comment="OpenOffice_org-sl is &lt;1.1.5-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059465" version="1" comment="OpenOffice_org-sv is &lt;1.1.5-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059466" version="1" comment="OpenOffice_org-tr is &lt;1.1.5-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059467" version="1" comment="OpenOffice_org-zh-CN is &lt;1.1.5-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059468" version="1" comment="OpenOffice_org-zh-TW is &lt;1.1.5-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059469" version="1" comment="OpenOffice_org is &lt;1.1.5-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032041" version="1" comment="gstreamer-plugins-default is &lt;0.8.1-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032042" version="1" comment="gstreamer-plugins-devel is &lt;0.8.1-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032043" version="1" comment="gstreamer-plugins-excess is &lt;0.8.1-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032044" version="1" comment="gstreamer-plugins-extra is &lt;0.8.1-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032045" version="1" comment="gstreamer-plugins is &lt;0.8.1-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032046" version="1" comment="liblcms-32bit is &lt;9-200903091206" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032047" version="1" comment="liblcms-devel is &lt;1.12-55.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032048" version="1" comment="liblcms is &lt;1.12-55.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032049" version="1" comment="evolution-devel is &lt;2.0.4-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032050" version="1" comment="evolution-pilot is &lt;2.0.4-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032051" version="1" comment="evolution is &lt;2.0.4-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032052" version="1" comment="ghostscript-fonts-other is &lt;7.07.1rc1-195.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032053" version="1" comment="ghostscript-fonts-rus is &lt;7.07.1rc1-195.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032054" version="1" comment="ghostscript-fonts-std is &lt;7.07.1rc1-195.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032055" version="1" comment="ghostscript-library is &lt;7.07.1rc1-195.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032056" version="1" comment="ghostscript-serv is &lt;7.07.1rc1-195.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032057" version="1" comment="ghostscript-x11 is &lt;7.07.1rc1-195.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032058" version="1" comment="libgimpprint-devel is &lt;4.2.6-46.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032059" version="1" comment="libgimpprint is &lt;4.2.6-46.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032060" version="1" comment="libsoup-32bit is &lt;9-200904292143" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032061" version="1" comment="libsoup-devel-32bit is &lt;9-200904292143" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032062" version="1" comment="libsoup-devel is &lt;2.2.3-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032063" version="1" comment="libsoup is &lt;2.2.3-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032064" version="1" comment="openssl-32bit is &lt;9-200904151544" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032065" version="1" comment="openssl-devel-32bit is &lt;9-200904151544" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032066" version="1" comment="openssl-devel is &lt;0.9.7d-15.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032067" version="1" comment="openssl-doc is &lt;0.9.7d-15.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032068" version="1" comment="openssl is &lt;0.9.7d-15.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032069" version="1" comment="cyrus-sasl-32bit is &lt;9-200905141649" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032070" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.18-33.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032071" version="1" comment="cyrus-sasl-devel-32bit is &lt;9-200905141649" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032072" version="1" comment="cyrus-sasl-devel is &lt;2.1.18-33.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032073" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.18-33.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032074" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.18-33.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032075" version="1" comment="cyrus-sasl-otp is &lt;2.1.18-33.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032076" version="1" comment="cyrus-sasl-plain is &lt;2.1.18-33.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032077" version="1" comment="cyrus-sasl is &lt;2.1.18-33.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056882" version="1" comment="kdelibs3-32bit is &lt;9-200912160015" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056883" version="1" comment="kdelibs3-devel-doc is &lt;3.2.1-44.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056884" version="1" comment="kdelibs3-devel is &lt;3.2.1-44.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056885" version="1" comment="kdelibs3 is &lt;3.2.1-44.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053392" version="1" comment="dhcp-client is &lt;3.0.1rc13-28.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053616" version="1" comment="bind-devel is &lt;9.3.4-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053617" version="1" comment="bind-utils-32bit is &lt;9-200907291720" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053618" version="1" comment="bind-utils is &lt;9.3.4-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053619" version="1" comment="bind is &lt;9.3.4-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032078" version="1" comment="cups-client is &lt;1.1.20-108.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032079" version="1" comment="cups-devel is &lt;1.1.20-108.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032080" version="1" comment="cups-libs-32bit is &lt;9-200906022331" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032081" version="1" comment="cups-libs is &lt;1.1.20-108.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032082" version="1" comment="cups is &lt;1.1.20-108.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032083" version="1" comment="kernel-default is &lt;2.6.5-7.317" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032084" version="1" comment="kernel-smp is &lt;2.6.5-7.317" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032085" version="1" comment="kernel-source is &lt;2.6.5-7.317" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032086" version="1" comment="kernel-syms is &lt;2.6.5-7.317" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032087" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.317" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053690" version="1" comment="flash-player is &lt;9.0.246.0-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032088" version="1" comment="postgresql-contrib is &lt;7.4.25-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032089" version="1" comment="postgresql-devel is &lt;7.4.25-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032090" version="1" comment="postgresql-docs is &lt;7.4.25-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032091" version="1" comment="postgresql-libs-32bit is &lt;9-200903241522" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032092" version="1" comment="postgresql-libs is &lt;7.4.25-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032093" version="1" comment="postgresql-server is &lt;7.4.25-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032094" version="1" comment="postgresql is &lt;7.4.25-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032095" version="1" comment="freetype2-32bit is &lt;9-200904162346" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032096" version="1" comment="freetype2-devel-32bit is &lt;9-200904162346" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032097" version="1" comment="freetype2-devel is &lt;2.1.7-53.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032098" version="1" comment="freetype2 is &lt;2.1.7-53.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056217" version="1" comment="kernel-default is &lt;2.6.5-7.321" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056218" version="1" comment="kernel-smp is &lt;2.6.5-7.321" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056219" version="1" comment="kernel-source is &lt;2.6.5-7.321" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056220" version="1" comment="kernel-syms is &lt;2.6.5-7.321" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056223" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.321" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032099" version="1" comment="xine-lib-32bit is &lt;9-200905071455" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032100" version="1" comment="xine-lib is &lt;0.99.rc3a-106.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055119" version="1" comment="epiphany-doc is &lt;1.2.10-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055120" version="1" comment="epiphany-extensions-devel is &lt;0.8.2-2.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055121" version="1" comment="epiphany-extensions is &lt;0.8.2-2.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055122" version="1" comment="epiphany is &lt;1.2.10-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055123" version="1" comment="mozilla-devel is &lt;1.8_seamonkey_1.1.17-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055124" version="1" comment="mozilla-dom-inspector is &lt;1.8_seamonkey_1.1.17-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055125" version="1" comment="mozilla-irc is &lt;1.8_seamonkey_1.1.17-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055126" version="1" comment="mozilla-mail is &lt;1.8_seamonkey_1.1.17-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055127" version="1" comment="mozilla-venkman is &lt;1.8_seamonkey_1.1.17-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055128" version="1" comment="mozilla is &lt;1.8_seamonkey_1.1.17-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032101" version="1" comment="libwmf is &lt;0.2.8.2-88.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053457" version="1" comment="gaim is &lt;1.2.0-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054242" version="1" comment="kernel-default is &lt;2.6.5-7.318" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054243" version="1" comment="kernel-smp is &lt;2.6.5-7.318" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054244" version="1" comment="kernel-source is &lt;2.6.5-7.318" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054245" version="1" comment="kernel-syms is &lt;2.6.5-7.318" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054257" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.318" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053030" version="1" comment="gstreamer-plugins-default is &lt;0.8.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053031" version="1" comment="gstreamer-plugins-devel is &lt;0.8.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053032" version="1" comment="gstreamer-plugins-excess is &lt;0.8.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053033" version="1" comment="gstreamer-plugins-extra is &lt;0.8.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053034" version="1" comment="gstreamer-plugins is &lt;0.8.1-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032102" version="1" comment="ipsec-tools is &lt;0.3.3-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032103" version="1" comment="ImageMagick-devel is &lt;5.5.7-225.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032104" version="1" comment="ImageMagick is &lt;5.5.7-225.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055705" version="1" comment="libapr0 is &lt;2.0.59-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053352" version="1" comment="libpng-32bit is &lt;9-200906232031" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053353" version="1" comment="libpng-devel is &lt;1.2.5-182.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053354" version="1" comment="libpng is &lt;1.2.5-182.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053444" version="1" comment="freeswan is &lt;2.04_1.5.4-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053717" version="1" comment="libtiff-32bit is &lt;9-200904061139" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053718" version="1" comment="libtiff is &lt;3.6.1-38.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054047" version="1" comment="libtiff-32bit is &lt;9-200908071506" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054048" version="1" comment="libtiff is &lt;3.6.1-38.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055382" version="1" comment="epiphany-doc is &lt;1.2.10-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055383" version="1" comment="epiphany-extensions-devel is &lt;0.8.2-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055384" version="1" comment="epiphany-extensions is &lt;0.8.2-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055385" version="1" comment="epiphany is &lt;1.2.10-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055386" version="1" comment="mozilla-devel is &lt;1.8_seamonkey_1.1.18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055387" version="1" comment="mozilla-dom-inspector is &lt;1.8_seamonkey_1.1.18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055388" version="1" comment="mozilla-irc is &lt;1.8_seamonkey_1.1.18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055389" version="1" comment="mozilla-mail is &lt;1.8_seamonkey_1.1.18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055390" version="1" comment="mozilla-venkman is &lt;1.8_seamonkey_1.1.18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055391" version="1" comment="mozilla is &lt;1.8_seamonkey_1.1.18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054892" version="1" comment="openldap2-back-ldap is &lt;2.2.24-4.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054893" version="1" comment="openldap2-back-meta is &lt;2.2.24-4.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054894" version="1" comment="openldap2-back-monitor is &lt;2.2.24-4.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054895" version="1" comment="openldap2-back-perl is &lt;2.2.24-4.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054896" version="1" comment="openldap2-client-32bit is &lt;9-200909091106" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054897" version="1" comment="openldap2-client is &lt;2.2.24-4.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054898" version="1" comment="openldap2-devel-32bit is &lt;9-200909091106" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054899" version="1" comment="openldap2-devel is &lt;2.2.24-4.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054900" version="1" comment="openldap2 is &lt;2.2.24-4.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054901" version="1" comment="mutt is &lt;1.5.6i-64.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054810" version="1" comment="libxml-32bit is &lt;9-200909081614" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054811" version="1" comment="libxml-devel is &lt;1.8.17-366.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054812" version="1" comment="libxml is &lt;1.8.17-366.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053774" version="1" comment="libxml2-32bit is &lt;9-200908071409" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053775" version="1" comment="libxml2-devel is &lt;2.6.7-28.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053776" version="1" comment="libxml2 is &lt;2.6.7-28.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053893" version="1" comment="curl-32bit is &lt;9-200908071408" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053894" version="1" comment="curl-devel is &lt;7.11.0-39.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053895" version="1" comment="curl is &lt;7.11.0-39.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064554" version="1" comment="perl-Cyrus-IMAP is &lt;2.2.3-83.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064555" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.2.3-83.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055011" version="1" comment="freeswan is &lt;2.04_1.5.4-1.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053777" version="1" comment="fetchmail is &lt;6.2.5-49.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053778" version="1" comment="fetchmailconf is &lt;6.2.5-49.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054423" version="1" comment="kernel-default is &lt;2.6.5-7.319" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054424" version="1" comment="kernel-smp is &lt;2.6.5-7.319" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054425" version="1" comment="kernel-source is &lt;2.6.5-7.319" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054426" version="1" comment="kernel-syms is &lt;2.6.5-7.319" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054427" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.319" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054777" version="1" comment="gnutls-32bit is &lt;9-200909011222" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054778" version="1" comment="gnutls-devel-32bit is &lt;9-200909011222" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054779" version="1" comment="gnutls-devel is &lt;1.0.8-26.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054780" version="1" comment="gnutls is &lt;1.0.8-26.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055459" version="1" comment="ldapsmb is &lt;1.34b-64.1.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055460" version="1" comment="libsmbclient-32bit is &lt;9-200910020934" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055461" version="1" comment="libsmbclient-devel is &lt;3.0.26a-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055462" version="1" comment="libsmbclient is &lt;3.0.26a-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055463" version="1" comment="samba-32bit is &lt;9-200910020934" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055464" version="1" comment="samba-client-32bit is &lt;9-200910020934" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055465" version="1" comment="samba-client is &lt;3.0.26a-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055466" version="1" comment="samba-doc is &lt;3.0.26a-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055467" version="1" comment="samba-pdb is &lt;3.0.26a-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055468" version="1" comment="samba-python is &lt;3.0.26a-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055469" version="1" comment="samba-vscan is &lt;0.3.6b-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055470" version="1" comment="samba-winbind-32bit is &lt;9-200910020934" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055471" version="1" comment="samba-winbind is &lt;3.0.26a-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055472" version="1" comment="samba is &lt;3.0.26a-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055108" version="1" comment="freeradius-devel is &lt;1.0.5-2.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055109" version="1" comment="freeradius is &lt;1.0.5-2.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055012" version="1" comment="postgresql-contrib is &lt;7.4.26-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055013" version="1" comment="postgresql-devel is &lt;7.4.26-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055014" version="1" comment="postgresql-docs is &lt;7.4.26-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055015" version="1" comment="postgresql-libs-32bit is &lt;9-200909210011" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055016" version="1" comment="postgresql-libs is &lt;7.4.26-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055017" version="1" comment="postgresql-pl is &lt;7.4.26-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055018" version="1" comment="postgresql-server is &lt;7.4.26-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055019" version="1" comment="postgresql is &lt;7.4.26-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055770" version="1" comment="perl-Cyrus-IMAP is &lt;2.2.3-83.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055771" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.2.3-83.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056987" version="1" comment="cups-client is &lt;1.1.20-108.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056988" version="1" comment="cups-devel is &lt;1.1.20-108.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056989" version="1" comment="cups-libs-32bit is &lt;9-200912011928" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056990" version="1" comment="cups-libs is &lt;1.1.20-108.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056991" version="1" comment="cups is &lt;1.1.20-108.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056276" version="1" comment="openssl-32bit is &lt;9-200911130943" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056277" version="1" comment="openssl-devel-32bit is &lt;9-200911130943" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056278" version="1" comment="openssl-devel is &lt;0.9.7d-15.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056279" version="1" comment="openssl-doc is &lt;0.9.7d-15.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056280" version="1" comment="openssl is &lt;0.9.7d-15.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057198" version="1" comment="expat-32bit is &lt;9-201001081624" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057199" version="1" comment="expat is &lt;1.95.7-37.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056825" version="1" comment="expat-32bit is &lt;9-200912070059" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056826" version="1" comment="expat is &lt;1.95.7-37.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056878" version="1" comment="xntp-doc is &lt;4.2.0a-23.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056879" version="1" comment="xntp is &lt;4.2.0a-23.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056322" version="1" comment="expat-32bit is &lt;9-200910300949" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056323" version="1" comment="expat is &lt;1.95.7-37.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058468" version="1" comment="libtool-32bit is &lt;9-200912011711" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058469" version="1" comment="libtool is &lt;1.5.2-56.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057157" version="1" comment="flash-player is &lt;9.0.260.0-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057268" version="1" comment="postgresql-contrib is &lt;7.4.27-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057269" version="1" comment="postgresql-devel is &lt;7.4.27-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057270" version="1" comment="postgresql-docs is &lt;7.4.27-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057271" version="1" comment="postgresql-libs-32bit is &lt;9-201001081716" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057272" version="1" comment="postgresql-libs is &lt;7.4.27-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057273" version="1" comment="postgresql-pl is &lt;7.4.27-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057274" version="1" comment="postgresql-server is &lt;7.4.27-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057275" version="1" comment="postgresql is &lt;7.4.27-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057425" version="1" comment="gzip is &lt;1.3.5-136.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037643"/>
	</rpminfo_test>
 </tests>
 <objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sld-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iproute2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-vfs2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-vfs2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-vfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>XFree86-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3-fax</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-smp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-Max</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unarj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iptables</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java2-jre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-pdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-vscan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hylafax</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>enscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xine-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sharutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>snort</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncpfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DBI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>htdig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-pilot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gaim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>RealPlayer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telnet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>heimdal-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>heimdal-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>heimdal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-en-help</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-fi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-kde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-sk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-zh-CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-zh-TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qpopper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcpdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libredcarpet-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libredcarpet-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libredcarpet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rcd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rcd-modules-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rcd-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rcd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>red-carpet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atk-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcpcd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork3-nld-InstantMessenger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-tomcat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Compress-Zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netpbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-gdbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-mpz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>XFree86-Xvnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>XFree86-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-deat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-dom-inspector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-irc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-lib64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-mail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-venkman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-askpass</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgda-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgda</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libungif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liby2util-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liby2util</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipsec-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flash-player</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>heimdal-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>heimdal-lib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zoo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-digestmd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-et</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-pt-BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-sl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-tr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-spamassassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-kdm-SLD</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xine-lib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>arts-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>arts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>capi4hylafax</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmusicbrainz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-utils-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsf-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>screen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-non-mt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ldap-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xsupplicant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-prefork</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-worker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlrpc-c-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlrpc-c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>w3m</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_php4-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-bcmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-bz2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-ctype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-dba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-dbase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-domxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-exif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-fastcgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-filepro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-ftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-gettext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-iconv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-imap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-mbstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-mcal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-mcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-mhash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-mime_magic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-pear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-qtdom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-readline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-recode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-servlet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-session</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-shmop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-sockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-swf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-sysvsem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-sysvshm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-wddx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-xslt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-yp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-bench</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-shared</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lynx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zope</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmms-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unrar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>XFree86-Xnest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>XFree86-Xprt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>XFree86-Xvfb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>XFree86-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnomemeeting</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xscreensaver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldapsmb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xfsdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Net-DNS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ethereal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>t1lib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>t1lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>findutils-locate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>id3lib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>id3lib-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>id3lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmailconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icu-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icu-i18ndata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu26-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tk-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss_ldap-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss_ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-SNMP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>te_ams</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>te_cont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>te_dvilj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>te_eplai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>te_etex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>te_kpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>te_latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>te_mpost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>te_omega</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>te_pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>te_ptex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>te_web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>heimdal-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-core-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-meta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-monitor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmikmod-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmikmod</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-rus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-std</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-library</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-serv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpprint-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>epiphany-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>epiphany-extensions-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>epiphany-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>epiphany</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xine-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xine-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xine-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnumeric</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-Magick++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PerlMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xscreensaver-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>speex-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>speex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>speex-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vorbis-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rdesktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xemacs-packages-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xemacs-packages-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xemacs-packages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-nox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>XFree86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>km_ndiswrapper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-graphs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-backup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>valgrind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xntp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xntp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>multipath-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-excess</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-crammd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-otp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Cyrus-IMAP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Cyrus-SIEVE-managesieve</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>expat-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>expat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtool-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtool</name>
	</rpminfo_object>
 </objects>
 <states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">9</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.25-325.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.25-325.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.59-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8p1-37.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.7-866.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-28.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-46.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.17-366.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.8.3-32.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200504132212</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.1-6.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.99.902-43.35.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1-67.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.151</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.7-225.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.18-32.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.18-32.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.111.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.49-27.18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.20-108.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.4-1.34.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.65-131.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-42.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.9-95.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.0-324.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3-732.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.111.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.14-180.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-129.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.20-108.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1-44.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.010-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.9-2.1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.5-11.7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1-68.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.4-83.16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.8-24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.1-38.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-814.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.rc3a-106.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.111.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.07-48.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-45.10.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-45.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2c-710.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.4-25.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.41-28.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.6-402.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.3-88.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2b-621.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.4-83.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.4-83.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.8-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.7-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-68.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.18-33.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.7-225.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.155.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.3-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1-38.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.1rc3-55.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1-38.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.99.902-43.42.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.12-118.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-129.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-0.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.202.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1-44.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5-324.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.5-175.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.rc3a-106.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-346.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.49-27.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.1-49.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.8-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200508251319</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.8-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.8-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.4-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-26.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.1-38.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.0-5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200508151719</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.6-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.14-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.1-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200507130235</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200507191046</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.6-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.9-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.1-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200508261636</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.1-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.201</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.193</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.22pl4-193.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-70.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.0-0.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1-44.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-42.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.7p5-117.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.1rc3-55.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.24-4.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:169-28.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.19-29.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-70.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.33-30.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1-80.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2.5-49.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-42.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.1-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-618.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.11.4-172.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200712110030</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.3-88.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4-109.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.49-27.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.99.902-43.50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.18-32.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.7-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.6-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.8-5.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.78-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.7-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.75-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.6-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1p1-11.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-4.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12-72.39.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.7-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3-54.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.rc3a-106.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7d-15.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.0b1-585.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.22.0-62.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200511031328</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.14-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.11.4-172.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6-61.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.27-0.2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.11.0-39.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.20-108.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.8-5.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.252</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.19-29.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-618.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.11.4-172.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.11.4-172.6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.04_1.5.4-1.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.3-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-129.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200512171950</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.8.3-32.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2.5-49.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.7-225.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200601130434</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1-44.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.63.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-68.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.4-83.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.257</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1p1-11.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-68.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.10-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200602210430</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.1rc3-55.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200602210534</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-26.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.94-13.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200601210802</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.15.90.0.1.1-32.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.276</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200606132344</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.7-53.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.6-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.8-5.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.78-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.7-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.75-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.27-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10-851.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10-851.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.18-32.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.18-32.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.94-13.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.18-33.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.99.902-43.76</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-42.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200604240415</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.1-38.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.4-83.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.13-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200605291910</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200610302219</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.15.90.0.1.1-32.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.64-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1-0.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.0.0-2.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.94-13.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.1-920.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.1-38.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200606081412</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.rc3a-106.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0.12-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.4-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.9-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.80_seamonkey_1.0.4-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.9-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200606211826</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-35.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.286</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200609270654</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7d-15.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200610132325</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7d-15.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-68.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.10-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.8-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0.6-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.8-24.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.6i-64.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.68.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200612010115</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-182.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.8.2-88.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.20b-3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200607271200</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.1-38.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200607282027</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.7-53.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.282</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-42.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.99.902-43.78</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.283</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.7-225.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.10-2.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-68.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.29-71.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.18-32.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.7-225.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-110.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-214.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0.7-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.5-136.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200611140525</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.2.3-76.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200609140529</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7d-15.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:800.024-429.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200612081114</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.1-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.2-41.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.24-4.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-26.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200611230135</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.rc3a-106.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6-61.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200610230741</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1-36.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1-41.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1p1-11.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.3-88.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200610241503</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:169-28.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.69.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.7-225.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.7-225.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0.8-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-42.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.13-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200611160118</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.8-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.59-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200611171828</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.24-4.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1p1-11.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.9-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.8-1129.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.8-1129.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.9-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.9-1.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.9-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.9-1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.9-1.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.10-21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200701182000</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3-0.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.9-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0.10-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.4-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.8-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.80_seamonkey_1.0.4-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.25-325.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.99.902-43.82</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-68.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.10-2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1-67.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-42.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0.9-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-129.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.1_m17n_20030308-201.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200711150229</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4-109.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.4-43.85</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.59-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200711270035</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4-109.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200711192343</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4-109.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.18-32.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.5-30.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.14-0.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200701161730</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.rc3a-106.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.1rc13-28.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.124.0-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.20-108.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200701262020</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.2-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.7-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200704031835</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1-36.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1-41.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-129.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.20b-3.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1-44.69</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.17-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200704271846</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200704052143</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-44.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.20-108.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200704210224</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.20-108.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200706090005</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.6-28.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.99.902-43.85</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-11.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200703221214</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.rc3a-106.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-68.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.7-53.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.4-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.9-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.80_seamonkey_1.0.4-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0.12-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200703261521</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.09-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.7-225.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.3-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.19-29.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.16-2.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.70.0-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200705221253</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1-68.59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200705260110</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.3-88.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-182.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200705181249</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.20b-3.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-0.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.33-6.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200706251737</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.20b-3.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-0.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.287.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.18-32.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200706190007</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.12-118.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.25-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200711060115</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12-55.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200706182342</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.7-53.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.2.3-76.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200707301447</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-1.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2-235.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0.12-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.4-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.9-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.80_seamonkey_1.0.4-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200707091633</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-56.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4-0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.46-27.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.20-108.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200708071552</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200707170221</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1-36.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1-41.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.13-2.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.1-49.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.311</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200710221440</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-56.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-569.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-8.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200709191359</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1-36.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1-35.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1-41.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200709251619</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1-44.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.48.0-4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.115.0-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.151.0-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.20-108.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200711080439</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.7-860.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.3-86.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5-324.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2.5-49.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.33-6.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200711231829</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.20b-3.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-0.26.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200710182357</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0-387.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1p1-11.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.19-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200801312100</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-2.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200802280045</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.4-0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.9-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.80_seamonkey_1.0.4-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.9-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0.12-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200801101709</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.3-88.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.7-225.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.59-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200711080056</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.8.3-32.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200710031457</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7d-15.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200710031447</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.6-41.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-129.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-182.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.9-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200711231622</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.38-4.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200801062003</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.99.902-43.94</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200712041546</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:215-59.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3.1-0.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.20-108.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200712111651</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-195.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200712111659</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.1rc3-55.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.4-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.9-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.80_seamonkey_1.0.4-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.9-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0.12-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.33-6.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200712041731</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.20b-3.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-0.26.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.13-2.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.98.1-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.8-53.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.312</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200712191220</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-28.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-46.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200801091453</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.12-118.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.24-4.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200802110138</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.314</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200902271558</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.10-662.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.07.1rc1-195.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.6-46.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.2-2.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.4-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.9-1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.80_seamonkey_1.0.4-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.9-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0.12-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0.12-0.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.4-0.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.9-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.80_seamonkey_1.0.4-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.9-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.20-108.50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200803201838</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200803202027</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.rc3a-106.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.4-4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200801211531</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200801171028</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.rc3a-106.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.07.1rc1-195.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.6-46.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0.12-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.4-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.9-1.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.80_seamonkey_1.0.4-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.9-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200802060128</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.6-41.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-618.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.11.4-172.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.4-83.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.20-108.48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200803040015</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.1-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3.1-0.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.13-2.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.7-225.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-64.1.74</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200805282142</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.26a-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-0.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4-0.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-42.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-129.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.19-29.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200803201535</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-346.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.99.902-43.96</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200804151618</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-182.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200805201623</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-56.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.4-4.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200806172350</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200803271417</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.rc3a-106.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1p1-11.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200808010009</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.3-88.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.16-2.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200806201343</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3-54.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-86.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200804211655</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.rc3a-106.47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.20-108.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200804172236</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200805201632</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-58.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200806170342</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.7-53.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200807111457</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.8.3-32.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200808211659</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-26.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-129.48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20040202-54.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:21.3-185.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.0-194.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.0-194.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200808201417</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.1-38.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.99.902-43.98</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.9-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2-235.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1-1.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.59-1.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.24-4.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200808130009</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-129.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.13-2.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200901281640</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.rc3a-106.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.19-29.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200809051309</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-28.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-46.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-0.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-42.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200811141502</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.701.0-1.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.315</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.20-108.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200810021549</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.20-108.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200812030152</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.3-1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.4-43.87</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-814.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.13-2.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.18-32.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1p1-11.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200811201357</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-28.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-46.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200811071633</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-28.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3.1-0.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1-4.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.18-32.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-103.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11-34.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.22-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200812011728</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.3-88.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200901211340</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7d-15.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-814.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.152.0-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.4-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.9-1.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.80_seamonkey_1.0.4-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.9-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0.12-0.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200901211334</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.5-37.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200901202355</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-182.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3.1-0.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.0a-23.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.4-4.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200901120120</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.316</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200902201554</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.11.0-39.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200902171046</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-182.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200902251715</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-182.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.159.0-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.7-75.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.20-108.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200904161449</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.0a-23.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.1-8.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200903091206</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12-55.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4-0.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.07.1rc1-195.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.6-46.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200904292143</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3-0.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200904151544</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7d-15.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200905141649</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.18-33.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200912160015</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1-44.77</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.1rc13-28.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.4-4.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200907291720</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.20-108.61</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200906022331</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.317</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.246.0-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.25-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200903241522</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200904162346</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.7-53.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.321</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200905071455</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.rc3a-106.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.2-2.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.1.17-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.8.2-88.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-0.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.318</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.1-8.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.3-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.7-225.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.59-1.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200906232031</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-182.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.04_1.5.4-1.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200904061139</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.1-38.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200908071506</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.1-38.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.2-2.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.1.18-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.24-4.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200909091106</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.6i-64.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200909081614</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.17-366.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200908071409</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-28.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200908071408</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.11.0-39.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3-83.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.04_1.5.4-1.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2.5-49.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.319</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200909011222</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-26.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-64.1.76</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200910020934</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.26a-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-0.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-2.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.26-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200909210011</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3-83.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.20-108.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200912011928</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200911130943</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7d-15.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201001081624</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.95.7-37.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200912070059</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.95.7-37.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.0a-23.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200910300949</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.95.7-37.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200912011711</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-56.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.260.0-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.27-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201001081716</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.5-136.16</evr>
  </rpminfo_state>
 </states>
</oval_definitions>
