<?xml version="1.0" encoding="UTF-8"?>
<oval_definitions
	xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
	xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
	xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
	xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
	xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
  <generator>
      <oval:product_name>Marcus OVAL Generator</oval:product_name>
      <oval:schema_version>5.5</oval:schema_version>
      <oval:timestamp>2012-11-01T04:02:43</oval:timestamp>
  </generator>
  <definitions>
<definition id="oval:org.opensuse.security:def:20054790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-4790</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2005-4790" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4790" source="CVE"/>
	<description>
	Multiple untrusted search path vulnerabilities in SUSE Linux 9.3 and 10.0, and possibly other distributions, cause the working directory to be added to LD_LIBRARY_PATH, which might allow local users to execute arbitrary code via (1) beagle, (2) tomboy, or (3) blam.  NOTE: in August 2007, the tomboy vector was reported for other distributions.
	</description>
 </metadata>
<!-- 6dd48677ec191fa7d9fdef481ba2a8ee -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034022" comment="tomboy less than 0.8.0-9.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1861</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2006-1861" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1861" source="CVE"/>
	<description>
	Multiple integer overflows in FreeType before 2.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via attack vectors related to (1) bdf/bdflib.c, (2) sfnt/ttcmap.c, (3) cff/cffgload.c, and (4) the read_lwfn function and a crafted LWFN file in base/ftmac.c.  NOTE: item 4 was originally identified by CVE-2006-2493.
	</description>
 </metadata>
<!-- e9051a44079d3f69cc1996bc53a8ac1b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034023" comment="NX less than 2.1.0-35.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2894</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2006-2894" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2894" source="CVE"/>
	<description>
	Mozilla Firefox 1.5.0.4, 2.0.x before 2.0.0.8, Mozilla Suite 1.7.13, Mozilla SeaMonkey 1.0.2 and other versions before 1.1.5, and Netscape 8.1 and earlier allow user-assisted remote attackers to read arbitrary files by tricking a user into typing the characters of the target filename in a text box and using the OnKeyDown, OnKeyPress, and OnKeyUp Javascript keystroke events to change the focus and cause those characters to be inserted into a file upload input control, which can then upload the file when the user submits the form.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3c2104dbe6890645fc7a4a2511454f72 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034024" comment="seamonkey-dom-inspector less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034025" comment="seamonkey-irc less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034026" comment="seamonkey-mail less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034027" comment="seamonkey-spellchecker less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034028" comment="seamonkey-venkman less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034029" comment="seamonkey less than 1.1.5-0.1"/>
		</criteria>
	</criteria>
	<!-- e075a64414ec276d1ef5641c9170f366 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034030" comment="MozillaFirefox-translations less than 2.0.0.8-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034031" comment="MozillaFirefox less than 2.0.0.8-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3467</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2006-3467" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3467" source="CVE"/>
	<description>
	Integer overflow in FreeType before 2.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PCF file, as demonstrated by the Red Hat bad1.pcf test file, due to a partial fix of CVE-2006-1861.
	</description>
 </metadata>
<!-- e9051a44079d3f69cc1996bc53a8ac1b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034023" comment="NX less than 2.1.0-35.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4484</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2006-4484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4484" source="CVE"/>
	<description>
	Buffer overflow in the LWZReadByte_ function in ext/gd/libgd/gd_gif_in.c in the GD extension in PHP before 5.1.5 allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 92964e9c602e02009a76911891903746 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034032" comment="perl-Tk less than 804.027-95.2"/>
	</criteria>
	<!-- ab5a31733d5d4eb3e990eef6a50da2c5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034033" comment="tkimg less than 1.3-125.2"/>
	</criteria>
	<!-- d1529b954f0e9cddfcd0451e625ee890 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034034" comment="SDL_image-32bit less than 1.2.6-25.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034035" comment="SDL_image-64bit less than 1.2.6-25.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034036" comment="SDL_image-devel less than 1.2.6-25.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034037" comment="SDL_image less than 1.2.6-25.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4965</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2006-4965" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4965" source="CVE"/>
	<description>
	Apple QuickTime 7.1.3 Player and Plug-In allows remote attackers to execute arbitrary JavaScript code and possibly conduct other attacks via a QuickTime Media Link (QTL) file with an embed XML element and a qtnext parameter that identifies resources outside of the original domain.  NOTE: as of 20070912, this issue has been demonstrated by using instances of Components.interfaces.nsILocalFile and Components.interfaces.nsIProcess to execute arbitrary local files within Firefox and possibly Internet Explorer.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3c2104dbe6890645fc7a4a2511454f72 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034024" comment="seamonkey-dom-inspector less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034025" comment="seamonkey-irc less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034026" comment="seamonkey-mail less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034027" comment="seamonkey-spellchecker less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034028" comment="seamonkey-venkman less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034029" comment="seamonkey less than 1.1.5-0.1"/>
		</criteria>
	</criteria>
	<!-- e075a64414ec276d1ef5641c9170f366 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034030" comment="MozillaFirefox-translations less than 2.0.0.8-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034031" comment="MozillaFirefox less than 2.0.0.8-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5752</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2006-5752" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5752" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in mod_status.c in the mod_status module in Apache HTTP Server (httpd), when ExtendedStatus is enabled and a public server-status page is used, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving charsets with browsers that perform "charset detection" when the content-type is not specified.
	</description>
 </metadata>
<!-- c87d7d6f13eecbbff1c15cf9437be9e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034038" comment="apache2-devel less than 2.2.4-70.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034039" comment="apache2-doc less than 2.2.4-70.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034040" comment="apache2-example-pages less than 2.2.4-70.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034041" comment="apache2-prefork less than 2.2.4-70.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034042" comment="apache2-utils less than 2.2.4-70.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034043" comment="apache2-worker less than 2.2.4-70.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034044" comment="apache2 less than 2.2.4-70.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6058</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2006-6058" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6058" source="CVE"/>
	<description>
	The minix filesystem code in Linux kernel 2.6.x before 2.6.24, including 2.6.18, allows local users to cause a denial of service (hang) via a malformed minix file stream that triggers an infinite loop in the minix_bmap function.  NOTE: this issue might be due to an integer overflow or signedness error.
	</description>
 </metadata>
<!-- cc6ecd74a91505e1032662fa61b388ac -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034045" comment="kernel-bigsmp less than 2.6.22.12-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034046" comment="kernel-debug less than 2.6.22.12-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034047" comment="kernel-default less than 2.6.22.12-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034048" comment="kernel-kdump less than 2.6.22.12-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034049" comment="kernel-ppc64 less than 2.6.22.12-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034050" comment="kernel-source less than 2.6.22.12-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034051" comment="kernel-syms less than 2.6.22.12-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034052" comment="kernel-xen less than 2.6.22.12-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034053" comment="kernel-xenpae less than 2.6.22.12-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20067232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-7232</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2006-7232" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7232" source="CVE"/>
	<description>
	sql_select.cc in MySQL 5.0.x before 5.0.32 and 5.1.x before 5.1.14 allows remote authenticated users to cause a denial of service (crash) via an EXPLAIN SELECT FROM on the INFORMATION_SCHEMA table, as originally demonstrated using ORDER BY.
	</description>
 </metadata>
<!-- c4b7968ba8262091c58a73fdf922c22a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034054" comment="libmysqlclient-devel less than 5.0.45-22.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034055" comment="libmysqlclient15-32bit less than 5.0.45-22.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034056" comment="libmysqlclient15-64bit less than 5.0.45-22.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034057" comment="libmysqlclient15 less than 5.0.45-22.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034058" comment="libmysqlclient_r15-32bit less than 5.0.45-22.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034059" comment="libmysqlclient_r15-64bit less than 5.0.45-22.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034060" comment="libmysqlclient_r15 less than 5.0.45-22.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034061" comment="mysql-Max less than 5.0.45-22.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034062" comment="mysql-bench less than 5.0.45-22.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034063" comment="mysql-client less than 5.0.45-22.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034064" comment="mysql-debug less than 5.0.45-22.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034065" comment="mysql-tools less than 5.0.45-22.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034066" comment="mysql less than 5.0.45-22.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0045</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-0045" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0045" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in Adobe Acrobat Reader Plugin before 8.0.0, and possibly the plugin distributed with Adobe Reader 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2, for Mozilla Firefox, Microsoft Internet Explorer 6 SP1, Google Chrome, Opera 8.5.4 build 770, and Opera 9.10.8679 on Windows allow remote attackers to inject arbitrary JavaScript and conduct other attacks via a .pdf URL with a javascript: or res: URI with (1) FDF, (2) XML, and (3) XFDF AJAX parameters, or (4) an arbitrarily named name=URI anchor identifier, aka "Universal XSS (UXSS)."
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055718" comment="acroread less than 8.1.7-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0048</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-0048" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0048" source="CVE"/>
	<description>
	Adobe Acrobat Reader Plugin before 8.0.0, and possibly the plugin distributed with Adobe Reader 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2, when used with Internet Explorer, Google Chrome, or Opera, allows remote attackers to cause a denial of service (memory consumption) via a long sequence of # (hash) characters appended to a PDF URL, related to a "cross-site scripting issue."
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055718" comment="acroread less than 8.1.7-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0062</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-0062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0062" source="CVE"/>
	<description>
	Integer overflow in the ISC dhcpd 3.0.x before 3.0.7 and 3.1.x before 3.1.1; and the DHCP server in EMC VMware Workstation before 5.5.5 Build 56455 and 6.x before 6.0.1 Build 55017, Player before 1.0.5 Build 56455 and Player 2 before 2.0.1 Build 55017, ACE before 1.0.3 Build 54075 and ACE 2 before 2.0.1 Build 55017, and Server before 1.0.4 Build 56528; allows remote attackers to cause a denial of service (daemon crash) or execute arbitrary code via a malformed DHCP packet with a large dhcp-max-message-size that triggers a stack-based buffer overflow, related to servers configured to send many DHCP options to clients.
	</description>
 </metadata>
<!-- edccb6f74b7805eeb37eaeb2b261a565 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034067" comment="dhcp-client less than 3.0.6-24.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034068" comment="dhcp-devel less than 3.0.6-24.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034069" comment="dhcp-relay less than 3.0.6-24.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034070" comment="dhcp-server less than 3.0.6-24.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034071" comment="dhcp less than 3.0.6-24.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0071</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-0071" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0071" source="CVE"/>
	<description>
	Integer overflow in Adobe Flash Player 9.0.115.0 and earlier, and 8.0.39.0 and earlier, allows remote attackers to execute arbitrary code via a crafted SWF file with a negative Scene Count value, which passes a signed comparison, is used as an offset of a NULL pointer, and triggers a buffer overflow.
	</description>
 </metadata>
<!-- 140c8f76fc987fafe79a6a7581620944 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031150" comment="flash-player less than 9.0.124.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0469</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-0469" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0469" source="CVE"/>
	<description>
	The extract_files function in installer.rb in RubyGems before 0.9.1 does not check whether files exist before overwriting them, which allows user-assisted remote attackers to overwrite arbitrary files, cause a denial of service, or execute arbitrary code via crafted GEM packages.
	</description>
 </metadata>
<!-- c1662a1ab1748a9425d0d104bc886a02 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034072" comment="rubygems less than 0.9.2-4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034073" comment="rubygems less than 0.9.2-4.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034074" comment="rubygems less than 0.9.2-5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1003</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-1003" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1003" source="CVE"/>
	<description>
	Integer overflow in ALLOCATE_LOCAL in the ProcXCMiscGetXIDList function in the XC-MISC extension in the X.Org X11 server (xserver) 7.1-1.1.0, and other versions before 20070403, allows remote authenticated users to execute arbitrary code via a large expression, which results in memory corruption.
	</description>
 </metadata>
<!-- e3fe1967d917baff2bbc65ac91d7f05f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034075" comment="xgl less than git_070104-77.3"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1095</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-1095" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1095" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5 do not properly implement JavaScript onUnload handlers, which allows remote attackers to run certain JavaScript code and access the location DOM hierarchy in the context of the next web site that is visited by a client.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3c2104dbe6890645fc7a4a2511454f72 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034024" comment="seamonkey-dom-inspector less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034025" comment="seamonkey-irc less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034026" comment="seamonkey-mail less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034027" comment="seamonkey-spellchecker less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034028" comment="seamonkey-venkman less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034029" comment="seamonkey less than 1.1.5-0.1"/>
		</criteria>
	</criteria>
	<!-- e075a64414ec276d1ef5641c9170f366 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034030" comment="MozillaFirefox-translations less than 2.0.0.8-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034031" comment="MozillaFirefox less than 2.0.0.8-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1659</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-1659" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1659" source="CVE"/>
	<description>
	Perl-Compatible Regular Expression (PCRE) library before 7.3 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via regex patterns containing unmatched "\Q\E" sequences with orphan "\E" codes.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bb486dce61f57cd04e5ba001043a648 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034076" comment="glib2-32bit less than 2.14.1-4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034077" comment="glib2-64bit less than 2.14.1-4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034078" comment="glib2-devel-64bit less than 2.14.1-4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034079" comment="glib2-devel less than 2.14.1-4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034080" comment="glib2-doc less than 2.14.1-4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034081" comment="glib2 less than 2.14.1-4.2"/>
		</criteria>
	</criteria>
	<!-- 9fc1825b45092785efcf903d98246498 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034082" comment="pcre-32bit less than 7.2-14.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034083" comment="pcre-64bit less than 7.2-14.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034084" comment="pcre-devel less than 7.2-14.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034085" comment="pcre less than 7.2-14.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1660</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-1660" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1660" source="CVE"/>
	<description>
	Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate sizes for unspecified "multiple forms of character class", which triggers a buffer overflow that allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bb486dce61f57cd04e5ba001043a648 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034076" comment="glib2-32bit less than 2.14.1-4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034077" comment="glib2-64bit less than 2.14.1-4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034078" comment="glib2-devel-64bit less than 2.14.1-4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034079" comment="glib2-devel less than 2.14.1-4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034080" comment="glib2-doc less than 2.14.1-4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034081" comment="glib2 less than 2.14.1-4.2"/>
		</criteria>
	</criteria>
	<!-- 9fc1825b45092785efcf903d98246498 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034082" comment="pcre-32bit less than 7.2-14.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034083" comment="pcre-64bit less than 7.2-14.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034084" comment="pcre-devel less than 7.2-14.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034085" comment="pcre less than 7.2-14.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1661</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-1661" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1661" source="CVE"/>
	<description>
	Perl-Compatible Regular Expression (PCRE) library before 7.3 backtracks too far when matching certain input bytes against some regex patterns in non-UTF-8 mode, which allows context-dependent attackers to obtain sensitive information or cause a denial of service (crash), as demonstrated by the "\X?\d" and "\P{L}?\d" patterns.
	</description>
 </metadata>
<!-- 9fc1825b45092785efcf903d98246498 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034082" comment="pcre-32bit less than 7.2-14.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034083" comment="pcre-64bit less than 7.2-14.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034084" comment="pcre-devel less than 7.2-14.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034085" comment="pcre less than 7.2-14.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1841</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-1841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1841" source="CVE"/>
	<description>
	The isakmp_info_recv function in src/racoon/isakmp_inf.c in racoon in Ipsec-tools before 0.6.7 allows remote attackers to cause a denial of service (tunnel crash) via crafted (1) DELETE (ISAKMP_NPTYPE_D) and (2) NOTIFY (ISAKMP_NPTYPE_N) messages.
	</description>
 </metadata>
<!-- 82108351d75558d604a30c31bd295d86 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034086" comment="novell-ipsec-tools-devel less than 0.6.3-114.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034087" comment="novell-ipsec-tools less than 0.6.3-114.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1858</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-1858" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1858" source="CVE"/>
	<description>
	The default SSL cipher configuration in Apache Tomcat 4.1.28 through 4.1.31, 5.0.0 through 5.0.30, and 5.5.0 through 5.5.17 uses certain insecure ciphers, including the anonymous cipher, which allows remote attackers to obtain sensitive information or have other, unspecified impacts.
	</description>
 </metadata>
<!-- 16f42027b94a5b9cb6f7b7b079a64215 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034088" comment="tomcat55-admin-webapps less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034089" comment="tomcat55-common-lib less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034090" comment="tomcat55-jasper-javadoc less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034091" comment="tomcat55-jasper less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034092" comment="tomcat55-jsp-2_0-api-javadoc less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034093" comment="tomcat55-jsp-2_0-api less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034094" comment="tomcat55-server-lib less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034095" comment="tomcat55-servlet-2_4-api-javadoc less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034096" comment="tomcat55-servlet-2_4-api less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034097" comment="tomcat55-webapps less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034098" comment="tomcat55 less than 5.5.23-113.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1860</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-1860" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1860" source="CVE"/>
	<description>
	mod_jk in Apache Tomcat JK Web Server Connector 1.2.x before 1.2.23 decodes request URLs within the Apache HTTP Server before passing the URL to Tomcat, which allows remote attackers to access protected pages via a crafted prefix JkMount, possibly involving double-encoded .. (dot dot) sequences and directory traversal, a related issue to CVE-2007-0450.
	</description>
 </metadata>
<!-- 365dbb435ab00d239dd3b2a2bdb87dc2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034099" comment="apache2-mod_jk less than 1.2.21-59.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034100" comment="tomcat55-admin-webapps less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034101" comment="tomcat55-common-lib less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034102" comment="tomcat55-jasper-javadoc less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034103" comment="tomcat55-jasper less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034104" comment="tomcat55-jsp-2_0-api-javadoc less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034105" comment="tomcat55-jsp-2_0-api less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034106" comment="tomcat55-server-lib less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034107" comment="tomcat55-servlet-2_4-api-javadoc less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034108" comment="tomcat55-servlet-2_4-api less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034109" comment="tomcat55-webapps less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034110" comment="tomcat55 less than 5.5.23-113.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1862</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-1862" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1862" source="CVE"/>
	<description>
	The recall_headers function in mod_mem_cache in Apache 2.2.4 does not properly copy all levels of header data, which can cause Apache to return HTTP headers containing previously used data, which could be used by remote attackers to obtain potentially sensitive information.
	</description>
 </metadata>
<!-- c87d7d6f13eecbbff1c15cf9437be9e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034038" comment="apache2-devel less than 2.2.4-70.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034039" comment="apache2-doc less than 2.2.4-70.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034040" comment="apache2-example-pages less than 2.2.4-70.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034041" comment="apache2-prefork less than 2.2.4-70.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034042" comment="apache2-utils less than 2.2.4-70.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034043" comment="apache2-worker less than 2.2.4-70.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034044" comment="apache2 less than 2.2.4-70.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1863</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-1863" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1863" source="CVE"/>
	<description>
	cache_util.c in the mod_cache module in Apache HTTP Server (httpd), when caching is enabled and a threaded Multi-Processing Module (MPM) is used, allows remote attackers to cause a denial of service (child processing handler crash) via a request with the (1) s-maxage, (2) max-age, (3) min-fresh, or (4) max-stale Cache-Control headers without a value.
	</description>
 </metadata>
<!-- c87d7d6f13eecbbff1c15cf9437be9e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034038" comment="apache2-devel less than 2.2.4-70.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034039" comment="apache2-doc less than 2.2.4-70.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034040" comment="apache2-example-pages less than 2.2.4-70.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034041" comment="apache2-prefork less than 2.2.4-70.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034042" comment="apache2-utils less than 2.2.4-70.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034043" comment="apache2-worker less than 2.2.4-70.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034044" comment="apache2 less than 2.2.4-70.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2292</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-2292" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2292" source="CVE"/>
	<description>
	CRLF injection vulnerability in the Digest Authentication support for Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5 allows remote attackers to conduct HTTP request splitting attacks via LF (%0a) bytes in the username attribute.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3c2104dbe6890645fc7a4a2511454f72 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034024" comment="seamonkey-dom-inspector less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034025" comment="seamonkey-irc less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034026" comment="seamonkey-mail less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034027" comment="seamonkey-spellchecker less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034028" comment="seamonkey-venkman less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034029" comment="seamonkey less than 1.1.5-0.1"/>
		</criteria>
	</criteria>
	<!-- e075a64414ec276d1ef5641c9170f366 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034030" comment="MozillaFirefox-translations less than 2.0.0.8-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034031" comment="MozillaFirefox less than 2.0.0.8-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2449</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-2449" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2449" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in certain JSP files in the examples web application in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.24, and 6.0.0 through 6.0.13 allow remote attackers to inject arbitrary web script or HTML via the portion of the URI after the ';' character, as demonstrated by a URI containing a "snp/snoop.jsp;" sequence.
	</description>
 </metadata>
<!-- 16f42027b94a5b9cb6f7b7b079a64215 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034088" comment="tomcat55-admin-webapps less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034089" comment="tomcat55-common-lib less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034090" comment="tomcat55-jasper-javadoc less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034091" comment="tomcat55-jasper less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034092" comment="tomcat55-jsp-2_0-api-javadoc less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034093" comment="tomcat55-jsp-2_0-api less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034094" comment="tomcat55-server-lib less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034095" comment="tomcat55-servlet-2_4-api-javadoc less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034096" comment="tomcat55-servlet-2_4-api less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034097" comment="tomcat55-webapps less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034098" comment="tomcat55 less than 5.5.23-113.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2450</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-2450" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2450" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in the (1) Manager and (2) Host Manager web applications in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.24, and 6.0.0 through 6.0.13 allow remote authenticated users to inject arbitrary web script or HTML via a parameter name to manager/html/upload, and other unspecified vectors.
	</description>
 </metadata>
<!-- 16f42027b94a5b9cb6f7b7b079a64215 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034088" comment="tomcat55-admin-webapps less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034089" comment="tomcat55-common-lib less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034090" comment="tomcat55-jasper-javadoc less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034091" comment="tomcat55-jasper less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034092" comment="tomcat55-jsp-2_0-api-javadoc less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034093" comment="tomcat55-jsp-2_0-api less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034094" comment="tomcat55-server-lib less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034095" comment="tomcat55-servlet-2_4-api-javadoc less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034096" comment="tomcat55-servlet-2_4-api less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034097" comment="tomcat55-webapps less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034098" comment="tomcat55 less than 5.5.23-113.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2583</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-2583" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2583" source="CVE"/>
	<description>
	The in_decimal::set function in item_cmpfunc.cc in MySQL before 5.0.40, and 5.1 before 5.1.18-beta, allows context-dependent attackers to cause a denial of service (crash) via a crafted IF clause that results in a divide-by-zero error and a NULL pointer dereference.
	</description>
 </metadata>
<!-- a254dbd54a164c6197e3fbdf34bf84e6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034111" comment="libmysqlclient-devel less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034112" comment="libmysqlclient15-32bit less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034113" comment="libmysqlclient15-64bit less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034114" comment="libmysqlclient15 less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034115" comment="libmysqlclient_r15-32bit less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034116" comment="libmysqlclient_r15-64bit less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034117" comment="libmysqlclient_r15 less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034118" comment="mysql-Max less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034119" comment="mysql-bench less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034120" comment="mysql-client less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034121" comment="mysql-debug less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034122" comment="mysql-tools less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034123" comment="mysql less than 5.0.45-22.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2691</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-2691" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2691" source="CVE"/>
	<description>
	MySQL before 4.1.23, 5.0.x before 5.0.42, and 5.1.x before 5.1.18 does not require the DROP privilege for RENAME TABLE statements, which allows remote authenticated users to rename arbitrary tables.
	</description>
 </metadata>
<!-- a254dbd54a164c6197e3fbdf34bf84e6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034111" comment="libmysqlclient-devel less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034112" comment="libmysqlclient15-32bit less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034113" comment="libmysqlclient15-64bit less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034114" comment="libmysqlclient15 less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034115" comment="libmysqlclient_r15-32bit less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034116" comment="libmysqlclient_r15-64bit less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034117" comment="libmysqlclient_r15 less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034118" comment="mysql-Max less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034119" comment="mysql-bench less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034120" comment="mysql-client less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034121" comment="mysql-debug less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034122" comment="mysql-tools less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034123" comment="mysql less than 5.0.45-22.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2692</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-2692" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2692" source="CVE"/>
	<description>
	The mysql_change_db function in MySQL 5.0.x before 5.0.40 and 5.1.x before 5.1.18 does not restore THD::db_access privileges when returning from SQL SECURITY INVOKER stored routines, which allows remote authenticated users to gain privileges.
	</description>
 </metadata>
<!-- a254dbd54a164c6197e3fbdf34bf84e6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034111" comment="libmysqlclient-devel less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034112" comment="libmysqlclient15-32bit less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034113" comment="libmysqlclient15-64bit less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034114" comment="libmysqlclient15 less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034115" comment="libmysqlclient_r15-32bit less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034116" comment="libmysqlclient_r15-64bit less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034117" comment="libmysqlclient_r15 less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034118" comment="mysql-Max less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034119" comment="mysql-bench less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034120" comment="mysql-client less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034121" comment="mysql-debug less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034122" comment="mysql-tools less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034123" comment="mysql less than 5.0.45-22.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2721</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-2721" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2721" source="CVE"/>
	<description>
	The jpc_qcx_getcompparms function in jpc/jpc_cs.c for the JasPer JPEG-2000 library (libjasper) before 1.900 allows remote user-assisted attackers to cause a denial of service (crash) and possibly corrupt the heap via malformed image files, as originally demonstrated using imagemagick convert.
	</description>
 </metadata>
<!-- f132136b0b7c36a77994eb1dfaf5417a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034124" comment="libnetpbm-devel less than 10.26.44-10.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034125" comment="libnetpbm10-32bit less than 10.26.44-10.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034126" comment="libnetpbm10-64bit less than 10.26.44-10.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034127" comment="libnetpbm10 less than 10.26.44-10.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034128" comment="netpbm less than 10.26.44-10.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2741</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-2741" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2741" source="CVE"/>
	<description>
	Stack-based buffer overflow in Little CMS (lcms) before 1.15 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted ICC profile in a JPG file.
	</description>
 </metadata>
<!-- 5c50785a43b3577d8589c734c514d0bd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034129" comment="liblcms-32bit less than 1.16-39.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034130" comment="liblcms-64bit less than 1.16-39.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034131" comment="liblcms-devel-32bit less than 1.16-39.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034132" comment="liblcms-devel-64bit less than 1.16-39.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034133" comment="liblcms-devel less than 1.16-39.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034134" comment="liblcms less than 1.16-39.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2958</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-2958" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2958" source="CVE"/>
	<description>
	Format string vulnerability in the inc_put_error function in src/inc.c in Sylpheed 2.4.4, and Sylpheed-Claws (Claws Mail) 1.9.100 and 2.10.0, allows remote POP3 servers to execute arbitrary code via format string specifiers in crafted replies.
	</description>
 </metadata>
<!-- 1411f4f44555c9f0138d5bd0a882692b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034135" comment="claws-mail-devel less than 2.10.0-35.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034136" comment="claws-mail less than 2.10.0-35.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3112</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-3112" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3112" source="CVE"/>
	<description>
	graph_image.php in Cacti 0.8.6i, and possibly other versions, allows remote authenticated users to cause a denial of service (CPU consumption) via a large value of the (1) graph_start or (2) graph_end parameter, different vectors than CVE-2007-3113.
	</description>
 </metadata>
<!-- 48edf26b734bd0da8e62457f30699892 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034137" comment="cacti less than 0.8.6j-62"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3113</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-3113" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3113" source="CVE"/>
	<description>
	Cacti 0.8.6i, and possibly other versions, allows remote authenticated users to cause a denial of service (CPU consumption) via a large value of the (1) graph_height or (2) graph_width parameter, different vectors than CVE-2007-3112.
	</description>
 </metadata>
<!-- 48edf26b734bd0da8e62457f30699892 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034137" comment="cacti less than 0.8.6j-62"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3227</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-3227" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3227" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in the to_json (ActiveRecord::Base#to_json) function in Ruby on Rails before edge 9606 allows remote attackers to inject arbitrary web script via the input values.
	</description>
 </metadata>
<!-- f684f2796a6f3e5eb78a319b9997fee8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034138" comment="rubygem-activesupport less than 1.4.2-20.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3304</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-3304" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3304" source="CVE"/>
	<description>
	Apache httpd 1.3.37, 2.0.59, and 2.2.4 with the Prefork MPM module, allows local users to cause a denial of service by modifying the worker_score and process_score arrays to reference an arbitrary process ID, which is sent a SIGUSR1 signal from the master process, aka "SIGUSR1 killer."
	</description>
 </metadata>
<!-- c87d7d6f13eecbbff1c15cf9437be9e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034038" comment="apache2-devel less than 2.2.4-70.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034039" comment="apache2-doc less than 2.2.4-70.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034040" comment="apache2-example-pages less than 2.2.4-70.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034041" comment="apache2-prefork less than 2.2.4-70.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034042" comment="apache2-utils less than 2.2.4-70.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034043" comment="apache2-worker less than 2.2.4-70.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034044" comment="apache2 less than 2.2.4-70.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3382</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-3382" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3382" source="CVE"/>
	<description>
	Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 treats single quotes ("'") as delimiters in cookies, which might cause sensitive information such as session IDs to be leaked and allow remote attackers to conduct session hijacking attacks.
	</description>
 </metadata>
<!-- 365dbb435ab00d239dd3b2a2bdb87dc2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034099" comment="apache2-mod_jk less than 1.2.21-59.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034100" comment="tomcat55-admin-webapps less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034101" comment="tomcat55-common-lib less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034102" comment="tomcat55-jasper-javadoc less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034103" comment="tomcat55-jasper less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034104" comment="tomcat55-jsp-2_0-api-javadoc less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034105" comment="tomcat55-jsp-2_0-api less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034106" comment="tomcat55-server-lib less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034107" comment="tomcat55-servlet-2_4-api-javadoc less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034108" comment="tomcat55-servlet-2_4-api less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034109" comment="tomcat55-webapps less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034110" comment="tomcat55 less than 5.5.23-113.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3385</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-3385" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3385" source="CVE"/>
	<description>
	Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 does not properly handle the \" character sequence in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks.
	</description>
 </metadata>
<!-- 365dbb435ab00d239dd3b2a2bdb87dc2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034099" comment="apache2-mod_jk less than 1.2.21-59.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034100" comment="tomcat55-admin-webapps less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034101" comment="tomcat55-common-lib less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034102" comment="tomcat55-jasper-javadoc less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034103" comment="tomcat55-jasper less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034104" comment="tomcat55-jsp-2_0-api-javadoc less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034105" comment="tomcat55-jsp-2_0-api less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034106" comment="tomcat55-server-lib less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034107" comment="tomcat55-servlet-2_4-api-javadoc less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034108" comment="tomcat55-servlet-2_4-api less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034109" comment="tomcat55-webapps less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034110" comment="tomcat55 less than 5.5.23-113.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3386</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-3386" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3386" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in the Host Manager Servlet for Apache Tomcat 6.0.0 to 6.0.13 and 5.5.0 to 5.5.24 allows remote attackers to inject arbitrary HTML and web script via crafted requests, as demonstrated using the aliases parameter to an html/add action.
	</description>
 </metadata>
<!-- 365dbb435ab00d239dd3b2a2bdb87dc2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034099" comment="apache2-mod_jk less than 1.2.21-59.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034100" comment="tomcat55-admin-webapps less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034101" comment="tomcat55-common-lib less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034102" comment="tomcat55-jasper-javadoc less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034103" comment="tomcat55-jasper less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034104" comment="tomcat55-jsp-2_0-api-javadoc less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034105" comment="tomcat55-jsp-2_0-api less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034106" comment="tomcat55-server-lib less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034107" comment="tomcat55-servlet-2_4-api-javadoc less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034108" comment="tomcat55-servlet-2_4-api less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034109" comment="tomcat55-webapps less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034110" comment="tomcat55 less than 5.5.23-113.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3511</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-3511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3511" source="CVE"/>
	<description>
	The focus handling for the onkeydown event in Mozilla Firefox 1.5.0.12, 2.0.0.4 and other versions before 2.0.0.8, and SeaMonkey before 1.1.5 allows remote attackers to change field focus and copy keystrokes via the "for" attribute in a label, which bypasses the focus prevention, as demonstrated by changing focus from a textarea to a file upload field.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3c2104dbe6890645fc7a4a2511454f72 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034024" comment="seamonkey-dom-inspector less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034025" comment="seamonkey-irc less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034026" comment="seamonkey-mail less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034027" comment="seamonkey-spellchecker less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034028" comment="seamonkey-venkman less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034029" comment="seamonkey less than 1.1.5-0.1"/>
		</criteria>
	</criteria>
	<!-- e075a64414ec276d1ef5641c9170f366 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034030" comment="MozillaFirefox-translations less than 2.0.0.8-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034031" comment="MozillaFirefox less than 2.0.0.8-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3843</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-3843" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3843" source="CVE"/>
	<description>
	The Linux kernel before 2.6.23-rc1 checks the wrong global variable for the CIFS sec mount option, which might allow remote attackers to spoof CIFS network traffic that the client configured for security signatures, as demonstrated by lack of signing despite sec=ntlmv2i in a SetupAndX request.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7fa3668378a0007b680c23ffc2916d63 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034139" comment="kernel-bigsmp less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034140" comment="kernel-debug less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034141" comment="kernel-default less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034142" comment="kernel-kdump less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034143" comment="kernel-ppc64 less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034144" comment="kernel-rt less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034145" comment="kernel-rt_debug less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034146" comment="kernel-source less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034147" comment="kernel-syms less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034148" comment="kernel-xen less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034149" comment="kernel-xenpae less than 2.6.22.16-0.2"/>
		</criteria>
	</criteria>
	<!-- 8b56e6bf4853c873dce7504107f8bea4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034150" comment="kernel-bigsmp less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034151" comment="kernel-debug less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034152" comment="kernel-default less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034153" comment="kernel-kdump less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034154" comment="kernel-ppc64 less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034155" comment="kernel-rt less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034156" comment="kernel-rt_debug less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034157" comment="kernel-source less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034158" comment="kernel-syms less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034159" comment="kernel-xen less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034160" comment="kernel-xenpae less than 2.6.22.16-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3844</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-3844" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3844" source="CVE"/>
	<description>
	Mozilla Firefox 2.0.0.5, Thunderbird 2.0.0.5 and before 1.5.0.13, and SeaMonkey 1.1.3 allows remote attackers to conduct cross-site scripting (XSS) attacks with chrome privileges via an addon that inserts a (1) javascript: or (2) data: link into an about:blank document loaded by chrome via (a) the window.open function or (b) a content.location assignment, aka "Cross Context Scripting." NOTE: this issue is caused by a CVE-2007-3089 regression.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3c2104dbe6890645fc7a4a2511454f72 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034024" comment="seamonkey-dom-inspector less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034025" comment="seamonkey-irc less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034026" comment="seamonkey-mail less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034027" comment="seamonkey-spellchecker less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034028" comment="seamonkey-venkman less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034029" comment="seamonkey less than 1.1.5-0.1"/>
		</criteria>
	</criteria>
	<!-- e075a64414ec276d1ef5641c9170f366 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034030" comment="MozillaFirefox-translations less than 2.0.0.8-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034031" comment="MozillaFirefox less than 2.0.0.8-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3845</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-3845" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3845" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.6, Thunderbird before 1.5.0.13 and 2.x before 2.0.0.6, and SeaMonkey before 1.1.4 allow remote attackers to execute arbitrary commands via certain vectors associated with launching "a file handling program based on the file extension at the end of the URI," a variant of CVE-2007-4041.  NOTE: the vendor states that "it is still possible to launch a filetype handler based on extension rather than the registered protocol handler."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3c2104dbe6890645fc7a4a2511454f72 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034024" comment="seamonkey-dom-inspector less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034025" comment="seamonkey-irc less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034026" comment="seamonkey-mail less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034027" comment="seamonkey-spellchecker less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034028" comment="seamonkey-venkman less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034029" comment="seamonkey less than 1.1.5-0.1"/>
		</criteria>
	</criteria>
	<!-- e075a64414ec276d1ef5641c9170f366 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034030" comment="MozillaFirefox-translations less than 2.0.0.8-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034031" comment="MozillaFirefox less than 2.0.0.8-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3847</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-3847" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3847" source="CVE"/>
	<description>
	The date handling code in modules/proxy/proxy_util.c (mod_proxy) in Apache 2.3.0, when using a threaded MPM, allows remote origin servers to cause a denial of service (caching forward proxy process crash) via crafted date headers that trigger a buffer over-read.
	</description>
 </metadata>
<!-- c87d7d6f13eecbbff1c15cf9437be9e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034038" comment="apache2-devel less than 2.2.4-70.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034039" comment="apache2-doc less than 2.2.4-70.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034040" comment="apache2-example-pages less than 2.2.4-70.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034041" comment="apache2-prefork less than 2.2.4-70.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034042" comment="apache2-utils less than 2.2.4-70.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034043" comment="apache2-worker less than 2.2.4-70.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034044" comment="apache2 less than 2.2.4-70.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3920</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-3920" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3920" source="CVE"/>
	<description>
	GNOME screensaver 2.20 in Ubuntu 7.10, when used with Compiz, does not properly reserve input focus, which allows attackers with physical access to take control of the session after entering an Alt-Tab sequence, a related issue to CVE-2007-3069.
	</description>
 </metadata>
<!-- a6b6f56aefad64e254c5f20d2ba9d296 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034161" comment="xorg-x11-Xvnc less than 7.1-91.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034162" comment="xorg-x11-server-extra less than 7.2-143.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034163" comment="xorg-x11-server-sdk less than 7.2-143.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034164" comment="xorg-x11-server less than 7.2-143.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3999</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-3999" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3999" source="CVE"/>
	<description>
	Stack-based buffer overflow in the svcauth_gss_validate function in lib/rpc/svc_auth_gss.c in the RPCSEC_GSS RPC library (librpcsecgss) in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and some third-party applications that use krb5, allows remote attackers to cause a denial of service (daemon crash) and probably execute arbitrary code via a long string in an RPC message.
	</description>
 </metadata>
<!-- 48ed40772e9b05638a27723fc485215f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034165" comment="librpcsecgss less than 0.14-71.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4033</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-4033" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4033" source="CVE"/>
	<description>
	Buffer overflow in the intT1_EnvGetCompletePath function in lib/t1lib/t1env.c in t1lib 5.1.1 allows context-dependent attackers to execute arbitrary code via a long FileName parameter.  NOTE: this issue was originally reported to be in the imagepsloadfont function in php_gd2.dll in the gd (PHP_GD2) extension in PHP 5.2.3.
	</description>
 </metadata>
<!-- 618ac918990e51fa8e1bab4dcc176d09 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034166" comment="t1lib-devel less than 5.1.1-15.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034167" comment="t1lib less than 5.1.1-15.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4324</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-4324" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4324" source="CVE"/>
	<description>
	ActionScript 3 (AS3) in Adobe Flash Player 9.0.47.0, and other versions and other 9.0.124.0 and earlier versions, allows remote attackers to bypass the Security Sandbox Model, obtain sensitive information, and port scan arbitrary hosts via a Flash (SWF) movie that specifies a connection to make, then uses timing discrepancies from the SecurityErrorEvent error to determine whether a port is open or not.  NOTE: 9.0.115.0 introduces support for a workaround, but does not fix the vulnerability.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5c306eb0bb53025cadc8f1cfe9b447ca -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034168" comment="flash-player less than 9.0.115.0-0.1"/>
	</criteria>
	<!-- 7728fa8aa49a8cf7a4da694adb474f85 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031401" comment="flash-player less than 9.0.151.0-0.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4351</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-4351" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4351" source="CVE"/>
	<description>
	Off-by-one error in the ippReadIO function in cups/ipp.c in CUPS 1.3.3 allows remote attackers to cause a denial of service (crash) via a crafted (1) textWithLanguage or (2) nameWithLanguage Internet Printing Protocol (IPP) tag, leading to a stack-based buffer overflow.
	</description>
 </metadata>
<!-- 76d768b235a994cbd4fd6639fe1821cb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034169" comment="cups-client less than 1.2.12-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034170" comment="cups-devel less than 1.2.12-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034171" comment="cups-libs-32bit less than 1.2.12-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034172" comment="cups-libs-64bit less than 1.2.12-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034173" comment="cups-libs less than 1.2.12-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034174" comment="cups less than 1.2.12-22.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4352</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-4352" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4352" source="CVE"/>
	<description>
	Array index error in the DCTStream::readProgressiveDataUnit method in xpdf/Stream.cc in Xpdf 3.02pl1, as used in poppler, teTeX, KDE, KOffice, CUPS, and other products, allows remote attackers to trigger memory corruption and execute arbitrary code via a crafted PDF file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1a64560332f562764a93e6b6f66bd294 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034175" comment="cups-client less than 1.2.12-22.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034176" comment="cups-devel less than 1.2.12-22.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034177" comment="cups-libs-32bit less than 1.2.12-22.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034178" comment="cups-libs-64bit less than 1.2.12-22.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034179" comment="cups-libs less than 1.2.12-22.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034180" comment="cups less than 1.2.12-22.4"/>
		</criteria>
	</criteria>
	<!-- a4547a5fac6802e4ca828e1905a35637 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034181" comment="poppler-devel less than 0.5.4-101.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034182" comment="poppler-doc less than 0.5.4-101.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034183" comment="poppler-glib less than 0.5.4-101.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034184" comment="poppler-qt4 less than 0.5.4-101.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034185" comment="poppler-qt less than 0.5.4-101.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034186" comment="poppler-tools less than 0.5.4-101.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034187" comment="poppler less than 0.5.4-101.2"/>
		</criteria>
	</criteria>
	<!-- ae5e13b76ac07f1055f34e55a6925b8c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034188" comment="koffice-database-mysql less than 1.6.3-51.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034189" comment="koffice-database-psql less than 1.6.3-51.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034190" comment="koffice-database less than 1.6.3-51.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034191" comment="koffice-devel less than 1.6.3-51.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034192" comment="koffice-extra less than 1.6.3-51.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034193" comment="koffice-illustration less than 1.6.3-51.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034194" comment="koffice-planning less than 1.6.3-51.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034195" comment="koffice-presentation less than 1.6.3-51.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034196" comment="koffice-python less than 1.6.3-51.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034197" comment="koffice-ruby less than 1.6.3-51.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034198" comment="koffice-spreadsheet less than 1.6.3-51.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034199" comment="koffice-wordprocessing less than 1.6.3-51.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034200" comment="koffice less than 1.6.3-51.3"/>
		</criteria>
	</criteria>
	<!-- d063f6fa715e3c80bf0f69f3adb58fb0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034201" comment="xpdf-tools less than 3.02-19.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034202" comment="xpdf less than 3.02-19.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4465</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-4465" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4465" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in mod_autoindex.c in the Apache HTTP Server before 2.2.6, when the charset on a server-generated page is not defined, allows remote attackers to inject arbitrary web script or HTML via the P parameter using the UTF-7 charset.  NOTE: it could be argued that this issue is due to a design limitation of browsers that attempt to perform automatic content type detection.
	</description>
 </metadata>
<!-- c87d7d6f13eecbbff1c15cf9437be9e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034038" comment="apache2-devel less than 2.2.4-70.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034039" comment="apache2-doc less than 2.2.4-70.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034040" comment="apache2-example-pages less than 2.2.4-70.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034041" comment="apache2-prefork less than 2.2.4-70.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034042" comment="apache2-utils less than 2.2.4-70.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034043" comment="apache2-worker less than 2.2.4-70.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034044" comment="apache2 less than 2.2.4-70.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4565</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-4565" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4565" source="CVE"/>
	<description>
	sink.c in fetchmail before 6.3.9 allows context-dependent attackers to cause a denial of service (NULL dereference and application crash) by refusing certain warning messages that are sent over SMTP.
	</description>
 </metadata>
<!-- 5053f63f6c797cb363e23e5dfd5b778d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034203" comment="fetchmail less than 6.3.8-57.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034204" comment="fetchmailconf less than 6.3.8-57.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4568</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-4568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4568" source="CVE"/>
	<description>
	Integer overflow in the build_range function in X.Org X Font Server (xfs) before 1.0.5 allows context-dependent attackers to execute arbitrary code via (1) QueryXBitmaps and (2) QueryXExtents protocol requests with crafted size values, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- f2479b18f1f422b5b4b2ce76c46b9b33 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034205" comment="xorg-x11-Xvnc less than 7.1-91.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034206" comment="xorg-x11-devel-32bit less than 7.2-103.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034207" comment="xorg-x11-devel-64bit less than 7.2-103.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034208" comment="xorg-x11-devel less than 7.2-103.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034209" comment="xorg-x11-doc less than 7.2-56.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034210" comment="xorg-x11-libs-32bit less than 7.2-103.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034211" comment="xorg-x11-libs-64bit less than 7.2-103.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034212" comment="xorg-x11-libs less than 7.2-103.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034213" comment="xorg-x11-server-extra less than 7.2-143.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034214" comment="xorg-x11-server-sdk less than 7.2-143.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034215" comment="xorg-x11-server less than 7.2-143.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034216" comment="xorg-x11 less than 7.2-135.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4569</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-4569" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4569" source="CVE"/>
	<description>
	backend/session.c in KDM in KDE 3.3.0 through 3.5.7, when autologin is configured and "shutdown with password" is enabled, allows remote attackers to bypass the password requirement and login to arbitrary accounts via unspecified vectors.
	</description>
 </metadata>
<!-- d6d72f54643edd2194251146d5e5ef9a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034217" comment="kdebase3-kdm less than 3.5.7-83"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4571</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-4571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4571" source="CVE"/>
	<description>
	The snd_mem_proc_read function in sound/core/memalloc.c in the Advanced Linux Sound Architecture (ALSA) in the Linux kernel before 2.6.22.8 does not return the correct write size, which allows local users to obtain sensitive information (kernel memory contents) via a small count argument, as demonstrated by multiple reads of /proc/driver/snd-page-alloc.
	</description>
 </metadata>
<!-- 71c54bb2dd8e2286ed3a987c55c0ebe8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034218" comment="kernel-bigsmp less than 2.6.22.9-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034219" comment="kernel-default less than 2.6.22.9-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034220" comment="kernel-ppc64 less than 2.6.22.9-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034221" comment="kernel-source less than 2.6.22.9-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034222" comment="kernel-syms less than 2.6.22.9-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034223" comment="kernel-xen less than 2.6.22.9-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034224" comment="kernel-xenpae less than 2.6.22.9-0.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4572</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-4572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4572" source="CVE"/>
	<description>
	Stack-based buffer overflow in nmbd in Samba 3.0.0 through 3.0.26a, when configured as a Primary or Backup Domain controller, allows remote attackers to have an unknown impact via crafted GETDC mailslot requests, related to handling of GETDC logon server requests.
	</description>
 </metadata>
<!-- 536774cfb51ad1e7572f45d3ced6cf5b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034225" comment="cifs-mount less than 3.0.26a-3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034226" comment="ldapsmb less than 1.34b-110.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034227" comment="libmsrpc-devel less than 3.0.26a-3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034228" comment="libmsrpc less than 3.0.26a-3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034229" comment="libsmbclient-32bit less than 3.0.26a-3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034230" comment="libsmbclient-64bit less than 3.0.26a-3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034231" comment="libsmbclient-devel less than 3.0.26a-3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034232" comment="libsmbclient less than 3.0.26a-3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034233" comment="libsmbsharemodes-devel less than 3.0.26a-3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034234" comment="libsmbsharemodes less than 3.0.26a-3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034235" comment="samba-32bit less than 3.0.26a-3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034236" comment="samba-64bit less than 3.0.26a-3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034237" comment="samba-client-32bit less than 3.0.26a-3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034238" comment="samba-client-64bit less than 3.0.26a-3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034239" comment="samba-client less than 3.0.26a-3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034240" comment="samba-devel less than 3.0.26a-3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034241" comment="samba-doc less than 3.0.26a-3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034242" comment="samba-krb-printing less than 3.0.26a-3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034243" comment="samba-python less than 3.0.26a-3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034244" comment="samba-vscan less than 0.3.6b-181.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034245" comment="samba-winbind-32bit less than 3.0.26a-3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034246" comment="samba-winbind-64bit less than 3.0.26a-3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034247" comment="samba-winbind less than 3.0.26a-3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034248" comment="samba less than 3.0.26a-3.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4573</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-4573" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4573" source="CVE"/>
	<description>
	The IA32 system call emulation functionality in Linux kernel 2.4.x and 2.6.x before 2.6.22.7, when running on the x86_64 architecture, does not zero extend the eax register after the 32bit entry path to ptrace is used, which might allow local users to gain privileges by triggering an out-of-bounds access to the system call table using the %RAX register.
	</description>
 </metadata>
<!-- 71c54bb2dd8e2286ed3a987c55c0ebe8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034218" comment="kernel-bigsmp less than 2.6.22.9-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034219" comment="kernel-default less than 2.6.22.9-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034220" comment="kernel-ppc64 less than 2.6.22.9-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034221" comment="kernel-source less than 2.6.22.9-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034222" comment="kernel-syms less than 2.6.22.9-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034223" comment="kernel-xen less than 2.6.22.9-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034224" comment="kernel-xenpae less than 2.6.22.9-0.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4575</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-4575" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4575" source="CVE"/>
	<description>
	HSQLDB before 1.8.0.9, as used in OpenOffice.org (OOo) 2 before 2.3.1, allows user-assisted remote attackers to execute arbitrary Java code via crafted database documents, related to "exposing static java methods."
	</description>
 </metadata>
<!-- 2b4394b38d88fae795c73e1d0607f294 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034249" comment="OpenOffice_org-base less than 2.3.0.1.2-10.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034250" comment="OpenOffice_org-calc less than 2.3.0.1.2-10.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034251" comment="OpenOffice_org-devel less than 2.3.0.1.2-10.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034252" comment="OpenOffice_org-draw less than 2.3.0.1.2-10.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034253" comment="OpenOffice_org-filters less than 2.3.0.1.2-10.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034254" comment="OpenOffice_org-gnome less than 2.3.0.1.2-10.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034255" comment="OpenOffice_org-impress less than 2.3.0.1.2-10.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034256" comment="OpenOffice_org-kde less than 2.3.0.1.2-10.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034257" comment="OpenOffice_org-mailmerge less than 2.3.0.1.2-10.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034258" comment="OpenOffice_org-math less than 2.3.0.1.2-10.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034259" comment="OpenOffice_org-mono less than 2.3.0.1.2-10.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034260" comment="OpenOffice_org-officebean less than 2.3.0.1.2-10.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034261" comment="OpenOffice_org-pyuno less than 2.3.0.1.2-10.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034262" comment="OpenOffice_org-sdk-doc less than 2.3.0.1.2-10.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034263" comment="OpenOffice_org-sdk less than 2.3.0.1.2-10.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034264" comment="OpenOffice_org-testtool less than 2.3.0.1.2-10.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034265" comment="OpenOffice_org-writer less than 2.3.0.1.2-10.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034266" comment="OpenOffice_org less than 2.3.0.1.2-10.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4619</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-4619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4619" source="CVE"/>
	<description>
	Multiple integer overflows in Free Lossless Audio Codec (FLAC) libFLAC before 1.2.1, as used in Winamp before 5.5 and other products, allow user-assisted remote attackers to execute arbitrary code via a malformed FLAC file that triggers improper memory allocation, resulting in a heap-based buffer overflow.
	</description>
 </metadata>
<!-- e9a59a5e4f0f226aaf912fb9df671d4f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034267" comment="flac-devel less than 1.2.0-13.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034268" comment="flac less than 1.2.0-13.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034269" comment="libFLAC++6-32bit less than 1.2.0-13.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034270" comment="libFLAC++6-64bit less than 1.2.0-13.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034271" comment="libFLAC++6 less than 1.2.0-13.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034272" comment="libFLAC8-32bit less than 1.2.0-13.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034273" comment="libFLAC8-64bit less than 1.2.0-13.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034274" comment="libFLAC8 less than 1.2.0-13.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4727</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-4727" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4727" source="CVE"/>
	<description>
	Buffer overflow in the fcgi_env_add function in mod_proxy_backend_fastcgi.c in the mod_fastcgi extension in lighttpd before 1.4.18 allows remote attackers to overwrite arbitrary CGI variables and execute arbitrary code via an HTTP request with a long content length, as demonstrated by overwriting the SCRIPT_FILENAME variable, aka a "header overflow."
	</description>
 </metadata>
<!-- a2461378f17bed0c02a787b3eae31d1c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034275" comment="lighttpd-mod_cml less than 1.4.18-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034276" comment="lighttpd-mod_magnet less than 1.4.18-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034277" comment="lighttpd-mod_mysql_vhost less than 1.4.18-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034278" comment="lighttpd-mod_rrdtool less than 1.4.18-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034279" comment="lighttpd-mod_trigger_b4_dl less than 1.4.18-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034280" comment="lighttpd-mod_webdav less than 1.4.18-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034281" comment="lighttpd less than 1.4.18-1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4730</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-4730" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4730" source="CVE"/>
	<description>
	Buffer overflow in the compNewPixmap function in compalloc.c in the Composite extension for the X.org X11 server before 1.4 allows local users to execute arbitrary code by copying data from a large pixel depth pixmap into a smaller pixel depth pixmap.
	</description>
 </metadata>
<!-- f2479b18f1f422b5b4b2ce76c46b9b33 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034205" comment="xorg-x11-Xvnc less than 7.1-91.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034206" comment="xorg-x11-devel-32bit less than 7.2-103.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034207" comment="xorg-x11-devel-64bit less than 7.2-103.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034208" comment="xorg-x11-devel less than 7.2-103.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034209" comment="xorg-x11-doc less than 7.2-56.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034210" comment="xorg-x11-libs-32bit less than 7.2-103.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034211" comment="xorg-x11-libs-64bit less than 7.2-103.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034212" comment="xorg-x11-libs less than 7.2-103.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034213" comment="xorg-x11-server-extra less than 7.2-143.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034214" comment="xorg-x11-server-sdk less than 7.2-143.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034215" comment="xorg-x11-server less than 7.2-143.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034216" comment="xorg-x11 less than 7.2-135.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4752</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-4752" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4752" source="CVE"/>
	<description>
	ssh in OpenSSH before 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted X11 cookie instead, which allows attackers to violate intended policy and gain privileges by causing an X client to be treated as trusted.
	</description>
 </metadata>
<!-- 9b16515b76321f08b714d3edc01316ec -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034282" comment="openssh-askpass less than 4.6p1-58.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034283" comment="openssh less than 4.6p1-58.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4766</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-4766" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4766" source="CVE"/>
	<description>
	Multiple integer overflows in Perl-Compatible Regular Expression (PCRE) library before 7.3 allow context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via unspecified escape (backslash) sequences.
	</description>
 </metadata>
<!-- 9fc1825b45092785efcf903d98246498 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034082" comment="pcre-32bit less than 7.2-14.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034083" comment="pcre-64bit less than 7.2-14.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034084" comment="pcre-devel less than 7.2-14.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034085" comment="pcre less than 7.2-14.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4767</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-4767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4767" source="CVE"/>
	<description>
	Perl-Compatible Regular Expression (PCRE) library before 7.3 does not properly compute the length of (1) a \p sequence, (2) a \P sequence, or (3) a \P{x} sequence, which allows context-dependent attackers to cause a denial of service (infinite loop or crash) or execute arbitrary code.
	</description>
 </metadata>
<!-- 9fc1825b45092785efcf903d98246498 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034082" comment="pcre-32bit less than 7.2-14.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034083" comment="pcre-64bit less than 7.2-14.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034084" comment="pcre-devel less than 7.2-14.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034085" comment="pcre less than 7.2-14.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4768</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-4768" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4768" source="CVE"/>
	<description>
	Heap-based buffer overflow in Perl-Compatible Regular Expression (PCRE) library before 7.3 allows context-dependent attackers to execute arbitrary code via a singleton Unicode sequence in a character class in a regex pattern, which is incorrectly optimized.
	</description>
 </metadata>
<!-- 5c306eb0bb53025cadc8f1cfe9b447ca -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034168" comment="flash-player less than 9.0.115.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4769</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-4769" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4769" source="CVE"/>
	<description>
	The regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows remote authenticated users to cause a denial of service (backend crash) via an out-of-bounds backref number.
	</description>
 </metadata>
<!-- 782d496c4e5ffbe3d76afff815253130 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034284" comment="postgresql-contrib less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034285" comment="postgresql-devel less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034286" comment="postgresql-docs less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034287" comment="postgresql-libs-32bit less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034288" comment="postgresql-libs-64bit less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034289" comment="postgresql-libs less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034290" comment="postgresql-plperl less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034291" comment="postgresql-plpython less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034292" comment="postgresql-pltcl less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034293" comment="postgresql-server less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034294" comment="postgresql less than 8.2.6-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4770</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-4770" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4770" source="CVE"/>
	<description>
	libicu in International Components for Unicode (ICU) 3.8.1 and earlier attempts to process backreferences to the nonexistent capture group zero (aka \0), which might allow context-dependent attackers to read from, or write to, out-of-bounds memory locations, related to corruption of REStackFrames.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0abe09c4e8fdfd958e569c4846fbce31 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034295" comment="OpenOffice_org-af less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034296" comment="OpenOffice_org-ar less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034297" comment="OpenOffice_org-base less than 2.3.0.1.2-10.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034298" comment="OpenOffice_org-be-BY less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034299" comment="OpenOffice_org-bg less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034300" comment="OpenOffice_org-ca less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034301" comment="OpenOffice_org-calc less than 2.3.0.1.2-10.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034302" comment="OpenOffice_org-cs less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034303" comment="OpenOffice_org-cy less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034304" comment="OpenOffice_org-da less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034305" comment="OpenOffice_org-de less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034306" comment="OpenOffice_org-devel less than 2.3.0.1.2-10.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034307" comment="OpenOffice_org-draw less than 2.3.0.1.2-10.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034308" comment="OpenOffice_org-el less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034309" comment="OpenOffice_org-en-GB less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034310" comment="OpenOffice_org-es less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034311" comment="OpenOffice_org-et less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034312" comment="OpenOffice_org-fi less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034313" comment="OpenOffice_org-filters less than 2.3.0.1.2-10.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034314" comment="OpenOffice_org-fr less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034315" comment="OpenOffice_org-gnome less than 2.3.0.1.2-10.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034316" comment="OpenOffice_org-gu-IN less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034317" comment="OpenOffice_org-hi-IN less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034318" comment="OpenOffice_org-hr less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034319" comment="OpenOffice_org-hu less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034320" comment="OpenOffice_org-impress less than 2.3.0.1.2-10.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034321" comment="OpenOffice_org-it less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034322" comment="OpenOffice_org-ja less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034323" comment="OpenOffice_org-kde less than 2.3.0.1.2-10.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034324" comment="OpenOffice_org-km less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034325" comment="OpenOffice_org-ko less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034326" comment="OpenOffice_org-lt less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034327" comment="OpenOffice_org-mailmerge less than 2.3.0.1.2-10.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034328" comment="OpenOffice_org-math less than 2.3.0.1.2-10.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034329" comment="OpenOffice_org-mk less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034330" comment="OpenOffice_org-mono less than 2.3.0.1.2-10.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034331" comment="OpenOffice_org-nb less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034332" comment="OpenOffice_org-nl less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034333" comment="OpenOffice_org-nn less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034334" comment="OpenOffice_org-officebean less than 2.3.0.1.2-10.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034335" comment="OpenOffice_org-pa-IN less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034336" comment="OpenOffice_org-pl less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034337" comment="OpenOffice_org-pt-BR less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034338" comment="OpenOffice_org-pt less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034339" comment="OpenOffice_org-pyuno less than 2.3.0.1.2-10.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034340" comment="OpenOffice_org-ru less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034341" comment="OpenOffice_org-rw less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034342" comment="OpenOffice_org-sdk-doc less than 2.3.0.1.2-10.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034343" comment="OpenOffice_org-sdk less than 2.3.0.1.2-10.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034344" comment="OpenOffice_org-sk less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034345" comment="OpenOffice_org-sl less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034346" comment="OpenOffice_org-sr-CS less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034347" comment="OpenOffice_org-st less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034348" comment="OpenOffice_org-sv less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034349" comment="OpenOffice_org-testtool less than 2.3.0.1.2-10.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034350" comment="OpenOffice_org-tr less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034351" comment="OpenOffice_org-ts less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034352" comment="OpenOffice_org-vi less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034353" comment="OpenOffice_org-writer less than 2.3.0.1.2-10.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034354" comment="OpenOffice_org-xh less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034355" comment="OpenOffice_org-zh-CN less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034356" comment="OpenOffice_org-zh-TW less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034357" comment="OpenOffice_org-zu less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034358" comment="OpenOffice_org less than 2.3.0.1.2-10.5"/>
		</criteria>
	</criteria>
	<!-- 8ee471087e9bdd0cabb44d02ea05622d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034359" comment="icu-data less than 3.6-13.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034360" comment="icu less than 3.6-13.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034361" comment="libicu-32bit less than 3.6-13.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034362" comment="libicu-64bit less than 3.6-13.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034363" comment="libicu-devel-32bit less than 3.6-13.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034364" comment="libicu-devel-64bit less than 3.6-13.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034365" comment="libicu-devel less than 3.6-13.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034366" comment="libicu-doc less than 3.6-13.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034367" comment="libicu less than 3.6-13.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4771</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-4771" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4771" source="CVE"/>
	<description>
	Heap-based buffer overflow in the doInterval function in regexcmp.cpp in libicu in International Components for Unicode (ICU) 3.8.1 and earlier allows context-dependent attackers to cause a denial of service (memory consumption) and possibly have unspecified other impact via a regular expression that writes a large amount of data to the backtracking stack.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0abe09c4e8fdfd958e569c4846fbce31 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034295" comment="OpenOffice_org-af less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034296" comment="OpenOffice_org-ar less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034297" comment="OpenOffice_org-base less than 2.3.0.1.2-10.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034298" comment="OpenOffice_org-be-BY less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034299" comment="OpenOffice_org-bg less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034300" comment="OpenOffice_org-ca less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034301" comment="OpenOffice_org-calc less than 2.3.0.1.2-10.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034302" comment="OpenOffice_org-cs less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034303" comment="OpenOffice_org-cy less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034304" comment="OpenOffice_org-da less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034305" comment="OpenOffice_org-de less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034306" comment="OpenOffice_org-devel less than 2.3.0.1.2-10.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034307" comment="OpenOffice_org-draw less than 2.3.0.1.2-10.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034308" comment="OpenOffice_org-el less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034309" comment="OpenOffice_org-en-GB less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034310" comment="OpenOffice_org-es less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034311" comment="OpenOffice_org-et less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034312" comment="OpenOffice_org-fi less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034313" comment="OpenOffice_org-filters less than 2.3.0.1.2-10.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034314" comment="OpenOffice_org-fr less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034315" comment="OpenOffice_org-gnome less than 2.3.0.1.2-10.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034316" comment="OpenOffice_org-gu-IN less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034317" comment="OpenOffice_org-hi-IN less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034318" comment="OpenOffice_org-hr less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034319" comment="OpenOffice_org-hu less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034320" comment="OpenOffice_org-impress less than 2.3.0.1.2-10.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034321" comment="OpenOffice_org-it less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034322" comment="OpenOffice_org-ja less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034323" comment="OpenOffice_org-kde less than 2.3.0.1.2-10.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034324" comment="OpenOffice_org-km less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034325" comment="OpenOffice_org-ko less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034326" comment="OpenOffice_org-lt less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034327" comment="OpenOffice_org-mailmerge less than 2.3.0.1.2-10.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034328" comment="OpenOffice_org-math less than 2.3.0.1.2-10.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034329" comment="OpenOffice_org-mk less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034330" comment="OpenOffice_org-mono less than 2.3.0.1.2-10.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034331" comment="OpenOffice_org-nb less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034332" comment="OpenOffice_org-nl less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034333" comment="OpenOffice_org-nn less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034334" comment="OpenOffice_org-officebean less than 2.3.0.1.2-10.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034335" comment="OpenOffice_org-pa-IN less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034336" comment="OpenOffice_org-pl less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034337" comment="OpenOffice_org-pt-BR less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034338" comment="OpenOffice_org-pt less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034339" comment="OpenOffice_org-pyuno less than 2.3.0.1.2-10.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034340" comment="OpenOffice_org-ru less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034341" comment="OpenOffice_org-rw less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034342" comment="OpenOffice_org-sdk-doc less than 2.3.0.1.2-10.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034343" comment="OpenOffice_org-sdk less than 2.3.0.1.2-10.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034344" comment="OpenOffice_org-sk less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034345" comment="OpenOffice_org-sl less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034346" comment="OpenOffice_org-sr-CS less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034347" comment="OpenOffice_org-st less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034348" comment="OpenOffice_org-sv less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034349" comment="OpenOffice_org-testtool less than 2.3.0.1.2-10.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034350" comment="OpenOffice_org-tr less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034351" comment="OpenOffice_org-ts less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034352" comment="OpenOffice_org-vi less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034353" comment="OpenOffice_org-writer less than 2.3.0.1.2-10.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034354" comment="OpenOffice_org-xh less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034355" comment="OpenOffice_org-zh-CN less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034356" comment="OpenOffice_org-zh-TW less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034357" comment="OpenOffice_org-zu less than 2.3.0.1.2-2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034358" comment="OpenOffice_org less than 2.3.0.1.2-10.5"/>
		</criteria>
	</criteria>
	<!-- 8ee471087e9bdd0cabb44d02ea05622d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034359" comment="icu-data less than 3.6-13.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034360" comment="icu less than 3.6-13.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034361" comment="libicu-32bit less than 3.6-13.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034362" comment="libicu-64bit less than 3.6-13.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034363" comment="libicu-devel-32bit less than 3.6-13.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034364" comment="libicu-devel-64bit less than 3.6-13.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034365" comment="libicu-devel less than 3.6-13.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034366" comment="libicu-doc less than 3.6-13.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034367" comment="libicu less than 3.6-13.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4772</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-4772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4772" source="CVE"/>
	<description>
	The regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows context-dependent attackers to cause a denial of service (infinite loop) via a crafted regular expression.
	</description>
 </metadata>
<!-- 782d496c4e5ffbe3d76afff815253130 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034284" comment="postgresql-contrib less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034285" comment="postgresql-devel less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034286" comment="postgresql-docs less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034287" comment="postgresql-libs-32bit less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034288" comment="postgresql-libs-64bit less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034289" comment="postgresql-libs less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034290" comment="postgresql-plperl less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034291" comment="postgresql-plpython less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034292" comment="postgresql-pltcl less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034293" comment="postgresql-server less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034294" comment="postgresql less than 8.2.6-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4841</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-4841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4841" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.8, Thunderbird before 2.0.0.8, and SeaMonkey before 1.1.5 allows remote attackers to execute arbitrary commands via a (1) mailto, (2) nntp, (3) news, or (4) snews URI with invalid "%" encoding, related to improper file type handling on Windows XP with Internet Explorer 7 installed, a variant of CVE-2007-3845.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3c2104dbe6890645fc7a4a2511454f72 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034024" comment="seamonkey-dom-inspector less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034025" comment="seamonkey-irc less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034026" comment="seamonkey-mail less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034027" comment="seamonkey-spellchecker less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034028" comment="seamonkey-venkman less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034029" comment="seamonkey less than 1.1.5-0.1"/>
		</criteria>
	</criteria>
	<!-- e075a64414ec276d1ef5641c9170f366 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034030" comment="MozillaFirefox-translations less than 2.0.0.8-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034031" comment="MozillaFirefox less than 2.0.0.8-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4879</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-4879" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4879" source="CVE"/>
	<description>
	Mozilla Firefox before Firefox 2.0.0.13, and SeaMonkey before 1.1.9, can automatically install TLS client certificates with minimal user interaction, and automatically sends these certificates when requested, which makes it easier for remote web sites to track user activities across domains by requesting the TLS client certificates from other domains.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 974fa8c2b9c5a922e58c39ae1ce454b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034368" comment="epiphany-devel less than 2.20.0-8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034369" comment="epiphany-doc less than 2.20.0-8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034370" comment="epiphany-extensions less than 2.20.0-8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034371" comment="epiphany less than 2.20.0-8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034372" comment="mozilla-xulrunner181-32bit less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034373" comment="mozilla-xulrunner181-64bit less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034374" comment="mozilla-xulrunner181-devel less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034375" comment="mozilla-xulrunner181-l10n less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034376" comment="mozilla-xulrunner181 less than 1.8.1.13-0.1"/>
		</criteria>
	</criteria>
	<!-- ad4dd6c7b4ca468a0cd46e1ee027bec0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034377" comment="MozillaFirefox-translations less than 2.0.0.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034378" comment="MozillaFirefox less than 2.0.0.13-0.1"/>
		</criteria>
	</criteria>
	<!-- d9220bda5e78338dc7c41920e81a8586 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034379" comment="seamonkey-dom-inspector less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034380" comment="seamonkey-irc less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034381" comment="seamonkey-mail less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034382" comment="seamonkey-spellchecker less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034383" comment="seamonkey-venkman less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034384" comment="seamonkey less than 1.1.9-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4924</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-4924" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4924" source="CVE"/>
	<description>
	The Open Phone Abstraction Library (opal), as used by (1) Ekiga before 2.0.10 and (2) OpenH323 before 2.2.4, allows remote attackers to cause a denial of service (crash) via an invalid Content-Length header field in Session Initiation Protocol (SIP) packets, which causes a \0 byte to be written to an "attacker-controlled address."
	</description>
 </metadata>
<!-- 369adafc45f02d628303f3dcf63a94bd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034385" comment="opal-devel less than 2.2.8-60.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034386" comment="opal less than 2.2.8-60.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4965</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-4965" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4965" source="CVE"/>
	<description>
	Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.
	</description>
 </metadata>
<!-- 7f740fb3c9a5d2ea29ade495d9f4800f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034387" comment="python-32bit less than 2.5.1-39.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034388" comment="python-64bit less than 2.5.1-39.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034389" comment="python-curses less than 2.5.1-39.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034390" comment="python-demo less than 2.5.1-39.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034391" comment="python-devel less than 2.5.1-39.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034392" comment="python-gdbm less than 2.5.1-39.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034393" comment="python-idle less than 2.5.1-39.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034394" comment="python-tk less than 2.5.1-39.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034395" comment="python-xml less than 2.5.1-39.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034396" comment="python less than 2.5.1-39.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4985</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-4985" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4985" source="CVE"/>
	<description>
	ImageMagick before 6.3.5-9 allows context-dependent attackers to cause a denial of service via a crafted image file that triggers (1) an infinite loop in the ReadDCMImage function, related to ReadBlobByte function calls; or (2) an infinite loop in the ReadXCFImage function, related to ReadBlobMSBLong function calls.
	</description>
 </metadata>
<!-- 40f51720a9bc2981dfb8441c4dc0929e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034397" comment="GraphicsMagick-devel less than 1.1.8-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034398" comment="GraphicsMagick less than 1.1.8-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034399" comment="libGraphicsMagick++-devel less than 1.1.8-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034400" comment="libGraphicsMagick++1 less than 1.1.8-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034401" comment="libGraphicsMagick1 less than 1.1.8-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034402" comment="libGraphicsMagickWand0 less than 1.1.8-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034403" comment="perl-GraphicsMagick less than 1.1.8-20.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4986</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-4986" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4986" source="CVE"/>
	<description>
	Multiple integer overflows in ImageMagick before 6.3.5-9 allow context-dependent attackers to execute arbitrary code via a crafted (1) .dcm, (2) .dib, (3) .xbm, (4) .xcf, or (5) .xwd image file, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 40f51720a9bc2981dfb8441c4dc0929e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034397" comment="GraphicsMagick-devel less than 1.1.8-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034398" comment="GraphicsMagick less than 1.1.8-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034399" comment="libGraphicsMagick++-devel less than 1.1.8-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034400" comment="libGraphicsMagick++1 less than 1.1.8-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034401" comment="libGraphicsMagick1 less than 1.1.8-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034402" comment="libGraphicsMagickWand0 less than 1.1.8-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034403" comment="perl-GraphicsMagick less than 1.1.8-20.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4987</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-4987" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4987" source="CVE"/>
	<description>
	Off-by-one error in the ReadBlobString function in blob.c in ImageMagick before 6.3.5-9 allows context-dependent attackers to execute arbitrary code via a crafted image file, which triggers the writing of a '\0' character to an out-of-bounds address.
	</description>
 </metadata>
<!-- 40f51720a9bc2981dfb8441c4dc0929e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034397" comment="GraphicsMagick-devel less than 1.1.8-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034398" comment="GraphicsMagick less than 1.1.8-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034399" comment="libGraphicsMagick++-devel less than 1.1.8-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034400" comment="libGraphicsMagick++1 less than 1.1.8-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034401" comment="libGraphicsMagick1 less than 1.1.8-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034402" comment="libGraphicsMagickWand0 less than 1.1.8-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034403" comment="perl-GraphicsMagick less than 1.1.8-20.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4988</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-4988" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4988" source="CVE"/>
	<description>
	Sign extension error in the ReadDIBImage function in ImageMagick before 6.3.5-9 allows context-dependent attackers to execute arbitrary code via a crafted width value in an image file, which triggers an integer overflow and a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 40f51720a9bc2981dfb8441c4dc0929e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034397" comment="GraphicsMagick-devel less than 1.1.8-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034398" comment="GraphicsMagick less than 1.1.8-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034399" comment="libGraphicsMagick++-devel less than 1.1.8-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034400" comment="libGraphicsMagick++1 less than 1.1.8-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034401" comment="libGraphicsMagick1 less than 1.1.8-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034402" comment="libGraphicsMagickWand0 less than 1.1.8-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034403" comment="perl-GraphicsMagick less than 1.1.8-20.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4990</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-4990" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4990" source="CVE"/>
	<description>
	The swap_char2b function in X.Org X Font Server (xfs) before 1.0.5 allows context-dependent attackers to execute arbitrary code via (1) QueryXBitmaps and (2) QueryXExtents protocol requests with crafted size values that specify an arbitrary number of bytes to be swapped on the heap, which triggers heap corruption.
	</description>
 </metadata>
<!-- f2479b18f1f422b5b4b2ce76c46b9b33 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034205" comment="xorg-x11-Xvnc less than 7.1-91.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034206" comment="xorg-x11-devel-32bit less than 7.2-103.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034207" comment="xorg-x11-devel-64bit less than 7.2-103.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034208" comment="xorg-x11-devel less than 7.2-103.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034209" comment="xorg-x11-doc less than 7.2-56.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034210" comment="xorg-x11-libs-32bit less than 7.2-103.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034211" comment="xorg-x11-libs-64bit less than 7.2-103.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034212" comment="xorg-x11-libs less than 7.2-103.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034213" comment="xorg-x11-server-extra less than 7.2-143.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034214" comment="xorg-x11-server-sdk less than 7.2-143.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034215" comment="xorg-x11-server less than 7.2-143.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034216" comment="xorg-x11 less than 7.2-135.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4995</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-4995" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4995" source="CVE"/>
	<description>
	Off-by-one error in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8f allows remote attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- bbdf7bf6ed523619d016307da2755ac7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034404" comment="libopenssl-devel less than 0.9.8e-45.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034405" comment="libopenssl0_9_8-32bit less than 0.9.8e-45.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034406" comment="libopenssl0_9_8-64bit less than 0.9.8e-45.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034407" comment="libopenssl0_9_8 less than 0.9.8e-45.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034408" comment="openssl-certs less than 0.9.8e-45.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034409" comment="openssl-doc less than 0.9.8e-45.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034410" comment="openssl less than 0.9.8e-45.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4997</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-4997" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4997" source="CVE"/>
	<description>
	Integer underflow in the ieee80211_rx function in net/ieee80211/ieee80211_rx.c in the Linux kernel 2.6.x before 2.6.23 allows remote attackers to cause a denial of service (crash) via a crafted SKB length value in a runt IEEE 802.11 frame when the IEEE80211_STYPE_QOS_DATA flag is set, aka an "off-by-two error."
	</description>
 </metadata>
<!-- cc6ecd74a91505e1032662fa61b388ac -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034045" comment="kernel-bigsmp less than 2.6.22.12-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034046" comment="kernel-debug less than 2.6.22.12-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034047" comment="kernel-default less than 2.6.22.12-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034048" comment="kernel-kdump less than 2.6.22.12-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034049" comment="kernel-ppc64 less than 2.6.22.12-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034050" comment="kernel-source less than 2.6.22.12-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034051" comment="kernel-syms less than 2.6.22.12-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034052" comment="kernel-xen less than 2.6.22.12-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034053" comment="kernel-xenpae less than 2.6.22.12-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4999</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-4999" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4999" source="CVE"/>
	<description>
	libpurple in Pidgin 2.1.0 through 2.2.1, when using HTML logging, allows remote attackers to cause a denial of service (NULL dereference and application crash) via a message that contains invalid HTML data, a different vector than CVE-2007-4996.
	</description>
 </metadata>
<!-- 2301de391dc23b073c712843e4b4670d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034411" comment="libpurple-devel less than 2.1.1-13.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034412" comment="libpurple less than 2.1.1-13.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5000</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5000" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in the (1) mod_imap module in the Apache HTTP Server 1.3.0 through 1.3.39 and 2.0.35 through 2.0.61 and the (2) mod_imagemap module in the Apache HTTP Server 2.2.0 through 2.2.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
	</description>
 </metadata>
<!-- 5b7469db5b62f5413f587087534d6ed2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034413" comment="apache2-devel less than 2.2.4-70.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034414" comment="apache2-doc less than 2.2.4-70.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034415" comment="apache2-example-pages less than 2.2.4-70.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034416" comment="apache2-prefork less than 2.2.4-70.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034417" comment="apache2-utils less than 2.2.4-70.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034418" comment="apache2-worker less than 2.2.4-70.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034419" comment="apache2 less than 2.2.4-70.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5116</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5116" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5116" source="CVE"/>
	<description>
	Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.
	</description>
 </metadata>
<!-- 8c5e12cd125d5e2ed9bcc9bfbc368173 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034420" comment="perl-32bit less than 5.8.8-76.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034421" comment="perl-64bit less than 5.8.8-76.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034422" comment="perl-base less than 5.8.8-76.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034423" comment="perl less than 5.8.8-76.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5135</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5135" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5135" source="CVE"/>
	<description>
	Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 up to 0.9.7l, and 0.9.8 up to 0.9.8f, might allow remote attackers to execute arbitrary code via a crafted packet that triggers a one-byte buffer underflow.  NOTE: this issue was introduced as a result of a fix for CVE-2006-3738.  As of 20071012, it is unknown whether code execution is possible.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- ce9c8b5e06be6ef057b67d173db39aff -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034424" comment="libopenssl-devel less than 0.9.8e-45.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034425" comment="libopenssl0_9_8-32bit less than 0.9.8e-45.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034426" comment="libopenssl0_9_8-64bit less than 0.9.8e-45.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034427" comment="libopenssl0_9_8 less than 0.9.8e-45.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034428" comment="openssl-certs less than 0.9.8e-45.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034429" comment="openssl-doc less than 0.9.8e-45.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034430" comment="openssl less than 0.9.8e-45.2"/>
		</criteria>
	</criteria>
	<!-- ee82f2198a82d11b239bd3321dd51483 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034431" comment="compat-openssl097g-32bit less than 0.9.7g-75.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034432" comment="compat-openssl097g-64bit less than 0.9.7g-75.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034433" comment="compat-openssl097g less than 0.9.7g-75.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5137</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5137" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5137" source="CVE"/>
	<description>
	Buffer overflow in the ReadImage function in generic/tkImgGIF.c in Tcl (Tcl/Tk) 8.4.13 through 8.4.15 allows remote attackers to execute arbitrary code via multi-frame interlaced GIF files in which later frames are smaller than the first.  NOTE: this issue is due to an incorrect patch for CVE-2007-5378.
	</description>
 </metadata>
<!-- a1f4d3b93c6ad29137c5900546239f22 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034434" comment="tk-32bit less than 8.4.15-25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034435" comment="tk-64bit less than 8.4.15-25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034436" comment="tk-devel less than 8.4.15-25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034437" comment="tk less than 8.4.15-25.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5162</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5162" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5162" source="CVE"/>
	<description>
	The connect method in lib/net/http.rb in the (1) Net::HTTP and (2) Net::HTTPS libraries in Ruby 1.8.5 and 1.8.6 does not verify that the commonName (CN) field in a server certificate matches the domain name in an HTTPS request, which makes it easier for remote attackers to intercept SSL transmissions via a man-in-the-middle attack or spoofed web site.
	</description>
 </metadata>
<!-- 93fd206cf6bc176932e1872cf7b39a5c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034438" comment="ruby-devel less than 1.8.6.p36-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034439" comment="ruby-doc-html less than 1.8.6.p36-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034440" comment="ruby-doc-ri less than 1.8.6.p36-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034441" comment="ruby-examples less than 1.8.6.p36-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034442" comment="ruby-test-suite less than 1.8.6.p36-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034443" comment="ruby-tk less than 1.8.6.p36-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034444" comment="ruby less than 1.8.6.p36-20.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5191</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5191" source="CVE"/>
	<description>
	mount and umount in util-linux and loop-aes-utils call the setuid and setgid functions in the wrong order and do not check the return values, which might allow attackers to gain privileges via helpers such as mount.nfs.
	</description>
 </metadata>
<!-- 6c0719fc3abbdae964757ea22f821543 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034445" comment="util-linux less than 2.12r+2.13rc2+git20070725-24.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5198</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5198" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5198" source="CVE"/>
	<description>
	Buffer overflow in the redir function in check_http.c in Nagios Plugins before 1.4.10, when running with the -f (follow) option, allows remote web servers to execute arbitrary code via Location header responses (redirects) with a large number of leading "L" characters.
	</description>
 </metadata>
<!-- 68981f926f4df939e07de12cbc999f38 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034446" comment="nagios-plugins-extras less than 1.4.9-19.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034447" comment="nagios-plugins less than 1.4.9-19.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5200</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5200" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5200" source="CVE"/>
	<description>
	hugin, as used on various operating systems including SUSE openSUSE 10.2 and 10.3, allows local users to overwrite arbitrary files via a symlink attack on the hugin_debug_optim_results.txt temporary file.
	</description>
 </metadata>
<!-- 41a84abf40d6435f47f2c333afd72f8a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034448" comment="hugin less than 0.6.99.4-33.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5208</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5208" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5208" source="CVE"/>
	<description>
	hpssd in Hewlett-Packard Linux Imaging and Printing Project (hplip) 1.x and 2.x before 2.7.10 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a from address, which is not properly handled when invoking sendmail.
	</description>
 </metadata>
<!-- 7cee34af0d79ab6f02302c2ccf915215 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034449" comment="hplip-hpijs less than 2.7.7-37.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034450" comment="hplip less than 2.7.7-37.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5232</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5232" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5232" source="CVE"/>
	<description>
	Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when applet caching is enabled, allows remote attackers to violate the security model for an applet's outbound connections via a DNS rebinding attack.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 093f8e45812381c516e3fe60f6f19049 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034451" comment="java-1_5_0-sun-alsa less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034452" comment="java-1_5_0-sun-demo less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034453" comment="java-1_5_0-sun-devel less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034454" comment="java-1_5_0-sun-jdbc less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034455" comment="java-1_5_0-sun-plugin less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034456" comment="java-1_5_0-sun-src less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034457" comment="java-1_5_0-sun less than 1.5.0_update13-0.1"/>
		</criteria>
	</criteria>
	<!-- 7c304d320622f27ef729e04f25653484 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034458" comment="java-1_6_0-sun-alsa less than 1.6.0.u3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034459" comment="java-1_6_0-sun-demo less than 1.6.0.u3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034460" comment="java-1_6_0-sun-devel less than 1.6.0.u3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034461" comment="java-1_6_0-sun-jdbc less than 1.6.0.u3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034462" comment="java-1_6_0-sun-plugin less than 1.6.0.u3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034463" comment="java-1_6_0-sun less than 1.6.0.u3-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5236</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5236" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5236" source="CVE"/>
	<description>
	Java Web Start in Sun JDK and JRE 5.0 Update 12 and earlier, and SDK and JRE 1.4.2_15 and earlier, on Windows does not properly enforce access restrictions for untrusted applications, which allows user-assisted remote attackers to read local files via an untrusted application.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 093f8e45812381c516e3fe60f6f19049 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034451" comment="java-1_5_0-sun-alsa less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034452" comment="java-1_5_0-sun-demo less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034453" comment="java-1_5_0-sun-devel less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034454" comment="java-1_5_0-sun-jdbc less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034455" comment="java-1_5_0-sun-plugin less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034456" comment="java-1_5_0-sun-src less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034457" comment="java-1_5_0-sun less than 1.5.0_update13-0.1"/>
		</criteria>
	</criteria>
	<!-- 7c304d320622f27ef729e04f25653484 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034458" comment="java-1_6_0-sun-alsa less than 1.6.0.u3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034459" comment="java-1_6_0-sun-demo less than 1.6.0.u3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034460" comment="java-1_6_0-sun-devel less than 1.6.0.u3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034461" comment="java-1_6_0-sun-jdbc less than 1.6.0.u3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034462" comment="java-1_6_0-sun-plugin less than 1.6.0.u3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034463" comment="java-1_6_0-sun less than 1.6.0.u3-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5237</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5237" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5237" source="CVE"/>
	<description>
	Java Web Start in Sun JDK and JRE 6 Update 2 and earlier does not properly enforce access restrictions for untrusted applications, which allows user-assisted remote attackers to read and modify local files via an untrusted application, aka "two vulnerabilities."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 093f8e45812381c516e3fe60f6f19049 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034451" comment="java-1_5_0-sun-alsa less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034452" comment="java-1_5_0-sun-demo less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034453" comment="java-1_5_0-sun-devel less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034454" comment="java-1_5_0-sun-jdbc less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034455" comment="java-1_5_0-sun-plugin less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034456" comment="java-1_5_0-sun-src less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034457" comment="java-1_5_0-sun less than 1.5.0_update13-0.1"/>
		</criteria>
	</criteria>
	<!-- 7c304d320622f27ef729e04f25653484 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034458" comment="java-1_6_0-sun-alsa less than 1.6.0.u3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034459" comment="java-1_6_0-sun-demo less than 1.6.0.u3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034460" comment="java-1_6_0-sun-devel less than 1.6.0.u3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034461" comment="java-1_6_0-sun-jdbc less than 1.6.0.u3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034462" comment="java-1_6_0-sun-plugin less than 1.6.0.u3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034463" comment="java-1_6_0-sun less than 1.6.0.u3-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5238</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5238" source="CVE"/>
	<description>
	Java Web Start in Sun JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, and SDK and JRE 1.4.2_15 and earlier does not properly enforce access restrictions for untrusted applications, which allows user-assisted remote attackers to obtain sensitive information (the Java Web Start cache location) via an untrusted application, aka "three vulnerabilities."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 093f8e45812381c516e3fe60f6f19049 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034451" comment="java-1_5_0-sun-alsa less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034452" comment="java-1_5_0-sun-demo less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034453" comment="java-1_5_0-sun-devel less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034454" comment="java-1_5_0-sun-jdbc less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034455" comment="java-1_5_0-sun-plugin less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034456" comment="java-1_5_0-sun-src less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034457" comment="java-1_5_0-sun less than 1.5.0_update13-0.1"/>
		</criteria>
	</criteria>
	<!-- 7c304d320622f27ef729e04f25653484 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034458" comment="java-1_6_0-sun-alsa less than 1.6.0.u3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034459" comment="java-1_6_0-sun-demo less than 1.6.0.u3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034460" comment="java-1_6_0-sun-devel less than 1.6.0.u3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034461" comment="java-1_6_0-sun-jdbc less than 1.6.0.u3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034462" comment="java-1_6_0-sun-plugin less than 1.6.0.u3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034463" comment="java-1_6_0-sun less than 1.6.0.u3-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5239</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5239" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5239" source="CVE"/>
	<description>
	Java Web Start in Sun JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier does not properly enforce access restrictions for untrusted (1) applications and (2) applets, which allows user-assisted remote attackers to copy or rename arbitrary files when local users perform drag-and-drop operations from the untrusted application or applet window onto certain types of desktop applications.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 093f8e45812381c516e3fe60f6f19049 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034451" comment="java-1_5_0-sun-alsa less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034452" comment="java-1_5_0-sun-demo less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034453" comment="java-1_5_0-sun-devel less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034454" comment="java-1_5_0-sun-jdbc less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034455" comment="java-1_5_0-sun-plugin less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034456" comment="java-1_5_0-sun-src less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034457" comment="java-1_5_0-sun less than 1.5.0_update13-0.1"/>
		</criteria>
	</criteria>
	<!-- 7c304d320622f27ef729e04f25653484 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034458" comment="java-1_6_0-sun-alsa less than 1.6.0.u3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034459" comment="java-1_6_0-sun-demo less than 1.6.0.u3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034460" comment="java-1_6_0-sun-devel less than 1.6.0.u3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034461" comment="java-1_6_0-sun-jdbc less than 1.6.0.u3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034462" comment="java-1_6_0-sun-plugin less than 1.6.0.u3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034463" comment="java-1_6_0-sun less than 1.6.0.u3-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5240</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5240" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5240" source="CVE"/>
	<description>
	Visual truncation vulnerability in the Java Runtime Environment in Sun JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier allows remote attackers to circumvent display of the untrusted-code warning banner by creating a window larger than the workstation screen.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 093f8e45812381c516e3fe60f6f19049 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034451" comment="java-1_5_0-sun-alsa less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034452" comment="java-1_5_0-sun-demo less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034453" comment="java-1_5_0-sun-devel less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034454" comment="java-1_5_0-sun-jdbc less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034455" comment="java-1_5_0-sun-plugin less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034456" comment="java-1_5_0-sun-src less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034457" comment="java-1_5_0-sun less than 1.5.0_update13-0.1"/>
		</criteria>
	</criteria>
	<!-- 7c304d320622f27ef729e04f25653484 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034458" comment="java-1_6_0-sun-alsa less than 1.6.0.u3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034459" comment="java-1_6_0-sun-demo less than 1.6.0.u3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034460" comment="java-1_6_0-sun-devel less than 1.6.0.u3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034461" comment="java-1_6_0-sun-jdbc less than 1.6.0.u3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034462" comment="java-1_6_0-sun-plugin less than 1.6.0.u3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034463" comment="java-1_6_0-sun less than 1.6.0.u3-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5269</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5269" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5269" source="CVE"/>
	<description>
	Certain chunk handlers in libpng before 1.0.29 and 1.2.x before 1.2.21 allow remote attackers to cause a denial of service (crash) via crafted (1) pCAL (png_handle_pCAL), (2) sCAL (png_handle_sCAL), (3) tEXt (png_push_read_tEXt), (4) iTXt (png_handle_iTXt), and (5) ztXT (png_handle_ztXt) chunking in PNG images, which trigger out-of-bounds read operations.
	</description>
 </metadata>
<!-- 6233c05fc252c84034004275189aff5c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034464" comment="libpng-32bit less than 1.2.18-15.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034465" comment="libpng-64bit less than 1.2.18-15.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034466" comment="libpng-devel-32bit less than 1.2.18-15.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034467" comment="libpng-devel-64bit less than 1.2.18-15.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034468" comment="libpng-devel less than 1.2.18-15.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034469" comment="libpng less than 1.2.18-15.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5273</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5273" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5273" source="CVE"/>
	<description>
	Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when an HTTP proxy server is used, allows remote attackers to violate the security model for an applet's outbound connections via a multi-pin DNS rebinding attack in which the applet download relies on DNS resolution on the proxy server, but the applet's socket operations rely on DNS resolution on the local machine, a different issue than CVE-2007-5274. NOTE: this is similar to CVE-2007-5232.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 093f8e45812381c516e3fe60f6f19049 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034451" comment="java-1_5_0-sun-alsa less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034452" comment="java-1_5_0-sun-demo less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034453" comment="java-1_5_0-sun-devel less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034454" comment="java-1_5_0-sun-jdbc less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034455" comment="java-1_5_0-sun-plugin less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034456" comment="java-1_5_0-sun-src less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034457" comment="java-1_5_0-sun less than 1.5.0_update13-0.1"/>
		</criteria>
	</criteria>
	<!-- 7c304d320622f27ef729e04f25653484 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034458" comment="java-1_6_0-sun-alsa less than 1.6.0.u3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034459" comment="java-1_6_0-sun-demo less than 1.6.0.u3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034460" comment="java-1_6_0-sun-devel less than 1.6.0.u3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034461" comment="java-1_6_0-sun-jdbc less than 1.6.0.u3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034462" comment="java-1_6_0-sun-plugin less than 1.6.0.u3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034463" comment="java-1_6_0-sun less than 1.6.0.u3-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5274</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5274" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5274" source="CVE"/>
	<description>
	Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when Firefox or Opera is used, allows remote attackers to violate the security model for JavaScript outbound connections via a multi-pin DNS rebinding attack dependent on the LiveConnect API, in which JavaScript download relies on DNS resolution by the browser, but JavaScript socket operations rely on separate DNS resolution by a Java Virtual Machine (JVM), a different issue than CVE-2007-5273.  NOTE: this is similar to CVE-2007-5232.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 093f8e45812381c516e3fe60f6f19049 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034451" comment="java-1_5_0-sun-alsa less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034452" comment="java-1_5_0-sun-demo less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034453" comment="java-1_5_0-sun-devel less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034454" comment="java-1_5_0-sun-jdbc less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034455" comment="java-1_5_0-sun-plugin less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034456" comment="java-1_5_0-sun-src less than 1.5.0_update13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034457" comment="java-1_5_0-sun less than 1.5.0_update13-0.1"/>
		</criteria>
	</criteria>
	<!-- 7c304d320622f27ef729e04f25653484 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034458" comment="java-1_6_0-sun-alsa less than 1.6.0.u3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034459" comment="java-1_6_0-sun-demo less than 1.6.0.u3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034460" comment="java-1_6_0-sun-devel less than 1.6.0.u3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034461" comment="java-1_6_0-sun-jdbc less than 1.6.0.u3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034462" comment="java-1_6_0-sun-plugin less than 1.6.0.u3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034463" comment="java-1_6_0-sun less than 1.6.0.u3-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5275</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5275" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5275" source="CVE"/>
	<description>
	The Adobe Macromedia Flash 9 plug-in allows remote attackers to cause a victim machine to establish TCP sessions with arbitrary hosts via a Flash (SWF) movie, related to lack of pinning of a hostname to a single IP address after receiving an allow-access-from element in a cross-domain-policy XML document, and the availability of a Flash Socket class that does not use the browser's DNS pins, aka DNS rebinding attacks, a different issue than CVE-2002-1467 and CVE-2007-4324.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 140c8f76fc987fafe79a6a7581620944 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031150" comment="flash-player less than 9.0.124.0-0.1"/>
	</criteria>
	<!-- 5c306eb0bb53025cadc8f1cfe9b447ca -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034168" comment="flash-player less than 9.0.115.0-0.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5333</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5333" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5333" source="CVE"/>
	<description>
	Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks.  NOTE: this issue exists because of an incomplete fix for CVE-2007-3385.
	</description>
 </metadata>
<!-- 16f42027b94a5b9cb6f7b7b079a64215 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034088" comment="tomcat55-admin-webapps less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034089" comment="tomcat55-common-lib less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034090" comment="tomcat55-jasper-javadoc less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034091" comment="tomcat55-jasper less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034092" comment="tomcat55-jsp-2_0-api-javadoc less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034093" comment="tomcat55-jsp-2_0-api less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034094" comment="tomcat55-server-lib less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034095" comment="tomcat55-servlet-2_4-api-javadoc less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034096" comment="tomcat55-servlet-2_4-api less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034097" comment="tomcat55-webapps less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034098" comment="tomcat55 less than 5.5.23-113.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5334</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5334" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5334" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5 can hide the window's titlebar when displaying XUL markup language documents, which makes it easier for remote attackers to conduct phishing and spoofing attacks by setting the hidechrome attribute.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3c2104dbe6890645fc7a4a2511454f72 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034024" comment="seamonkey-dom-inspector less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034025" comment="seamonkey-irc less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034026" comment="seamonkey-mail less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034027" comment="seamonkey-spellchecker less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034028" comment="seamonkey-venkman less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034029" comment="seamonkey less than 1.1.5-0.1"/>
		</criteria>
	</criteria>
	<!-- e075a64414ec276d1ef5641c9170f366 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034030" comment="MozillaFirefox-translations less than 2.0.0.8-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034031" comment="MozillaFirefox less than 2.0.0.8-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5337</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5337" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5337" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5, when running on Linux systems with gnome-vfs support, might allow remote attackers to read arbitrary files on SSH/sftp servers that accept key authentication by creating a web page on the target server, in which the web page contains URIs with (1) smb: or (2) sftp: schemes that access other files from the server.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3c2104dbe6890645fc7a4a2511454f72 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034024" comment="seamonkey-dom-inspector less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034025" comment="seamonkey-irc less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034026" comment="seamonkey-mail less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034027" comment="seamonkey-spellchecker less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034028" comment="seamonkey-venkman less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034029" comment="seamonkey less than 1.1.5-0.1"/>
		</criteria>
	</criteria>
	<!-- e075a64414ec276d1ef5641c9170f366 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034030" comment="MozillaFirefox-translations less than 2.0.0.8-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034031" comment="MozillaFirefox less than 2.0.0.8-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5338</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5338" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5338" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5 allow remote attackers to execute arbitrary Javascript with user privileges by using the Script object to modify XPCNativeWrappers in a way that causes the script to be executed when a chrome action is performed.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3c2104dbe6890645fc7a4a2511454f72 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034024" comment="seamonkey-dom-inspector less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034025" comment="seamonkey-irc less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034026" comment="seamonkey-mail less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034027" comment="seamonkey-spellchecker less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034028" comment="seamonkey-venkman less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034029" comment="seamonkey less than 1.1.5-0.1"/>
		</criteria>
	</criteria>
	<!-- e075a64414ec276d1ef5641c9170f366 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034030" comment="MozillaFirefox-translations less than 2.0.0.8-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034031" comment="MozillaFirefox less than 2.0.0.8-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5339</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5339" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5339" source="CVE"/>
	<description>
	Multiple vulnerabilities in Mozilla Firefox before 2.0.0.8, Thunderbird before 2.0.0.8, and SeaMonkey before 1.1.5 allow remote attackers to cause a denial of service (crash) via crafted HTML that triggers memory corruption or assert errors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3c2104dbe6890645fc7a4a2511454f72 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034024" comment="seamonkey-dom-inspector less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034025" comment="seamonkey-irc less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034026" comment="seamonkey-mail less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034027" comment="seamonkey-spellchecker less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034028" comment="seamonkey-venkman less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034029" comment="seamonkey less than 1.1.5-0.1"/>
		</criteria>
	</criteria>
	<!-- 6de5a1bd6a739b918eaefc0e9f242ca4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034470" comment="MozillaThunderbird-translations less than 2.0.0.9-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034471" comment="MozillaThunderbird less than 2.0.0.9-0.1"/>
		</criteria>
	</criteria>
	<!-- e075a64414ec276d1ef5641c9170f366 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034030" comment="MozillaFirefox-translations less than 2.0.0.8-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034031" comment="MozillaFirefox less than 2.0.0.8-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5340</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5340" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5340" source="CVE"/>
	<description>
	Multiple vulnerabilities in the Javascript engine in Mozilla Firefox before 2.0.0.8, Thunderbird before 2.0.0.8, and SeaMonkey before 1.1.5 allow remote attackers to cause a denial of service (crash) via crafted HTML that triggers memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3c2104dbe6890645fc7a4a2511454f72 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034024" comment="seamonkey-dom-inspector less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034025" comment="seamonkey-irc less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034026" comment="seamonkey-mail less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034027" comment="seamonkey-spellchecker less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034028" comment="seamonkey-venkman less than 1.1.5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034029" comment="seamonkey less than 1.1.5-0.1"/>
		</criteria>
	</criteria>
	<!-- 6de5a1bd6a739b918eaefc0e9f242ca4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034470" comment="MozillaThunderbird-translations less than 2.0.0.9-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034471" comment="MozillaThunderbird less than 2.0.0.9-0.1"/>
		</criteria>
	</criteria>
	<!-- e075a64414ec276d1ef5641c9170f366 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034030" comment="MozillaFirefox-translations less than 2.0.0.8-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034031" comment="MozillaFirefox less than 2.0.0.8-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5342</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5342" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5342" source="CVE"/>
	<description>
	The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict certain permissions for web applications, which allows attackers to modify logging configuration options and overwrite arbitrary files, as demonstrated by changing the (1) level, (2) directory, and (3) prefix attributes in the org.apache.juli.FileHandler handler.
	</description>
 </metadata>
<!-- 365dbb435ab00d239dd3b2a2bdb87dc2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034099" comment="apache2-mod_jk less than 1.2.21-59.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034100" comment="tomcat55-admin-webapps less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034101" comment="tomcat55-common-lib less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034102" comment="tomcat55-jasper-javadoc less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034103" comment="tomcat55-jasper less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034104" comment="tomcat55-jsp-2_0-api-javadoc less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034105" comment="tomcat55-jsp-2_0-api less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034106" comment="tomcat55-server-lib less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034107" comment="tomcat55-servlet-2_4-api-javadoc less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034108" comment="tomcat55-servlet-2_4-api less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034109" comment="tomcat55-webapps less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034110" comment="tomcat55 less than 5.5.23-113.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5379</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5379" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5379" source="CVE"/>
	<description>
	Rails before 1.2.4, as used for Ruby on Rails, allows remote attackers and ActiveResource servers to determine the existence of arbitrary files and read arbitrary XML files via the Hash.from_xml (Hash#from_xml) method, which uses XmlSimple (XML::Simple) unsafely, as demonstrated by reading passwords from the Pidgin (Gaim) .purple/accounts.xml file.
	</description>
 </metadata>
<!-- f684f2796a6f3e5eb78a319b9997fee8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034138" comment="rubygem-activesupport less than 1.4.2-20.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5380</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5380" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5380" source="CVE"/>
	<description>
	Session fixation vulnerability in Rails before 1.2.4, as used for Ruby on Rails, allows remote attackers to hijack web sessions via unspecified vectors related to "URL-based sessions."
	</description>
 </metadata>
<!-- 6761b37a2b3dd98cf677b3732952800f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034472" comment="rubygem-actionpack less than 1.13.3-20.3"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5392</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5392" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5392" source="CVE"/>
	<description>
	Integer overflow in the DCTStream::reset method in xpdf/Stream.cc in Xpdf 3.02p11 allows remote attackers to execute arbitrary code via a crafted PDF file, resulting in a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1a64560332f562764a93e6b6f66bd294 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034175" comment="cups-client less than 1.2.12-22.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034176" comment="cups-devel less than 1.2.12-22.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034177" comment="cups-libs-32bit less than 1.2.12-22.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034178" comment="cups-libs-64bit less than 1.2.12-22.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034179" comment="cups-libs less than 1.2.12-22.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034180" comment="cups less than 1.2.12-22.4"/>
		</criteria>
	</criteria>
	<!-- a4547a5fac6802e4ca828e1905a35637 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034181" comment="poppler-devel less than 0.5.4-101.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034182" comment="poppler-doc less than 0.5.4-101.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034183" comment="poppler-glib less than 0.5.4-101.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034184" comment="poppler-qt4 less than 0.5.4-101.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034185" comment="poppler-qt less than 0.5.4-101.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034186" comment="poppler-tools less than 0.5.4-101.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034187" comment="poppler less than 0.5.4-101.2"/>
		</criteria>
	</criteria>
	<!-- ae5e13b76ac07f1055f34e55a6925b8c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034188" comment="koffice-database-mysql less than 1.6.3-51.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034189" comment="koffice-database-psql less than 1.6.3-51.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034190" comment="koffice-database less than 1.6.3-51.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034191" comment="koffice-devel less than 1.6.3-51.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034192" comment="koffice-extra less than 1.6.3-51.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034193" comment="koffice-illustration less than 1.6.3-51.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034194" comment="koffice-planning less than 1.6.3-51.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034195" comment="koffice-presentation less than 1.6.3-51.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034196" comment="koffice-python less than 1.6.3-51.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034197" comment="koffice-ruby less than 1.6.3-51.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034198" comment="koffice-spreadsheet less than 1.6.3-51.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034199" comment="koffice-wordprocessing less than 1.6.3-51.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034200" comment="koffice less than 1.6.3-51.3"/>
		</criteria>
	</criteria>
	<!-- d063f6fa715e3c80bf0f69f3adb58fb0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034201" comment="xpdf-tools less than 3.02-19.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034202" comment="xpdf less than 3.02-19.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5393</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5393" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5393" source="CVE"/>
	<description>
	Heap-based buffer overflow in the CCITTFaxStream::lookChar method in xpdf/Stream.cc in Xpdf 3.02p11 allows remote attackers to execute arbitrary code via a PDF file that contains a crafted CCITTFaxDecode filter.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1a64560332f562764a93e6b6f66bd294 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034175" comment="cups-client less than 1.2.12-22.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034176" comment="cups-devel less than 1.2.12-22.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034177" comment="cups-libs-32bit less than 1.2.12-22.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034178" comment="cups-libs-64bit less than 1.2.12-22.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034179" comment="cups-libs less than 1.2.12-22.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034180" comment="cups less than 1.2.12-22.4"/>
		</criteria>
	</criteria>
	<!-- 50f76eca3845ae450b588f46d276e673 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034473" comment="kdegraphics3-pdf less than 3.5.7-60.3"/>
	</criteria>
	<!-- a4547a5fac6802e4ca828e1905a35637 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034181" comment="poppler-devel less than 0.5.4-101.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034182" comment="poppler-doc less than 0.5.4-101.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034183" comment="poppler-glib less than 0.5.4-101.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034184" comment="poppler-qt4 less than 0.5.4-101.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034185" comment="poppler-qt less than 0.5.4-101.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034186" comment="poppler-tools less than 0.5.4-101.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034187" comment="poppler less than 0.5.4-101.2"/>
		</criteria>
	</criteria>
	<!-- ae5e13b76ac07f1055f34e55a6925b8c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034188" comment="koffice-database-mysql less than 1.6.3-51.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034189" comment="koffice-database-psql less than 1.6.3-51.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034190" comment="koffice-database less than 1.6.3-51.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034191" comment="koffice-devel less than 1.6.3-51.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034192" comment="koffice-extra less than 1.6.3-51.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034193" comment="koffice-illustration less than 1.6.3-51.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034194" comment="koffice-planning less than 1.6.3-51.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034195" comment="koffice-presentation less than 1.6.3-51.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034196" comment="koffice-python less than 1.6.3-51.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034197" comment="koffice-ruby less than 1.6.3-51.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034198" comment="koffice-spreadsheet less than 1.6.3-51.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034199" comment="koffice-wordprocessing less than 1.6.3-51.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034200" comment="koffice less than 1.6.3-51.3"/>
		</criteria>
	</criteria>
	<!-- d063f6fa715e3c80bf0f69f3adb58fb0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034201" comment="xpdf-tools less than 3.02-19.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034202" comment="xpdf less than 3.02-19.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5398</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5398" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5398" source="CVE"/>
	<description>
	Stack-based buffer overflow in the reply_netbios_packet function in nmbd/nmbd_packets.c in nmbd in Samba 3.0.0 through 3.0.26a, when operating as a WINS server, allows remote attackers to execute arbitrary code via crafted WINS Name Registration requests followed by a WINS Name Query request.
	</description>
 </metadata>
<!-- 536774cfb51ad1e7572f45d3ced6cf5b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034225" comment="cifs-mount less than 3.0.26a-3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034226" comment="ldapsmb less than 1.34b-110.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034227" comment="libmsrpc-devel less than 3.0.26a-3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034228" comment="libmsrpc less than 3.0.26a-3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034229" comment="libsmbclient-32bit less than 3.0.26a-3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034230" comment="libsmbclient-64bit less than 3.0.26a-3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034231" comment="libsmbclient-devel less than 3.0.26a-3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034232" comment="libsmbclient less than 3.0.26a-3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034233" comment="libsmbsharemodes-devel less than 3.0.26a-3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034234" comment="libsmbsharemodes less than 3.0.26a-3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034235" comment="samba-32bit less than 3.0.26a-3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034236" comment="samba-64bit less than 3.0.26a-3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034237" comment="samba-client-32bit less than 3.0.26a-3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034238" comment="samba-client-64bit less than 3.0.26a-3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034239" comment="samba-client less than 3.0.26a-3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034240" comment="samba-devel less than 3.0.26a-3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034241" comment="samba-doc less than 3.0.26a-3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034242" comment="samba-krb-printing less than 3.0.26a-3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034243" comment="samba-python less than 3.0.26a-3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034244" comment="samba-vscan less than 0.3.6b-181.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034245" comment="samba-winbind-32bit less than 3.0.26a-3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034246" comment="samba-winbind-64bit less than 3.0.26a-3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034247" comment="samba-winbind less than 3.0.26a-3.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034248" comment="samba less than 3.0.26a-3.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5400</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5400" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5400" source="CVE"/>
	<description>
	Heap-based buffer overflow in the Shockwave Flash (SWF) frame handling in RealNetworks RealPlayer 10.5 Build 6.0.12.1483 might allow remote attackers to execute arbitrary code via a crafted SWF file.
	</description>
 </metadata>
<!-- a1e6e391cab2ffaffab6bcb9372f7d3a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034474" comment="RealPlayer less than 10.0.5-100.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034475" comment="RealPlayer less than 10.0.9-11.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5461</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5461" source="CVE"/>
	<description>
	Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag.
	</description>
 </metadata>
<!-- 365dbb435ab00d239dd3b2a2bdb87dc2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034099" comment="apache2-mod_jk less than 1.2.21-59.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034100" comment="tomcat55-admin-webapps less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034101" comment="tomcat55-common-lib less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034102" comment="tomcat55-jasper-javadoc less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034103" comment="tomcat55-jasper less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034104" comment="tomcat55-jsp-2_0-api-javadoc less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034105" comment="tomcat55-jsp-2_0-api less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034106" comment="tomcat55-server-lib less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034107" comment="tomcat55-servlet-2_4-api-javadoc less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034108" comment="tomcat55-servlet-2_4-api less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034109" comment="tomcat55-webapps less than 5.5.23-113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034110" comment="tomcat55 less than 5.5.23-113.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5497</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5497" source="CVE"/>
	<description>
	Multiple integer overflows in libext2fs in e2fsprogs before 1.40.3 allow user-assisted remote attackers to execute arbitrary code via a crafted filesystem image.
	</description>
 </metadata>
<!-- 2d3611d4e548665833c54af8bbed9d92 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034476" comment="e2fsprogs-devel less than 1.40.2-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034477" comment="e2fsprogs less than 1.40.2-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034478" comment="libblkid-devel less than 1.40.2-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034479" comment="libblkid1 less than 1.40.2-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034480" comment="libcom_err-devel less than 1.40.2-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034481" comment="libcom_err2-32bit less than 1.40.2-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034482" comment="libcom_err2-64bit less than 1.40.2-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034483" comment="libcom_err2 less than 1.40.2-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034484" comment="libext2fs-devel less than 1.40.2-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034485" comment="libext2fs2 less than 1.40.2-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034486" comment="libuuid-devel less than 1.40.2-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034487" comment="libuuid1-32bit less than 1.40.2-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034488" comment="libuuid1-64bit less than 1.40.2-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034489" comment="libuuid1 less than 1.40.2-20.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5500</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5500" source="CVE"/>
	<description>
	The wait_task_stopped function in the Linux kernel before 2.6.23.8 checks a TASK_TRACED bit instead of an exit_state value, which allows local users to cause a denial of service (machine crash) via unspecified vectors.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 4f32ff51e614bd2e71f196ee79dd9628 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034490" comment="kernel-bigsmp less than 2.6.22.13-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034491" comment="kernel-debug less than 2.6.22.13-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034492" comment="kernel-default less than 2.6.22.13-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034493" comment="kernel-kdump less than 2.6.22.13-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034494" comment="kernel-ppc64 less than 2.6.22.13-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034495" comment="kernel-rt less than 2.6.22.13-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034496" comment="kernel-rt_debug less than 2.6.22.13-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034497" comment="kernel-source less than 2.6.22.13-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034498" comment="kernel-syms less than 2.6.22.13-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034499" comment="kernel-xen less than 2.6.22.13-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034500" comment="kernel-xenpae less than 2.6.22.13-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5501</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5501" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5501" source="CVE"/>
	<description>
	The tcp_sacktag_write_queue function in net/ipv4/tcp_input.c in Linux kernel 2.6.21 through 2.6.23.7, and 2.6.24-rc through 2.6.24-rc2, allows remote attackers to cause a denial of service (crash) via crafted ACK responses that trigger a NULL pointer dereference.
	</description>
 </metadata>
<!-- 4f32ff51e614bd2e71f196ee79dd9628 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034490" comment="kernel-bigsmp less than 2.6.22.13-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034491" comment="kernel-debug less than 2.6.22.13-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034492" comment="kernel-default less than 2.6.22.13-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034493" comment="kernel-kdump less than 2.6.22.13-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034494" comment="kernel-ppc64 less than 2.6.22.13-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034495" comment="kernel-rt less than 2.6.22.13-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034496" comment="kernel-rt_debug less than 2.6.22.13-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034497" comment="kernel-source less than 2.6.22.13-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034498" comment="kernel-syms less than 2.6.22.13-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034499" comment="kernel-xen less than 2.6.22.13-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034500" comment="kernel-xenpae less than 2.6.22.13-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5503</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5503" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5503" source="CVE"/>
	<description>
	Multiple integer overflows in Cairo before 1.4.12 might allow remote attackers to execute arbitrary code, as demonstrated using a crafted PNG image with large width and height values, which is not properly handled by the read_png function.
	</description>
 </metadata>
<!-- 62705f38a006c3eaa0507045db3bee9c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034501" comment="cairo-32bit less than 1.4.10-25.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034502" comment="cairo-64bit less than 1.4.10-25.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034503" comment="cairo-devel-64bit less than 1.4.10-25.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034504" comment="cairo-devel less than 1.4.10-25.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034505" comment="cairo-doc less than 1.4.10-25.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034506" comment="cairo less than 1.4.10-25.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5540</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5540" source="CVE"/>
	<description>
	Unspecified vulnerability in Opera before 9.24 allows remote attackers to overwrite functions on pages from other domains and bypass the same-origin policy via unknown vectors.
	</description>
 </metadata>
<!-- 7f39b69c8fd1115240872a5de7840d60 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034507" comment="opera less than 9.24-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5541</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5541" source="CVE"/>
	<description>
	Unspecified vulnerability in Opera before 9.24, when using an "external" newsgroup or e-mail client, allows remote attackers to execute arbitrary commands via unknown vectors.
	</description>
 </metadata>
<!-- 7f39b69c8fd1115240872a5de7840d60 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034507" comment="opera less than 9.24-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5589</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5589" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5589" source="CVE"/>
	<description>
	Muliple cross-site scripting (XSS) vulnerabilities in phpMyAdmin before 2.11.1.2 allow remote attackers to inject arbitrary web script or HTML via certain input available in (1) PHP_SELF in (a) server_status.php, and (b) grab_globals.lib.php, (c) display_change_password.lib.php, and (d) common.lib.php in libraries/; and certain input available in PHP_SELF and (2) PATH_INFO in libraries/common.inc.php.  NOTE: there might also be other vectors related to (3) REQUEST_URI.
	</description>
 </metadata>
<!-- 6db2cec8882f27d42f6dcc199d45221f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034508" comment="phpMyAdmin less than 2.11.0-14.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5623</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5623" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5623" source="CVE"/>
	<description>
	Buffer overflow in the check_snmp function in Nagios Plugins (nagios-plugins) 1.4.10 allows remote attackers to cause a denial of service (crash) via crafted snmpget replies.
	</description>
 </metadata>
<!-- 68981f926f4df939e07de12cbc999f38 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034446" comment="nagios-plugins-extras less than 1.4.9-19.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034447" comment="nagios-plugins less than 1.4.9-19.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5624</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5624" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5624" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Nagios 2.x before 2.10 allows remote attackers to inject arbitrary web script or HTML via unknown vectors to unspecified CGI scripts.
	</description>
 </metadata>
<!-- 3a56807cb39c716cb519298b66970cc9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034509" comment="nagios-www less than 2.9-48.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034510" comment="nagios less than 2.9-48.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5707</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5707" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5707" source="CVE"/>
	<description>
	OpenLDAP before 2.3.39 allows remote attackers to cause a denial of service (slapd crash) via an LDAP request with a malformed objectClasses attribute.  NOTE: this has been reported as a double free, but the reports are inconsistent.
	</description>
 </metadata>
<!-- ff4076c25ce5c9455e46f86dc37e2cae -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034511" comment="openldap2-back-meta less than 2.3.37-7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034512" comment="openldap2-back-perl less than 2.3.37-7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034513" comment="openldap2-devel-32bit less than 2.3.37-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034514" comment="openldap2-devel-64bit less than 2.3.37-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034515" comment="openldap2-devel less than 2.3.37-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034516" comment="openldap2 less than 2.3.37-7.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5708</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5708" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5708" source="CVE"/>
	<description>
	slapo-pcache (overlays/pcache.c) in slapd in OpenLDAP before 2.3.39, when running as a proxy-caching server, allocates memory using a malloc variant instead of calloc, which prevents an array from being initialized properly and might allow attackers to cause a denial of service (segmentation fault) via unknown vectors that prevent the array from being null terminated.
	</description>
 </metadata>
<!-- ff4076c25ce5c9455e46f86dc37e2cae -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034511" comment="openldap2-back-meta less than 2.3.37-7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034512" comment="openldap2-back-perl less than 2.3.37-7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034513" comment="openldap2-devel-32bit less than 2.3.37-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034514" comment="openldap2-devel-64bit less than 2.3.37-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034515" comment="openldap2-devel less than 2.3.37-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034516" comment="openldap2 less than 2.3.37-7.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5745</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5745" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5745" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in OpenOffice.org before 2.4 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Quattro Pro (QPRO) file with crafted (1) Attribute and (2) Font Description records.
	</description>
 </metadata>
<!-- 0abe09c4e8fdfd958e569c4846fbce31 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034295" comment="OpenOffice_org-af less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034296" comment="OpenOffice_org-ar less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034297" comment="OpenOffice_org-base less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034298" comment="OpenOffice_org-be-BY less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034299" comment="OpenOffice_org-bg less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034300" comment="OpenOffice_org-ca less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034301" comment="OpenOffice_org-calc less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034302" comment="OpenOffice_org-cs less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034303" comment="OpenOffice_org-cy less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034304" comment="OpenOffice_org-da less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034305" comment="OpenOffice_org-de less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034306" comment="OpenOffice_org-devel less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034307" comment="OpenOffice_org-draw less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034308" comment="OpenOffice_org-el less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034309" comment="OpenOffice_org-en-GB less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034310" comment="OpenOffice_org-es less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034311" comment="OpenOffice_org-et less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034312" comment="OpenOffice_org-fi less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034313" comment="OpenOffice_org-filters less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034314" comment="OpenOffice_org-fr less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034315" comment="OpenOffice_org-gnome less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034316" comment="OpenOffice_org-gu-IN less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034317" comment="OpenOffice_org-hi-IN less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034318" comment="OpenOffice_org-hr less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034319" comment="OpenOffice_org-hu less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034320" comment="OpenOffice_org-impress less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034321" comment="OpenOffice_org-it less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034322" comment="OpenOffice_org-ja less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034323" comment="OpenOffice_org-kde less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034324" comment="OpenOffice_org-km less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034325" comment="OpenOffice_org-ko less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034326" comment="OpenOffice_org-lt less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034327" comment="OpenOffice_org-mailmerge less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034328" comment="OpenOffice_org-math less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034329" comment="OpenOffice_org-mk less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034330" comment="OpenOffice_org-mono less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034331" comment="OpenOffice_org-nb less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034332" comment="OpenOffice_org-nl less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034333" comment="OpenOffice_org-nn less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034334" comment="OpenOffice_org-officebean less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034335" comment="OpenOffice_org-pa-IN less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034336" comment="OpenOffice_org-pl less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034337" comment="OpenOffice_org-pt-BR less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034338" comment="OpenOffice_org-pt less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034339" comment="OpenOffice_org-pyuno less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034340" comment="OpenOffice_org-ru less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034341" comment="OpenOffice_org-rw less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034342" comment="OpenOffice_org-sdk-doc less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034343" comment="OpenOffice_org-sdk less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034344" comment="OpenOffice_org-sk less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034345" comment="OpenOffice_org-sl less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034346" comment="OpenOffice_org-sr-CS less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034347" comment="OpenOffice_org-st less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034348" comment="OpenOffice_org-sv less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034349" comment="OpenOffice_org-testtool less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034350" comment="OpenOffice_org-tr less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034351" comment="OpenOffice_org-ts less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034352" comment="OpenOffice_org-vi less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034353" comment="OpenOffice_org-writer less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034354" comment="OpenOffice_org-xh less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034355" comment="OpenOffice_org-zh-CN less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034356" comment="OpenOffice_org-zh-TW less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034357" comment="OpenOffice_org-zu less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034358" comment="OpenOffice_org less than 2.3.0.1.2-10.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5747</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5747" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5747" source="CVE"/>
	<description>
	Integer underflow in OpenOffice.org before 2.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Quattro Pro (QPRO) file with crafted values that trigger an excessive loop and a stack-based buffer overflow.
	</description>
 </metadata>
<!-- 0abe09c4e8fdfd958e569c4846fbce31 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034295" comment="OpenOffice_org-af less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034296" comment="OpenOffice_org-ar less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034297" comment="OpenOffice_org-base less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034298" comment="OpenOffice_org-be-BY less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034299" comment="OpenOffice_org-bg less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034300" comment="OpenOffice_org-ca less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034301" comment="OpenOffice_org-calc less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034302" comment="OpenOffice_org-cs less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034303" comment="OpenOffice_org-cy less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034304" comment="OpenOffice_org-da less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034305" comment="OpenOffice_org-de less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034306" comment="OpenOffice_org-devel less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034307" comment="OpenOffice_org-draw less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034308" comment="OpenOffice_org-el less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034309" comment="OpenOffice_org-en-GB less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034310" comment="OpenOffice_org-es less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034311" comment="OpenOffice_org-et less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034312" comment="OpenOffice_org-fi less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034313" comment="OpenOffice_org-filters less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034314" comment="OpenOffice_org-fr less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034315" comment="OpenOffice_org-gnome less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034316" comment="OpenOffice_org-gu-IN less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034317" comment="OpenOffice_org-hi-IN less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034318" comment="OpenOffice_org-hr less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034319" comment="OpenOffice_org-hu less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034320" comment="OpenOffice_org-impress less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034321" comment="OpenOffice_org-it less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034322" comment="OpenOffice_org-ja less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034323" comment="OpenOffice_org-kde less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034324" comment="OpenOffice_org-km less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034325" comment="OpenOffice_org-ko less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034326" comment="OpenOffice_org-lt less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034327" comment="OpenOffice_org-mailmerge less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034328" comment="OpenOffice_org-math less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034329" comment="OpenOffice_org-mk less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034330" comment="OpenOffice_org-mono less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034331" comment="OpenOffice_org-nb less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034332" comment="OpenOffice_org-nl less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034333" comment="OpenOffice_org-nn less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034334" comment="OpenOffice_org-officebean less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034335" comment="OpenOffice_org-pa-IN less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034336" comment="OpenOffice_org-pl less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034337" comment="OpenOffice_org-pt-BR less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034338" comment="OpenOffice_org-pt less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034339" comment="OpenOffice_org-pyuno less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034340" comment="OpenOffice_org-ru less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034341" comment="OpenOffice_org-rw less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034342" comment="OpenOffice_org-sdk-doc less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034343" comment="OpenOffice_org-sdk less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034344" comment="OpenOffice_org-sk less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034345" comment="OpenOffice_org-sl less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034346" comment="OpenOffice_org-sr-CS less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034347" comment="OpenOffice_org-st less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034348" comment="OpenOffice_org-sv less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034349" comment="OpenOffice_org-testtool less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034350" comment="OpenOffice_org-tr less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034351" comment="OpenOffice_org-ts less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034352" comment="OpenOffice_org-vi less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034353" comment="OpenOffice_org-writer less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034354" comment="OpenOffice_org-xh less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034355" comment="OpenOffice_org-zh-CN less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034356" comment="OpenOffice_org-zh-TW less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034357" comment="OpenOffice_org-zu less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034358" comment="OpenOffice_org less than 2.3.0.1.2-10.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5760</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5760" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5760" source="CVE"/>
	<description>
	Array index error in the XFree86-Misc extension in X.Org Xserver before 1.4.1 allows context-dependent attackers to execute arbitrary code via a PassMessage request containing a large array index.
	</description>
 </metadata>
<!-- b98c19ba6b09fe5ebb89ecc6aa69dd5d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034517" comment="xorg-x11-devel-32bit less than 7.2-103.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034518" comment="xorg-x11-devel-64bit less than 7.2-103.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034519" comment="xorg-x11-devel less than 7.2-103.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034520" comment="xorg-x11-libs-32bit less than 7.2-103.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034521" comment="xorg-x11-libs-64bit less than 7.2-103.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034522" comment="xorg-x11-libs less than 7.2-103.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034523" comment="xorg-x11-server-extra less than 7.2-143.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034524" comment="xorg-x11-server-sdk less than 7.2-143.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034525" comment="xorg-x11-server less than 7.2-143.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5770</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5770" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5770" source="CVE"/>
	<description>
	The (1) Net::ftptls, (2) Net::telnets, (3) Net::imap, (4) Net::pop, and (5) Net::smtp libraries in Ruby 1.8.5 and 1.8.6 do not verify that the commonName (CN) field in a server certificate matches the domain name in a request sent over SSL, which makes it easier for remote attackers to intercept SSL transmissions via a man-in-the-middle attack or spoofed web site, different components than CVE-2007-5162.
	</description>
 </metadata>
<!-- 93fd206cf6bc176932e1872cf7b39a5c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034438" comment="ruby-devel less than 1.8.6.p36-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034439" comment="ruby-doc-html less than 1.8.6.p36-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034440" comment="ruby-doc-ri less than 1.8.6.p36-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034441" comment="ruby-examples less than 1.8.6.p36-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034442" comment="ruby-test-suite less than 1.8.6.p36-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034443" comment="ruby-tk less than 1.8.6.p36-20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034444" comment="ruby less than 1.8.6.p36-20.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5795</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5795" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5795" source="CVE"/>
	<description>
	The hack-local-variables function in Emacs before 22.2, when enable-local-variables is set to :safe, does not properly search lists of unsafe or risky variables, which might allow user-assisted attackers to bypass intended restrictions and modify critical program variables via a file containing a Local variables declaration.
	</description>
 </metadata>
<!-- 320e2742af98dbd17136bf69edcdbab8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034526" comment="emacs-el less than 22.1-40.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034527" comment="emacs-info less than 22.1-40.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034528" comment="emacs-nox less than 22.1-40.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034529" comment="emacs-x11 less than 22.1-40.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034530" comment="emacs less than 22.1-40.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5803</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5803" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5803" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in CGI programs in Nagios before 2.12 might allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different issue than CVE-2007-5624 and CVE-2008-1360.
	</description>
 </metadata>
<!-- 3a56807cb39c716cb519298b66970cc9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034509" comment="nagios-www less than 2.9-48.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034510" comment="nagios less than 2.9-48.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5848</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5848" source="CVE"/>
	<description>
	Buffer overflow in CUPS in Apple Mac OS X 10.4.11 allows local admin users to execute arbitrary code via a crafted URI to the CUPS service.
	</description>
 </metadata>
<!-- d415eb946d9ec0e2c63df415ffe687df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034531" comment="cups-client less than 1.2.12-22.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034532" comment="cups-devel less than 1.2.12-22.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034533" comment="cups-libs-32bit less than 1.2.12-22.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034534" comment="cups-libs-64bit less than 1.2.12-22.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034535" comment="cups-libs less than 1.2.12-22.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034536" comment="cups less than 1.2.12-22.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5849</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5849" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5849" source="CVE"/>
	<description>
	Integer underflow in the asn1_get_string function in the SNMP back end (backend/snmp.c) for CUPS 1.2 through 1.3.4 allows remote attackers to execute arbitrary code via a crafted SNMP response that triggers a stack-based buffer overflow.
	</description>
 </metadata>
<!-- d415eb946d9ec0e2c63df415ffe687df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034531" comment="cups-client less than 1.2.12-22.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034532" comment="cups-devel less than 1.2.12-22.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034533" comment="cups-libs-32bit less than 1.2.12-22.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034534" comment="cups-libs-64bit less than 1.2.12-22.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034535" comment="cups-libs less than 1.2.12-22.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034536" comment="cups less than 1.2.12-22.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5894</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5894" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5894" source="CVE"/>
	<description>
	** DISPUTED **  The reply function in ftpd.c in the gssftp ftpd in MIT Kerberos 5 (krb5) does not initialize the length variable when auth_type has a certain value, which has unknown impact and remote authenticated attack vectors.  NOTE: the original disclosure misidentifies the conditions under which the uninitialized variable is used.  NOTE: the vendor disputes this issue, stating " The 'length' variable is only uninitialized if 'auth_type' is neither the 'KERBEROS_V4' nor 'GSSAPI'; this condition cannot occur in the unmodified source code."
	</description>
 </metadata>
<!-- 6105475ccd457719a0c49133c756fc2c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034537" comment="krb5-32bit less than 1.6.2-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034538" comment="krb5-64bit less than 1.6.2-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034539" comment="krb5-apps-clients less than 1.6.2-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034540" comment="krb5-apps-servers less than 1.6.2-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034541" comment="krb5-client less than 1.6.2-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034542" comment="krb5-devel-32bit less than 1.6.2-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034543" comment="krb5-devel-64bit less than 1.6.2-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034544" comment="krb5-devel less than 1.6.2-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034545" comment="krb5-server less than 1.6.2-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034546" comment="krb5 less than 1.6.2-22.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5902</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5902" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5902" source="CVE"/>
	<description>
	Integer overflow in the svcauth_gss_get_principal function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (krb5) allows remote attackers to have an unknown impact via a large length value for a GSS client name in an RPC request.
	</description>
 </metadata>
<!-- 6105475ccd457719a0c49133c756fc2c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034537" comment="krb5-32bit less than 1.6.2-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034538" comment="krb5-64bit less than 1.6.2-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034539" comment="krb5-apps-clients less than 1.6.2-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034540" comment="krb5-apps-servers less than 1.6.2-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034541" comment="krb5-client less than 1.6.2-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034542" comment="krb5-devel-32bit less than 1.6.2-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034543" comment="krb5-devel-64bit less than 1.6.2-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034544" comment="krb5-devel less than 1.6.2-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034545" comment="krb5-server less than 1.6.2-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034546" comment="krb5 less than 1.6.2-22.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5904</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5904" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5904" source="CVE"/>
	<description>
	Multiple buffer overflows in CIFS VFS in Linux kernel 2.6.23 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long SMB responses that trigger the overflows in the SendReceive function.
	</description>
 </metadata>
<!-- 4f32ff51e614bd2e71f196ee79dd9628 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034490" comment="kernel-bigsmp less than 2.6.22.13-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034491" comment="kernel-debug less than 2.6.22.13-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034492" comment="kernel-default less than 2.6.22.13-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034493" comment="kernel-kdump less than 2.6.22.13-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034494" comment="kernel-ppc64 less than 2.6.22.13-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034495" comment="kernel-rt less than 2.6.22.13-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034496" comment="kernel-rt_debug less than 2.6.22.13-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034497" comment="kernel-source less than 2.6.22.13-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034498" comment="kernel-syms less than 2.6.22.13-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034499" comment="kernel-xen less than 2.6.22.13-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034500" comment="kernel-xenpae less than 2.6.22.13-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5906</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5906" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5906" source="CVE"/>
	<description>
	Xen 3.1.1 allows virtual guest system users to cause a denial of service (hypervisor crash) by using a debug register (DR7) to set certain breakpoints.
	</description>
 </metadata>
<!-- 6d44e4e57c43998863060d086aa1dd54 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034547" comment="xen-devel less than 3.1.0_15042-51.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034548" comment="xen-doc-html less than 3.1.0_15042-51.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034549" comment="xen-doc-pdf less than 3.1.0_15042-51.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034550" comment="xen-libs less than 3.1.0_15042-51.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034551" comment="xen-tools-domU less than 3.1.0_15042-51.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034552" comment="xen-tools-ioemu less than 3.1.0_15042-51.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034553" comment="xen-tools less than 3.1.0_15042-51.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034554" comment="xen less than 3.1.0_15042-51.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5907</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5907" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5907" source="CVE"/>
	<description>
	Xen 3.1.1 does not prevent modification of the CR4 TSC from applications, which allows pv guests to cause a denial of service (crash).
	</description>
 </metadata>
<!-- 6d44e4e57c43998863060d086aa1dd54 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034547" comment="xen-devel less than 3.1.0_15042-51.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034548" comment="xen-doc-html less than 3.1.0_15042-51.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034549" comment="xen-doc-pdf less than 3.1.0_15042-51.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034550" comment="xen-libs less than 3.1.0_15042-51.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034551" comment="xen-tools-domU less than 3.1.0_15042-51.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034552" comment="xen-tools-ioemu less than 3.1.0_15042-51.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034553" comment="xen-tools less than 3.1.0_15042-51.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034554" comment="xen less than 3.1.0_15042-51.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5925</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5925" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5925" source="CVE"/>
	<description>
	The convert_search_mode_to_innobase function in ha_innodb.cc in the InnoDB engine in MySQL 5.1.23-BK and earlier allows remote authenticated users to cause a denial of service (database crash) via a certain CONTAINS operation on an indexed column, which triggers an assertion error.
	</description>
 </metadata>
<!-- a254dbd54a164c6197e3fbdf34bf84e6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034111" comment="libmysqlclient-devel less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034112" comment="libmysqlclient15-32bit less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034113" comment="libmysqlclient15-64bit less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034114" comment="libmysqlclient15 less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034115" comment="libmysqlclient_r15-32bit less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034116" comment="libmysqlclient_r15-64bit less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034117" comment="libmysqlclient_r15 less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034118" comment="mysql-Max less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034119" comment="mysql-bench less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034120" comment="mysql-client less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034121" comment="mysql-debug less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034122" comment="mysql-tools less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034123" comment="mysql less than 5.0.45-22.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5935</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5935" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5935" source="CVE"/>
	<description>
	Stack-based buffer overflow in hpc.c in dvips in teTeX and TeXlive 2007 and earlier allows user-assisted attackers to execute arbitrary code via a DVI file with a long href tag.
	</description>
 </metadata>
<!-- 91d3cb47a5a72399aab1929fa7ddadab -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034555" comment="texlive-bin-cjk less than 2007-68.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034556" comment="texlive-bin-devel less than 2007-68.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034557" comment="texlive-bin-dvilj less than 2007-68.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034558" comment="texlive-bin-latex less than 2007-68.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034559" comment="texlive-bin-metapost less than 2007-68.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034560" comment="texlive-bin-omega less than 2007-68.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034561" comment="texlive-bin-xetex less than 2007-68.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034562" comment="texlive-bin less than 2007-68.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5936</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5936" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5936" source="CVE"/>
	<description>
	dvips in teTeX and TeXlive 2007 and earlier allows local users to obtain sensitive information and modify certain data by creating certain temporary files before they are processed by dviljk, which can then be read or modified in place.
	</description>
 </metadata>
<!-- 91d3cb47a5a72399aab1929fa7ddadab -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034555" comment="texlive-bin-cjk less than 2007-68.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034556" comment="texlive-bin-devel less than 2007-68.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034557" comment="texlive-bin-dvilj less than 2007-68.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034558" comment="texlive-bin-latex less than 2007-68.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034559" comment="texlive-bin-metapost less than 2007-68.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034560" comment="texlive-bin-omega less than 2007-68.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034561" comment="texlive-bin-xetex less than 2007-68.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034562" comment="texlive-bin less than 2007-68.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5937</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5937" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5937" source="CVE"/>
	<description>
	Multiple buffer overflows in dvi2xx.c in dviljk in teTeX and TeXlive 2007 and earlier might allow user-assisted attackers to execute arbitrary code via a crafted DVI input file.
	</description>
 </metadata>
<!-- 91d3cb47a5a72399aab1929fa7ddadab -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034555" comment="texlive-bin-cjk less than 2007-68.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034556" comment="texlive-bin-devel less than 2007-68.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034557" comment="texlive-bin-dvilj less than 2007-68.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034558" comment="texlive-bin-latex less than 2007-68.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034559" comment="texlive-bin-metapost less than 2007-68.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034560" comment="texlive-bin-omega less than 2007-68.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034561" comment="texlive-bin-xetex less than 2007-68.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034562" comment="texlive-bin less than 2007-68.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5947</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5947" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5947" source="CVE"/>
	<description>
	The jar protocol handler in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2271fc2aebf8d2a0baea2c49e845df54 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034563" comment="epiphany-devel less than 2.20.0-8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034564" comment="epiphany-doc less than 2.20.0-8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034565" comment="epiphany-extensions-lang less than 2.20.0-8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034566" comment="epiphany-extensions less than 2.20.0-8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034567" comment="epiphany-lang less than 2.20.0-8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034568" comment="epiphany less than 2.20.0-8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034569" comment="mozilla-xulrunner181-32bit less than 1.8.1.10-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034570" comment="mozilla-xulrunner181-64bit less than 1.8.1.10-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034571" comment="mozilla-xulrunner181-devel less than 1.8.1.10-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034572" comment="mozilla-xulrunner181-l10n less than 1.8.1.10-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034573" comment="mozilla-xulrunner181 less than 1.8.1.10-0.1"/>
		</criteria>
	</criteria>
	<!-- 304c3c37877a092376b857d403ca4e5c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034574" comment="seamonkey-dom-inspector less than 1.1.7-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034575" comment="seamonkey-irc less than 1.1.7-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034576" comment="seamonkey-mail less than 1.1.7-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034577" comment="seamonkey-spellchecker less than 1.1.7-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034578" comment="seamonkey-venkman less than 1.1.7-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034579" comment="seamonkey less than 1.1.7-0.1"/>
		</criteria>
	</criteria>
	<!-- f6ab62ed78e2e37705b2342cb6d44f85 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034580" comment="MozillaFirefox-translations less than 2.0.0.10-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034581" comment="MozillaFirefox less than 2.0.0.10-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5958</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5958" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5958" source="CVE"/>
	<description>
	X.Org Xserver before 1.4.1 allows local users to determine the existence of arbitrary files via a filename argument in the -sp option to the X program, which produces different error messages depending on whether the filename exists.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b98c19ba6b09fe5ebb89ecc6aa69dd5d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034517" comment="xorg-x11-devel-32bit less than 7.2-103.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034518" comment="xorg-x11-devel-64bit less than 7.2-103.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034519" comment="xorg-x11-devel less than 7.2-103.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034520" comment="xorg-x11-libs-32bit less than 7.2-103.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034521" comment="xorg-x11-libs-64bit less than 7.2-103.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034522" comment="xorg-x11-libs less than 7.2-103.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034523" comment="xorg-x11-server-extra less than 7.2-143.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034524" comment="xorg-x11-server-sdk less than 7.2-143.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034525" comment="xorg-x11-server less than 7.2-143.9"/>
		</criteria>
	</criteria>
	<!-- e3fe1967d917baff2bbc65ac91d7f05f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034075" comment="xgl less than git_070104-77.3"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5959</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5959" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5959" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors that trigger memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2271fc2aebf8d2a0baea2c49e845df54 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034563" comment="epiphany-devel less than 2.20.0-8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034564" comment="epiphany-doc less than 2.20.0-8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034565" comment="epiphany-extensions-lang less than 2.20.0-8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034566" comment="epiphany-extensions less than 2.20.0-8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034567" comment="epiphany-lang less than 2.20.0-8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034568" comment="epiphany less than 2.20.0-8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034569" comment="mozilla-xulrunner181-32bit less than 1.8.1.10-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034570" comment="mozilla-xulrunner181-64bit less than 1.8.1.10-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034571" comment="mozilla-xulrunner181-devel less than 1.8.1.10-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034572" comment="mozilla-xulrunner181-l10n less than 1.8.1.10-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034573" comment="mozilla-xulrunner181 less than 1.8.1.10-0.1"/>
		</criteria>
	</criteria>
	<!-- 304c3c37877a092376b857d403ca4e5c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034574" comment="seamonkey-dom-inspector less than 1.1.7-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034575" comment="seamonkey-irc less than 1.1.7-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034576" comment="seamonkey-mail less than 1.1.7-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034577" comment="seamonkey-spellchecker less than 1.1.7-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034578" comment="seamonkey-venkman less than 1.1.7-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034579" comment="seamonkey less than 1.1.7-0.1"/>
		</criteria>
	</criteria>
	<!-- f6ab62ed78e2e37705b2342cb6d44f85 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034580" comment="MozillaFirefox-translations less than 2.0.0.10-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034581" comment="MozillaFirefox less than 2.0.0.10-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5960</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5960" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 sets the Referer header to the window or frame in which script is running, instead of the address of the content that initiated the script, which allows remote attackers to spoof HTTP Referer headers and bypass Referer-based CSRF protection schemes by setting window.location and using a modal alert dialog that causes the wrong Referer to be sent.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2271fc2aebf8d2a0baea2c49e845df54 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034563" comment="epiphany-devel less than 2.20.0-8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034564" comment="epiphany-doc less than 2.20.0-8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034565" comment="epiphany-extensions-lang less than 2.20.0-8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034566" comment="epiphany-extensions less than 2.20.0-8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034567" comment="epiphany-lang less than 2.20.0-8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034568" comment="epiphany less than 2.20.0-8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034569" comment="mozilla-xulrunner181-32bit less than 1.8.1.10-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034570" comment="mozilla-xulrunner181-64bit less than 1.8.1.10-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034571" comment="mozilla-xulrunner181-devel less than 1.8.1.10-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034572" comment="mozilla-xulrunner181-l10n less than 1.8.1.10-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034573" comment="mozilla-xulrunner181 less than 1.8.1.10-0.1"/>
		</criteria>
	</criteria>
	<!-- 304c3c37877a092376b857d403ca4e5c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034574" comment="seamonkey-dom-inspector less than 1.1.7-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034575" comment="seamonkey-irc less than 1.1.7-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034576" comment="seamonkey-mail less than 1.1.7-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034577" comment="seamonkey-spellchecker less than 1.1.7-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034578" comment="seamonkey-venkman less than 1.1.7-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034579" comment="seamonkey less than 1.1.7-0.1"/>
		</criteria>
	</criteria>
	<!-- f6ab62ed78e2e37705b2342cb6d44f85 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034580" comment="MozillaFirefox-translations less than 2.0.0.10-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034581" comment="MozillaFirefox less than 2.0.0.10-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5965</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5965" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5965" source="CVE"/>
	<description>
	QSslSocket in Trolltech Qt 4.3.0 through 4.3.2 does not properly verify SSL certificates, which might make it easier for remote attackers to trick a user into accepting an invalid server certificate for a spoofed service, or trick a service into accepting an invalid client certificate for a user.
	</description>
 </metadata>
<!-- bf38c66e4d1d25d61ffa031be786b80b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034582" comment="libqt4-32bit less than 4.3.1-23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034583" comment="libqt4-64bit less than 4.3.1-23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034584" comment="libqt4-dbus-1-32bit less than 4.3.1-23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034585" comment="libqt4-dbus-1-64bit less than 4.3.1-23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034586" comment="libqt4-dbus-1 less than 4.3.1-23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034587" comment="libqt4-devel-doc less than 4.3.1-23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034588" comment="libqt4-devel less than 4.3.1-23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034589" comment="libqt4-qt3support-32bit less than 4.3.1-23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034590" comment="libqt4-qt3support-64bit less than 4.3.1-23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034591" comment="libqt4-qt3support less than 4.3.1-23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034592" comment="libqt4-sql-32bit less than 4.3.1-23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034593" comment="libqt4-sql-64bit less than 4.3.1-23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034594" comment="libqt4-sql less than 4.3.1-23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034595" comment="libqt4-x11-32bit less than 4.3.1-23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034596" comment="libqt4-x11-64bit less than 4.3.1-23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034597" comment="libqt4-x11 less than 4.3.1-23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034598" comment="libqt4 less than 4.3.1-23.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5966</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5966" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5966" source="CVE"/>
	<description>
	Integer overflow in the hrtimer_start function in kernel/hrtimer.c in the Linux kernel before 2.6.23.10 allows local users to execute arbitrary code or cause a denial of service (panic) via a large relative timeout value.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7fa3668378a0007b680c23ffc2916d63 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034139" comment="kernel-bigsmp less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034140" comment="kernel-debug less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034141" comment="kernel-default less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034142" comment="kernel-kdump less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034143" comment="kernel-ppc64 less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034144" comment="kernel-rt less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034145" comment="kernel-rt_debug less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034146" comment="kernel-source less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034147" comment="kernel-syms less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034148" comment="kernel-xen less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034149" comment="kernel-xenpae less than 2.6.22.16-0.2"/>
		</criteria>
	</criteria>
	<!-- 8b56e6bf4853c873dce7504107f8bea4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034150" comment="kernel-bigsmp less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034151" comment="kernel-debug less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034152" comment="kernel-default less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034153" comment="kernel-kdump less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034154" comment="kernel-ppc64 less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034155" comment="kernel-rt less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034156" comment="kernel-rt_debug less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034157" comment="kernel-source less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034158" comment="kernel-syms less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034159" comment="kernel-xen less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034160" comment="kernel-xenpae less than 2.6.22.16-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5969</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5969" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5969" source="CVE"/>
	<description>
	MySQL Community Server 5.0.x before 5.0.51, Enterprise Server 5.0.x before 5.0.52, Server 5.1.x before 5.1.23, and Server 6.0.x before 6.0.4, when a table relies on symlinks created through explicit DATA DIRECTORY and INDEX DIRECTORY options, allows remote authenticated users to overwrite system table information and gain privileges via a RENAME TABLE statement that changes the symlink to point to an existing file.
	</description>
 </metadata>
<!-- a254dbd54a164c6197e3fbdf34bf84e6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034111" comment="libmysqlclient-devel less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034112" comment="libmysqlclient15-32bit less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034113" comment="libmysqlclient15-64bit less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034114" comment="libmysqlclient15 less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034115" comment="libmysqlclient_r15-32bit less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034116" comment="libmysqlclient_r15-64bit less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034117" comment="libmysqlclient_r15 less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034118" comment="mysql-Max less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034119" comment="mysql-bench less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034120" comment="mysql-client less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034121" comment="mysql-debug less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034122" comment="mysql-tools less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034123" comment="mysql less than 5.0.45-22.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5971</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5971" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5971" source="CVE"/>
	<description>
	Double free vulnerability in the gss_krb5int_make_seal_token_v3 function in lib/gssapi/krb5/k5sealv3.c in MIT Kerberos 5 (krb5) has unknown impact and attack vectors.
	</description>
 </metadata>
<!-- 6105475ccd457719a0c49133c756fc2c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034537" comment="krb5-32bit less than 1.6.2-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034538" comment="krb5-64bit less than 1.6.2-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034539" comment="krb5-apps-clients less than 1.6.2-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034540" comment="krb5-apps-servers less than 1.6.2-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034541" comment="krb5-client less than 1.6.2-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034542" comment="krb5-devel-32bit less than 1.6.2-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034543" comment="krb5-devel-64bit less than 1.6.2-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034544" comment="krb5-devel less than 1.6.2-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034545" comment="krb5-server less than 1.6.2-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034546" comment="krb5 less than 1.6.2-22.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5972</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-5972" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5972" source="CVE"/>
	<description>
	Double free vulnerability in the krb5_def_store_mkey function in lib/kdb/kdb_default.c in MIT Kerberos 5 (krb5) 1.5 has unknown impact and remote authenticated attack vectors.  NOTE: the free operations occur in code that stores the krb5kdc master key, and so the attacker must have privileges to store this key.
	</description>
 </metadata>
<!-- 6105475ccd457719a0c49133c756fc2c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034537" comment="krb5-32bit less than 1.6.2-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034538" comment="krb5-64bit less than 1.6.2-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034539" comment="krb5-apps-clients less than 1.6.2-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034540" comment="krb5-apps-servers less than 1.6.2-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034541" comment="krb5-client less than 1.6.2-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034542" comment="krb5-devel-32bit less than 1.6.2-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034543" comment="krb5-devel-64bit less than 1.6.2-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034544" comment="krb5-devel less than 1.6.2-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034545" comment="krb5-server less than 1.6.2-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034546" comment="krb5 less than 1.6.2-22.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6015</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6015" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6015" source="CVE"/>
	<description>
	Stack-based buffer overflow in the send_mailslot function in nmbd in Samba 3.0.0 through 3.0.27a, when the "domain logons" option is enabled, allows remote attackers to execute arbitrary code via a GETDC mailslot request composed of a long GETDC string following an offset username in a SAMLOGON logon request.
	</description>
 </metadata>
<!-- fd872b1500c02e0c44385c5e86e7f9f1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034599" comment="cifs-mount less than 3.0.26a-3.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034600" comment="ldapsmb less than 1.34b-110.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034601" comment="libmsrpc-devel less than 3.0.26a-3.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034602" comment="libmsrpc less than 3.0.26a-3.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034603" comment="libsmbclient-32bit less than 3.0.26a-3.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034604" comment="libsmbclient-64bit less than 3.0.26a-3.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034605" comment="libsmbclient-devel less than 3.0.26a-3.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034606" comment="libsmbclient less than 3.0.26a-3.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034607" comment="libsmbsharemodes-devel less than 3.0.26a-3.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034608" comment="libsmbsharemodes less than 3.0.26a-3.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034609" comment="samba-32bit less than 3.0.26a-3.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034610" comment="samba-64bit less than 3.0.26a-3.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034611" comment="samba-client-32bit less than 3.0.26a-3.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034612" comment="samba-client-64bit less than 3.0.26a-3.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034613" comment="samba-client less than 3.0.26a-3.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034614" comment="samba-devel less than 3.0.26a-3.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034615" comment="samba-doc less than 3.0.26a-3.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034616" comment="samba-krb-printing less than 3.0.26a-3.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034617" comment="samba-python less than 3.0.26a-3.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034618" comment="samba-vscan less than 0.3.6b-181.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034619" comment="samba-winbind-32bit less than 3.0.26a-3.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034620" comment="samba-winbind-64bit less than 3.0.26a-3.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034621" comment="samba-winbind less than 3.0.26a-3.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034622" comment="samba less than 3.0.26a-3.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6018</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6018" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6018" source="CVE"/>
	<description>
	IMP Webmail Client 4.1.5, Horde Application Framework 3.1.5, and Horde Groupware Webmail Edition 1.0.3 does not validate unspecified HTTP requests, which allows remote attackers to (1) delete arbitrary e-mail messages via a modified numeric ID or (2) "purge" deleted emails via a crafted email message.
	</description>
 </metadata>
<!-- 19fab159e700065821eee8a4856b8565 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034623" comment="imp less than 4.1.6-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6019</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6019" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6019" source="CVE"/>
	<description>
	Adobe Flash Player 9.0.115.0 and earlier, and 8.0.39.0 and earlier, allows remote attackers to execute arbitrary code via an SWF file with a modified DeclareFunction2 Actionscript tag, which prevents an object from being instantiated properly.
	</description>
 </metadata>
<!-- 140c8f76fc987fafe79a6a7581620944 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031150" comment="flash-player less than 9.0.124.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6035</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6035" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6035" source="CVE"/>
	<description>
	SQL injection vulnerability in graph.php in Cacti before 0.8.7a allows remote attackers to execute arbitrary SQL commands via the local_graph_id parameter.
	</description>
 </metadata>
<!-- abc9009f3f9085cc1584cfcd8830bd1c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034624" comment="cacti less than 0.8.6j-64.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6067</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6067" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6067" source="CVE"/>
	<description>
	Algorithmic complexity vulnerability in the regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows remote authenticated users to cause a denial of service (memory consumption) via a crafted "complex" regular expression with doubly-nested states.
	</description>
 </metadata>
<!-- 782d496c4e5ffbe3d76afff815253130 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034284" comment="postgresql-contrib less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034285" comment="postgresql-devel less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034286" comment="postgresql-docs less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034287" comment="postgresql-libs-32bit less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034288" comment="postgresql-libs-64bit less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034289" comment="postgresql-libs less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034290" comment="postgresql-plperl less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034291" comment="postgresql-plpython less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034292" comment="postgresql-pltcl less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034293" comment="postgresql-server less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034294" comment="postgresql less than 8.2.6-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6100</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6100" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6100" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in libraries/auth/cookie.auth.lib.php in phpMyAdmin before 2.11.2.2, when logins are authenticated with the cookie auth_type, allows remote attackers to inject arbitrary web script or HTML via the convcharset parameter to index.php, a different vulnerability than CVE-2005-0992.
	</description>
 </metadata>
<!-- 6db2cec8882f27d42f6dcc199d45221f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034508" comment="phpMyAdmin less than 2.11.0-14.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6109</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6109" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6109" source="CVE"/>
	<description>
	Stack-based buffer overflow in emacs allows user-assisted attackers to cause a denial of service (application crash) and possibly have unspecified other impact via a large precision value in an integer format string specifier to the format function, as demonstrated via a certain "emacs -batch -eval" command line.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 261a7b30beaae00cc08db3192a23ed83 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034625" comment="xemacs-el less than 21.5.28.20070807-24.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034626" comment="xemacs-info less than 21.5.28.20070807-24.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034627" comment="xemacs less than 21.5.28.20070807-24.2"/>
		</criteria>
	</criteria>
	<!-- 66090e4409f7ffabaeca20c5462c7e23 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034628" comment="emacs-el less than 22.1-40.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034629" comment="emacs-info less than 22.1-40.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034630" comment="emacs-nox less than 22.1-40.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034631" comment="emacs-x11 less than 22.1-40.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034632" comment="emacs less than 22.1-40.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6110</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6110" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6110" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in htsearch in htdig 3.2.0b6 allows remote attackers to inject arbitrary web script or HTML via the sort parameter.
	</description>
 </metadata>
<!-- e60e93ab9db057ea581d42dc85189175 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034633" comment="htdig-devel less than 3.2.0b6-110.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034634" comment="htdig-doc less than 3.2.0b6-110.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034635" comment="htdig less than 3.2.0b6-110.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6111</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6111" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6111" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Wireshark (formerly Ethereal) allow remote attackers to cause a denial of service (crash) via (1) a crafted MP3 file or (2) unspecified vectors to the NCP dissector.
	</description>
 </metadata>
<!-- 5c39239e38d71dd6ef672806bd798450 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034636" comment="wireshark-devel less than 0.99.6-31.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034637" comment="wireshark less than 0.99.6-31.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6112</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6112" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6112" source="CVE"/>
	<description>
	Buffer overflow in the PPP dissector Wireshark (formerly Ethereal) 0.99.6 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 5c39239e38d71dd6ef672806bd798450 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034636" comment="wireshark-devel less than 0.99.6-31.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034637" comment="wireshark less than 0.99.6-31.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6113</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6113" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6113" source="CVE"/>
	<description>
	Integer signedness error in the DNP3 dissector in Wireshark (formerly Ethereal) 0.10.12 to 0.99.6 allows remote attackers to cause a denial of service (long loop) via a malformed DNP3 packet.
	</description>
 </metadata>
<!-- 5c39239e38d71dd6ef672806bd798450 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034636" comment="wireshark-devel less than 0.99.6-31.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034637" comment="wireshark less than 0.99.6-31.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6114</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6114" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6114" source="CVE"/>
	<description>
	Multiple buffer overflows in Wireshark (formerly Ethereal) 0.99.0 through 0.99.6 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) the SSL dissector or (2) the iSeries (OS/400) Communication trace file parser.
	</description>
 </metadata>
<!-- 5c39239e38d71dd6ef672806bd798450 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034636" comment="wireshark-devel less than 0.99.6-31.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034637" comment="wireshark less than 0.99.6-31.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6115</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6115" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6115" source="CVE"/>
	<description>
	Buffer overflow in the ANSI MAP dissector for Wireshark (formerly Ethereal) 0.99.5 to 0.99.6, when running on unspecified platforms, allows remote attackers to cause a denial of service and possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 5c39239e38d71dd6ef672806bd798450 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034636" comment="wireshark-devel less than 0.99.6-31.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034637" comment="wireshark less than 0.99.6-31.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6116</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6116" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6116" source="CVE"/>
	<description>
	The Firebird/Interbase dissector in Wireshark (formerly Ethereal) 0.99.6 allows remote attackers to cause a denial of service (infinite loop or crash) via unknown vectors.
	</description>
 </metadata>
<!-- 5c39239e38d71dd6ef672806bd798450 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034636" comment="wireshark-devel less than 0.99.6-31.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034637" comment="wireshark less than 0.99.6-31.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6117</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6117" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6117" source="CVE"/>
	<description>
	Unspecified vulnerability in the HTTP dissector for Wireshark (formerly Ethereal) 0.10.14 to 0.99.6 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted chunked messages.
	</description>
 </metadata>
<!-- 5c39239e38d71dd6ef672806bd798450 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034636" comment="wireshark-devel less than 0.99.6-31.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034637" comment="wireshark less than 0.99.6-31.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6118</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6118" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6118" source="CVE"/>
	<description>
	The MEGACO dissector in Wireshark (formerly Ethereal) 0.9.14 to 0.99.6 allows remote attackers to cause a denial of service (long loop and resource consumption) via unknown vectors.
	</description>
 </metadata>
<!-- 5c39239e38d71dd6ef672806bd798450 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034636" comment="wireshark-devel less than 0.99.6-31.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034637" comment="wireshark less than 0.99.6-31.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6119</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6119" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6119" source="CVE"/>
	<description>
	The DCP ETSI dissector in Wireshark (formerly Ethereal) 0.99.6 allows remote attackers to cause a denial of service (long loop and resource consumption) via unknown vectors.
	</description>
 </metadata>
<!-- 5c39239e38d71dd6ef672806bd798450 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034636" comment="wireshark-devel less than 0.99.6-31.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034637" comment="wireshark less than 0.99.6-31.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6120</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6120" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6120" source="CVE"/>
	<description>
	The Bluetooth SDP dissector Wireshark (formerly Ethereal) 0.99.2 to 0.99.6 allows remote attackers to cause a denial of service (infinite loop) via unknown vectors.
	</description>
 </metadata>
<!-- 5c39239e38d71dd6ef672806bd798450 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034636" comment="wireshark-devel less than 0.99.6-31.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034637" comment="wireshark less than 0.99.6-31.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6121</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6121" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6121" source="CVE"/>
	<description>
	Wireshark (formerly Ethereal) 0.8.16 to 0.99.6 allows remote attackers to cause a denial of service (crash) via a malformed RPC Portmap packet.
	</description>
 </metadata>
<!-- 5c39239e38d71dd6ef672806bd798450 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034636" comment="wireshark-devel less than 0.99.6-31.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034637" comment="wireshark less than 0.99.6-31.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6130</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6130" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6130" source="CVE"/>
	<description>
	gnump3d 2.9final does not apply password protection to its plugins, which might allow remote attackers to bypass intended access restrictions.
	</description>
 </metadata>
<!-- 27ad7f494b59d544a34bb56221400482 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034638" comment="gnump3d less than 2.9.8-84.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6167</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6167" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6167" source="CVE"/>
	<description>
	Untrusted search path vulnerability in yast2-core in SUSE Linux might allow local users to execute arbitrary code by creating a malicious yast2 module in the current working directory.
	</description>
 </metadata>
<!-- 3918741e5254b437af9560dcf4aff42d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034639" comment="yast2-core-devel less than 2.15.13-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034640" comment="yast2-core less than 2.15.13-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6199</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6199" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6199" source="CVE"/>
	<description>
	rsync before 3.0.0pre6, when running a writable rsync daemon that is not using chroot, allows remote attackers to access restricted files via unknown vectors that cause rsync to create a symlink that points outside of the module's hierarchy.
	</description>
 </metadata>
<!-- 69e817347fcd79b1b527ae7bf60dd28c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034641" comment="rsync less than 2.6.9-55.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6200</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6200" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6200" source="CVE"/>
	<description>
	Unspecified vulnerability in rsync before 3.0.0pre6, when running a writable rsync daemon, allows remote attackers to bypass exclude, exclude_from, and filter and read or write hidden files via (1) symlink, (2) partial-dir, (3) backup-dir, and unspecified (4) dest options.
	</description>
 </metadata>
<!-- 69e817347fcd79b1b527ae7bf60dd28c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034641" comment="rsync less than 2.6.9-55.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6203</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6203" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6203" source="CVE"/>
	<description>
	Apache HTTP Server 2.0.x and 2.2.x does not sanitize the HTTP Method specifier header from an HTTP request when it is reflected back in a "413 Request Entity Too Large" error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated via an HTTP request containing an invalid Content-length value, a similar issue to CVE-2006-3918.
	</description>
 </metadata>
<!-- 5b7469db5b62f5413f587087534d6ed2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034413" comment="apache2-devel less than 2.2.4-70.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034414" comment="apache2-doc less than 2.2.4-70.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034415" comment="apache2-example-pages less than 2.2.4-70.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034416" comment="apache2-prefork less than 2.2.4-70.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034417" comment="apache2-utils less than 2.2.4-70.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034418" comment="apache2-worker less than 2.2.4-70.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034419" comment="apache2 less than 2.2.4-70.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6206</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6206" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6206" source="CVE"/>
	<description>
	The do_coredump function in fs/exec.c in Linux kernel 2.4.x and 2.6.x up to 2.6.24-rc3, and possibly other versions, does not change the UID of a core dump file if it exists before a root process creates a core dump in the same location, which might allow local users to obtain sensitive information.
	</description>
 </metadata>
<!-- ce69efad906e121671acbbfba61ac379 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034642" comment="kernel-bigsmp less than 2.6.22.17-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034643" comment="kernel-debug less than 2.6.22.17-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034644" comment="kernel-default less than 2.6.22.17-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034645" comment="kernel-kdump less than 2.6.22.17-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034646" comment="kernel-ppc64 less than 2.6.22.17-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034647" comment="kernel-rt less than 2.6.22.17-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034648" comment="kernel-rt_debug less than 2.6.22.17-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034649" comment="kernel-source less than 2.6.22.17-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034650" comment="kernel-syms less than 2.6.22.17-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034651" comment="kernel-xen less than 2.6.22.17-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034652" comment="kernel-xenpae less than 2.6.22.17-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6239</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6239" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6239" source="CVE"/>
	<description>
	The "cache update reply processing" functionality in Squid 2.x before 2.6.STABLE17 and Squid 3.0 allows remote attackers to cause a denial of service (crash) via unknown vectors related to HTTP headers and an Array memory leak during requests for cached objects.
	</description>
 </metadata>
<!-- 3dd0e5b14df59b89745b1bdb1c82e53d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034653" comment="squid less than 2.6.STABLE14-23.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6242</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6242" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player 9.0.48.0 and earlier might allow remote attackers to execute arbitrary code via unknown vectors, related to "input validation errors."
	</description>
 </metadata>
<!-- 5c306eb0bb53025cadc8f1cfe9b447ca -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034168" comment="flash-player less than 9.0.115.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6243</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6243" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6243" source="CVE"/>
	<description>
	Adobe Flash Player 9.x up to 9.0.48.0, 8.x up to 8.0.35.0, and 7.x up to 7.0.70.0 does not sufficiently restrict the interpretation and usage of cross-domain policy files, which makes it easier for remote attackers to conduct cross-domain and cross-site scripting (XSS) attacks.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 140c8f76fc987fafe79a6a7581620944 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031150" comment="flash-player less than 9.0.124.0-0.1"/>
	</criteria>
	<!-- 5c306eb0bb53025cadc8f1cfe9b447ca -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034168" comment="flash-player less than 9.0.115.0-0.1"/>
	</criteria>
	<!-- 7728fa8aa49a8cf7a4da694adb474f85 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031401" comment="flash-player less than 9.0.151.0-0.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6244</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6244" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in Adobe Flash Player 9.x up to 9.0.48.0 and 8.x up to 8.0.35.0 allow remote attackers to inject arbitrary web script or HTML via (1) a SWF file that uses the asfunction: protocol or (2) the navigateToURL function when used with the Flash Player ActiveX Control in Internet Explorer.
	</description>
 </metadata>
<!-- 5c306eb0bb53025cadc8f1cfe9b447ca -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034168" comment="flash-player less than 9.0.115.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6245</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6245" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6245" source="CVE"/>
	<description>
	Adobe Flash Player 9.x up to 9.0.48.0, 8.x up to 8.0.35.0, and 7.x up to 7.0.70.0 allows remote attackers to modify HTTP headers for client requests and conduct HTTP Request Splitting attacks.
	</description>
 </metadata>
<!-- 5c306eb0bb53025cadc8f1cfe9b447ca -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034168" comment="flash-player less than 9.0.115.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6246</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6246" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6246" source="CVE"/>
	<description>
	Adobe Flash Player 9.x up to 9.0.48.0, 8.x up to 8.0.35.0, and 7.x up to 7.0.70.0, when running on Linux, uses insecure permissions for memory, which might allow local users to gain privileges.
	</description>
 </metadata>
<!-- 5c306eb0bb53025cadc8f1cfe9b447ca -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034168" comment="flash-player less than 9.0.115.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6282</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6282" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6282" source="CVE"/>
	<description>
	The IPsec implementation in Linux kernel before 2.6.25 allows remote routers to cause a denial of service (crash) via a fragmented ESP packet in which the first fragment does not contain the entire ESP header and IV.
	</description>
 </metadata>
<!-- dda6610eac43b25e4baef74689c8d7c5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034654" comment="kernel-bigsmp less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034655" comment="kernel-debug less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034656" comment="kernel-default less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034657" comment="kernel-kdump less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034658" comment="kernel-ppc64 less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034659" comment="kernel-source less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034660" comment="kernel-syms less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034661" comment="kernel-xen less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034662" comment="kernel-xenpae less than 2.6.22.18-0.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6284</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6284" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6284" source="CVE"/>
	<description>
	The xmlCurrentChar function in libxml2 before 2.6.31 allows context-dependent attackers to cause a denial of service (infinite loop) via XML containing invalid UTF-8 sequences.
	</description>
 </metadata>
<!-- 14bdd8f5a14b69dae71d4c08aeb0c17c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034663" comment="libxml2-32bit less than 2.6.30-4.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034664" comment="libxml2-64bit less than 2.6.30-4.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034665" comment="libxml2-devel-32bit less than 2.6.30-4.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034666" comment="libxml2-devel-64bit less than 2.6.30-4.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034667" comment="libxml2-devel less than 2.6.30-4.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034668" comment="libxml2-python less than 2.6.30-4.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034669" comment="libxml2 less than 2.6.30-4.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6286</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6286" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6286" source="CVE"/>
	<description>
	Apache Tomcat 5.5.11 through 5.5.25 and 6.0.0 through 6.0.15, when the native APR connector is used, does not properly handle an empty request to the SSL port, which allows remote attackers to trigger handling of "a duplicate copy of one of the recent requests," as demonstrated by using netcat to send the empty request.
	</description>
 </metadata>
<!-- 16f42027b94a5b9cb6f7b7b079a64215 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034088" comment="tomcat55-admin-webapps less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034089" comment="tomcat55-common-lib less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034090" comment="tomcat55-jasper-javadoc less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034091" comment="tomcat55-jasper less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034092" comment="tomcat55-jsp-2_0-api-javadoc less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034093" comment="tomcat55-jsp-2_0-api less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034094" comment="tomcat55-server-lib less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034095" comment="tomcat55-servlet-2_4-api-javadoc less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034096" comment="tomcat55-servlet-2_4-api less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034097" comment="tomcat55-webapps less than 5.5.23-113.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034098" comment="tomcat55 less than 5.5.23-113.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6303</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6303" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6303" source="CVE"/>
	<description>
	MySQL 5.0.x before 5.0.51a, 5.1.x before 5.1.23, and 6.0.x before 6.0.4 does not update the DEFINER value of a view when the view is altered, which allows remote authenticated users to gain privileges via a sequence of statements including a CREATE SQL SECURITY DEFINER VIEW statement and an ALTER VIEW statement.
	</description>
 </metadata>
<!-- a254dbd54a164c6197e3fbdf34bf84e6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034111" comment="libmysqlclient-devel less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034112" comment="libmysqlclient15-32bit less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034113" comment="libmysqlclient15-64bit less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034114" comment="libmysqlclient15 less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034115" comment="libmysqlclient_r15-32bit less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034116" comment="libmysqlclient_r15-64bit less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034117" comment="libmysqlclient_r15 less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034118" comment="mysql-Max less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034119" comment="mysql-bench less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034120" comment="mysql-client less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034121" comment="mysql-debug less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034122" comment="mysql-tools less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034123" comment="mysql less than 5.0.45-22.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6304</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6304" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6304" source="CVE"/>
	<description>
	The federated engine in MySQL 5.0.x before 5.0.51a, 5.1.x before 5.1.23, and 6.0.x before 6.0.4, when performing a certain SHOW TABLE STATUS query, allows remote MySQL servers to cause a denial of service (federated handler crash and daemon crash) via a response that lacks the minimum required number of columns.
	</description>
 </metadata>
<!-- a254dbd54a164c6197e3fbdf34bf84e6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034111" comment="libmysqlclient-devel less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034112" comment="libmysqlclient15-32bit less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034113" comment="libmysqlclient15-64bit less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034114" comment="libmysqlclient15 less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034115" comment="libmysqlclient_r15-32bit less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034116" comment="libmysqlclient_r15-64bit less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034117" comment="libmysqlclient_r15 less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034118" comment="mysql-Max less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034119" comment="mysql-bench less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034120" comment="mysql-client less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034121" comment="mysql-debug less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034122" comment="mysql-tools less than 5.0.45-22.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034123" comment="mysql less than 5.0.45-22.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6335</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6335" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6335" source="CVE"/>
	<description>
	Integer overflow in libclamav in ClamAV before 0.92 allows remote attackers to execute arbitrary code via a crafted MEW packed PE file, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 10c7ff521ad440127b8ad7f95c39f249 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034670" comment="clamav-db less than 0.92-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033716" comment="clamav less than 0.92-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6336</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6336" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6336" source="CVE"/>
	<description>
	Off-by-one error in ClamAV before 0.92 allows remote attackers to execute arbitrary code via a crafted MS-ZIP compressed CAB file.
	</description>
 </metadata>
<!-- 10c7ff521ad440127b8ad7f95c39f249 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034670" comment="clamav-db less than 0.92-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033716" comment="clamav less than 0.92-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6337</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6337" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6337" source="CVE"/>
	<description>
	Unspecified vulnerability in the bzip2 decompression algorithm in nsis/bzlib_private.h in ClamAV before 0.92 has unknown impact and remote attack vectors.
	</description>
 </metadata>
<!-- 10c7ff521ad440127b8ad7f95c39f249 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034670" comment="clamav-db less than 0.92-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033716" comment="clamav less than 0.92-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6351</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6351" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6351" source="CVE"/>
	<description>
	libexif 0.6.16 and earlier allows context-dependent attackers to cause a denial of service (infinite recursion) via an image file with crafted EXIF tags, possibly involving the exif_loader_write function in exif_loader.c.
	</description>
 </metadata>
<!-- d20ff93c1786150d97ea52615112a932 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034671" comment="libexif-32bit less than 0.6.16-23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034672" comment="libexif-64bit less than 0.6.16-23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034673" comment="libexif-devel less than 0.6.16-23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034674" comment="libexif less than 0.6.16-23.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6352</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6352" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6352" source="CVE"/>
	<description>
	Integer overflow in libexif 0.6.16 and earlier allows context-dependent attackers to execute arbitrary code via an image with crafted EXIF tags, possibly involving the exif_data_load_data_thumbnail function in exif-data.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 60fdfed39e2525f7e4fa91dad4193423 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034675" comment="libexif5 less than 0.5.12-80.2"/>
	</criteria>
	<!-- d20ff93c1786150d97ea52615112a932 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034671" comment="libexif-32bit less than 0.6.16-23.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034672" comment="libexif-64bit less than 0.6.16-23.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034673" comment="libexif-devel less than 0.6.16-23.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034674" comment="libexif less than 0.6.16-23.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6353</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6353" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6353" source="CVE"/>
	<description>
	Integer overflow in exif.cpp in exiv2 library allows context-dependent attackers to execute arbitrary code via a crafted EXIF file that triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 8e87ec8a273d82eb4fd400e1cf90e126 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034676" comment="libexiv2-devel less than 0.15-8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034677" comment="libexiv2 less than 0.15-8.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6388</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6388" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6388" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in mod_status in the Apache HTTP Server 2.2.0 through 2.2.6, 2.0.35 through 2.0.61, and 1.3.2 through 1.3.39, when the server-status page is enabled, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
	</description>
 </metadata>
<!-- 5b7469db5b62f5413f587087534d6ed2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034413" comment="apache2-devel less than 2.2.4-70.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034414" comment="apache2-doc less than 2.2.4-70.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034415" comment="apache2-example-pages less than 2.2.4-70.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034416" comment="apache2-prefork less than 2.2.4-70.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034417" comment="apache2-utils less than 2.2.4-70.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034418" comment="apache2-worker less than 2.2.4-70.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034419" comment="apache2 less than 2.2.4-70.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6389</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6389" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6389" source="CVE"/>
	<description>
	The notify feature in GNOME screensaver (gnome-screensaver) 2.20.0 might allow local users to read the clipboard contents and X selection data for a locked session by using ctrl-V.
	</description>
 </metadata>
<!-- 5b29410451fea3ece033b9c368b85259 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034678" comment="gnome-screensaver less than 2.20.0-6.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6417</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6417" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6417" source="CVE"/>
	<description>
	The shmem_getpage function (mm/shmem.c) in Linux kernel 2.6.11 through 2.6.23 does not properly clear allocated memory in some rare circumstances related to tmpfs, which might allow local users to read sensitive kernel data or cause a denial of service (crash).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7fa3668378a0007b680c23ffc2916d63 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034139" comment="kernel-bigsmp less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034140" comment="kernel-debug less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034141" comment="kernel-default less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034142" comment="kernel-kdump less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034143" comment="kernel-ppc64 less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034144" comment="kernel-rt less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034145" comment="kernel-rt_debug less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034146" comment="kernel-source less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034147" comment="kernel-syms less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034148" comment="kernel-xen less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034149" comment="kernel-xenpae less than 2.6.22.16-0.2"/>
		</criteria>
	</criteria>
	<!-- 8b56e6bf4853c873dce7504107f8bea4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034150" comment="kernel-bigsmp less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034151" comment="kernel-debug less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034152" comment="kernel-default less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034153" comment="kernel-kdump less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034154" comment="kernel-ppc64 less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034155" comment="kernel-rt less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034156" comment="kernel-rt_debug less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034157" comment="kernel-source less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034158" comment="kernel-syms less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034159" comment="kernel-xen less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034160" comment="kernel-xenpae less than 2.6.22.16-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6420</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6420" source="CVE"/>
	<description>
	Cross-site request forgery (CSRF) vulnerability in the balancer-manager in mod_proxy_balancer for Apache HTTP Server 2.2.x allows remote attackers to gain privileges via unspecified vectors.
	</description>
 </metadata>
<!-- 4a87d325376f89ec79eb900ebffe9dcd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034679" comment="apache2-devel less than 2.2.4-70.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034680" comment="apache2-doc less than 2.2.4-70.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034681" comment="apache2-example-pages less than 2.2.4-70.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034682" comment="apache2-prefork less than 2.2.4-70.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034683" comment="apache2-utils less than 2.2.4-70.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034684" comment="apache2-worker less than 2.2.4-70.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034685" comment="apache2 less than 2.2.4-70.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6421</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6421" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6421" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in balancer-manager in mod_proxy_balancer in the Apache HTTP Server 2.2.0 through 2.2.6 allows remote attackers to inject arbitrary web script or HTML via the (1) ss, (2) wr, or (3) rr parameters, or (4) the URL.
	</description>
 </metadata>
<!-- 5b7469db5b62f5413f587087534d6ed2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034413" comment="apache2-devel less than 2.2.4-70.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034414" comment="apache2-doc less than 2.2.4-70.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034415" comment="apache2-example-pages less than 2.2.4-70.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034416" comment="apache2-prefork less than 2.2.4-70.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034417" comment="apache2-utils less than 2.2.4-70.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034418" comment="apache2-worker less than 2.2.4-70.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034419" comment="apache2 less than 2.2.4-70.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6422</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6422" source="CVE"/>
	<description>
	The balancer_handler function in mod_proxy_balancer in the Apache HTTP Server 2.2.0 through 2.2.6, when a threaded Multi-Processing Module is used, allows remote authenticated users to cause a denial of service (child process crash) via an invalid bb variable.
	</description>
 </metadata>
<!-- 5b7469db5b62f5413f587087534d6ed2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034413" comment="apache2-devel less than 2.2.4-70.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034414" comment="apache2-doc less than 2.2.4-70.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034415" comment="apache2-example-pages less than 2.2.4-70.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034416" comment="apache2-prefork less than 2.2.4-70.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034417" comment="apache2-utils less than 2.2.4-70.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034418" comment="apache2-worker less than 2.2.4-70.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034419" comment="apache2 less than 2.2.4-70.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6427</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6427" source="CVE"/>
	<description>
	The XInput extension in X.Org Xserver before 1.4.1 allows context-dependent attackers to execute arbitrary code via requests related to byte swapping and heap corruption within multiple functions, a different vulnerability than CVE-2007-4990.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 303d396acc2b78a8bb7ab1e97893272c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034686" comment="NX less than 2.1.0-35.4"/>
	</criteria>
	<!-- b98c19ba6b09fe5ebb89ecc6aa69dd5d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034517" comment="xorg-x11-devel-32bit less than 7.2-103.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034518" comment="xorg-x11-devel-64bit less than 7.2-103.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034519" comment="xorg-x11-devel less than 7.2-103.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034520" comment="xorg-x11-libs-32bit less than 7.2-103.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034521" comment="xorg-x11-libs-64bit less than 7.2-103.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034522" comment="xorg-x11-libs less than 7.2-103.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034523" comment="xorg-x11-server-extra less than 7.2-143.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034524" comment="xorg-x11-server-sdk less than 7.2-143.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034525" comment="xorg-x11-server less than 7.2-143.9"/>
		</criteria>
	</criteria>
	<!-- e3fe1967d917baff2bbc65ac91d7f05f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034075" comment="xgl less than git_070104-77.3"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6428</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6428" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6428" source="CVE"/>
	<description>
	The ProcGetReservedColormapEntries function in the TOG-CUP extension in X.Org Xserver before 1.4.1 allows context-dependent attackers to read the contents of arbitrary memory locations via a request containing a 32-bit value that is improperly used as an array index.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 303d396acc2b78a8bb7ab1e97893272c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034686" comment="NX less than 2.1.0-35.4"/>
	</criteria>
	<!-- b98c19ba6b09fe5ebb89ecc6aa69dd5d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034517" comment="xorg-x11-devel-32bit less than 7.2-103.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034518" comment="xorg-x11-devel-64bit less than 7.2-103.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034519" comment="xorg-x11-devel less than 7.2-103.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034520" comment="xorg-x11-libs-32bit less than 7.2-103.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034521" comment="xorg-x11-libs-64bit less than 7.2-103.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034522" comment="xorg-x11-libs less than 7.2-103.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034523" comment="xorg-x11-server-extra less than 7.2-143.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034524" comment="xorg-x11-server-sdk less than 7.2-143.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034525" comment="xorg-x11-server less than 7.2-143.9"/>
		</criteria>
	</criteria>
	<!-- e3fe1967d917baff2bbc65ac91d7f05f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034075" comment="xgl less than git_070104-77.3"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6429</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6429" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6429" source="CVE"/>
	<description>
	Multiple integer overflows in X.Org Xserver before 1.4.1 allow context-dependent attackers to execute arbitrary code via (1) a GetVisualInfo request containing a 32-bit value that is improperly used to calculate an amount of memory for allocation by the EVI extension, or (2) a request containing values related to pixmap size that are improperly used in management of shared memory by the MIT-SHM extension.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 303d396acc2b78a8bb7ab1e97893272c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034686" comment="NX less than 2.1.0-35.4"/>
	</criteria>
	<!-- b98c19ba6b09fe5ebb89ecc6aa69dd5d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034517" comment="xorg-x11-devel-32bit less than 7.2-103.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034518" comment="xorg-x11-devel-64bit less than 7.2-103.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034519" comment="xorg-x11-devel less than 7.2-103.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034520" comment="xorg-x11-libs-32bit less than 7.2-103.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034521" comment="xorg-x11-libs-64bit less than 7.2-103.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034522" comment="xorg-x11-libs less than 7.2-103.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034523" comment="xorg-x11-server-extra less than 7.2-143.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034524" comment="xorg-x11-server-sdk less than 7.2-143.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034525" comment="xorg-x11-server less than 7.2-143.9"/>
		</criteria>
	</criteria>
	<!-- e3fe1967d917baff2bbc65ac91d7f05f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034075" comment="xgl less than git_070104-77.3"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6438</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6438" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6438" source="CVE"/>
	<description>
	Unspecified vulnerability in the SMB dissector in Wireshark (formerly Ethereal) 0.99.6 allows remote attackers to cause a denial of service via unknown vectors.  NOTE: this identifier originally included MP3 and NCP, but those issues are already covered by CVE-2007-6111.
	</description>
 </metadata>
<!-- 5c39239e38d71dd6ef672806bd798450 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034636" comment="wireshark-devel less than 0.99.6-31.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034637" comment="wireshark less than 0.99.6-31.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6439</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6439" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6439" source="CVE"/>
	<description>
	Wireshark (formerly Ethereal) 0.99.6 allows remote attackers to cause a denial of service (infinite or large loop) via the (1) IPv6 or (2) USB dissector, which can trigger resource consumption or a crash. NOTE: this identifier originally included Firebird/Interbase, but it is already covered by CVE-2007-6116.  The DCP ETSI issue is already covered by CVE-2007-6119.
	</description>
 </metadata>
<!-- 5c39239e38d71dd6ef672806bd798450 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034636" comment="wireshark-devel less than 0.99.6-31.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034637" comment="wireshark less than 0.99.6-31.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6441</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6441" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6441" source="CVE"/>
	<description>
	The WiMAX dissector in Wireshark (formerly Ethereal) 0.99.6 allows remote attackers to cause a denial of service (crash) via unknown vectors related to "unaligned access on some platforms."
	</description>
 </metadata>
<!-- 5c39239e38d71dd6ef672806bd798450 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034636" comment="wireshark-devel less than 0.99.6-31.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034637" comment="wireshark less than 0.99.6-31.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6450</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6450" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6450" source="CVE"/>
	<description>
	The RPL dissector in Wireshark (formerly Ethereal) 0.9.8 to 0.99.6 allows remote attackers to cause a denial of service (infinite loop) via unknown vectors.
	</description>
 </metadata>
<!-- 5c39239e38d71dd6ef672806bd798450 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034636" comment="wireshark-devel less than 0.99.6-31.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034637" comment="wireshark less than 0.99.6-31.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6451</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6451" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6451" source="CVE"/>
	<description>
	Unspecified vulnerability in the CIP dissector in Wireshark (formerly Ethereal) 0.9.14 to 0.99.6 allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger allocation of large amounts of memory.
	</description>
 </metadata>
<!-- 5c39239e38d71dd6ef672806bd798450 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034636" comment="wireshark-devel less than 0.99.6-31.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034637" comment="wireshark less than 0.99.6-31.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6520</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6520" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6520" source="CVE"/>
	<description>
	Opera before 9.25 allows remote attackers to conduct cross-domain scripting attacks via unknown vectors related to plug-ins.
	</description>
 </metadata>
<!-- 909942633320abe3989231e2d8074cb4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034687" comment="opera less than 9.25-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6521</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6521" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6521" source="CVE"/>
	<description>
	Unspecified vulnerability in Opera before 9.25 allows remote attackers to execute arbitrary code via crafted TLS certificates.
	</description>
 </metadata>
<!-- 909942633320abe3989231e2d8074cb4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034687" comment="opera less than 9.25-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6522</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6522" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6522" source="CVE"/>
	<description>
	The rich text editing functionality in Opera before 9.25 allows remote attackers to conduct cross-domain scripting attacks by using designMode to modify contents of pages in other domains.
	</description>
 </metadata>
<!-- 909942633320abe3989231e2d8074cb4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034687" comment="opera less than 9.25-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6523</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6523" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6523" source="CVE"/>
	<description>
	Algorithmic complexity vulnerability in Opera 9.50 beta and 9.x before 9.25 allows remote attackers to cause a denial of service (CPU consumption) via a crafted bitmap (BMP) file that triggers a large number of calculations and checks.
	</description>
 </metadata>
<!-- 909942633320abe3989231e2d8074cb4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034687" comment="opera less than 9.25-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6524</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6524" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6524" source="CVE"/>
	<description>
	Opera before 9.25 allows remote attackers to obtain potentially sensitive memory contents via a crafted bitmap (BMP) file, as demonstrated using a CANVAS element and JavaScript in an HTML document for copying these contents from 9.50 beta, a related issue to CVE-2008-0420.
	</description>
 </metadata>
<!-- 909942633320abe3989231e2d8074cb4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034687" comment="opera less than 9.25-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6531</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6531" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6531" source="CVE"/>
	<description>
	Stack-based buffer overflow in the Panel (xfce4-panel) component in Xfce before 4.4.2 might allow remote attackers to execute arbitrary code via Launcher tooltips.  NOTE: a second buffer overflow (over-read) in the xfce_mkdirhier function was also reported, but it might not be exploitable for a crash or code execution, so it is not a vulnerability.
	</description>
 </metadata>
<!-- 6700b5dec7778296f954c3e928656c9d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034688" comment="xfce4-panel-devel less than 4.4.1-61.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034689" comment="xfce4-panel less than 4.4.1-61.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6532</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6532" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6532" source="CVE"/>
	<description>
	Double free vulnerability in the Widget Library (libxfcegui4) in Xfce before 4.4.2 might allow remote attackers to execute arbitrary code via unknown vectors related to the "cliend id, program name and working directory in session management."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5e92206d427b384a84b49bdad1dec925 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034690" comment="libxfcegui4-devel less than 4.4.1-55.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034691" comment="libxfcegui4 less than 4.4.1-55.2"/>
		</criteria>
	</criteria>
	<!-- 6700b5dec7778296f954c3e928656c9d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034688" comment="xfce4-panel-devel less than 4.4.1-61.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034689" comment="xfce4-panel less than 4.4.1-61.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6595</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6595" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6595" source="CVE"/>
	<description>
	ClamAV 0.92 allows local users to overwrite arbitrary files via a symlink attack on (1) temporary files used by the cli_gentempfd function in libclamav/others.c or on (2) .ascii files used by sigtool, when utf16-decode is enabled.
	</description>
 </metadata>
<!-- ff03f9aef2831b62e43a820d6cf02519 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034692" comment="clamav-db less than 0.93-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034693" comment="clamav less than 0.93-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6596</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6596" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6596" source="CVE"/>
	<description>
	ClamAV 0.92 does not recognize Base64 UUEncoded archives, which allows remote attackers to bypass the scanner via a Base64-UUEncoded file.
	</description>
 </metadata>
<!-- ff03f9aef2831b62e43a820d6cf02519 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034692" comment="clamav-db less than 0.93-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034693" comment="clamav less than 0.93-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6598</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6598" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6598" source="CVE"/>
	<description>
	Dovecot before 1.0.10, with certain configuration options including use of %variables, does not properly maintain the LDAP+auth cache, which might allow remote authenticated users to login as a different user who has the same password.
	</description>
 </metadata>
<!-- 9cda526d2d8d02d89c0e87864b07350a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034694" comment="dovecot-devel less than 1.0.5-6.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034695" comment="dovecot less than 1.0.5-6.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6600</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6600" source="CVE"/>
	<description>
	PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, 7.4 before 7.4.19, and 7.3 before 7.3.21 uses superuser privileges instead of table owner privileges for (1) VACUUM and (2) ANALYZE operations within index functions, and supports (3) SET ROLE and (4) SET SESSION AUTHORIZATION within index functions, which allows remote authenticated users to gain privileges.
	</description>
 </metadata>
<!-- 782d496c4e5ffbe3d76afff815253130 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034284" comment="postgresql-contrib less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034285" comment="postgresql-devel less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034286" comment="postgresql-docs less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034287" comment="postgresql-libs-32bit less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034288" comment="postgresql-libs-64bit less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034289" comment="postgresql-libs less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034290" comment="postgresql-plperl less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034291" comment="postgresql-plpython less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034292" comment="postgresql-pltcl less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034293" comment="postgresql-server less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034294" comment="postgresql less than 8.2.6-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6601</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6601" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6601" source="CVE"/>
	<description>
	The DBLink module in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, 7.4 before 7.4.19, and 7.3 before 7.3.21, when local trust or ident authentication is used, allows remote attackers to gain privileges via unspecified vectors.  NOTE: this issue exists because of an incomplete fix for CVE-2007-3278.
	</description>
 </metadata>
<!-- 782d496c4e5ffbe3d76afff815253130 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034284" comment="postgresql-contrib less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034285" comment="postgresql-devel less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034286" comment="postgresql-docs less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034287" comment="postgresql-libs-32bit less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034288" comment="postgresql-libs-64bit less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034289" comment="postgresql-libs less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034290" comment="postgresql-plperl less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034291" comment="postgresql-plpython less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034292" comment="postgresql-pltcl less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034293" comment="postgresql-server less than 8.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034294" comment="postgresql less than 8.2.6-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6613</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6613" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6613" source="CVE"/>
	<description>
	Stack-based buffer overflow in the print_iso9660_recurse function in iso-info (src/iso-info.c) in GNU Compact Disc Input and Control Library (libcdio) 0.79 and earlier allows context-dependent attackers to cause a denial of service (core dump) and possibly execute arbitrary code via a disk or image that contains a long joilet file name.
	</description>
 </metadata>
<!-- 8be0239bcb93eac437b4df27ae7153fe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034696" comment="libcdio++0 less than 0.78.2-3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034697" comment="libcdio-devel less than 0.78.2-3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034698" comment="libcdio-utils less than 0.78.2-3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034699" comment="libcdio7-32bit less than 0.78.2-3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034700" comment="libcdio7-64bit less than 0.78.2-3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034701" comment="libcdio7 less than 0.78.2-3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034702" comment="libcdio_cdda0 less than 0.78.2-3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034703" comment="libcdio_paranoia0 less than 0.78.2-3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034704" comment="libiso9660-5-32bit less than 0.78.2-3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034705" comment="libiso9660-5-64bit less than 0.78.2-3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034706" comment="libiso9660-5 less than 0.78.2-3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034707" comment="libudf0 less than 0.78.2-3.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6637</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6637" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6637" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in Adobe Flash Player allow remote attackers to inject arbitrary web script or HTML via a crafted SWF file, related to "pre-generated SWF files" and Adobe Dreamweaver CS3 or Adobe Acrobat Connect.  NOTE: the asfunction: vector is already covered by CVE-2007-6244.1.
	</description>
 </metadata>
<!-- 140c8f76fc987fafe79a6a7581620944 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031150" comment="flash-player less than 9.0.124.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6698</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6698" source="CVE"/>
	<description>
	The BDB backend for slapd in OpenLDAP before 2.3.36 allows remote authenticated users to cause a denial of service (crash) via a potentially-successful modify operation with the NOOP control set to critical, possibly due to a double free vulnerability.
	</description>
 </metadata>
<!-- e15950b0697ed9fee8fdd803961e8fb7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034708" comment="openldap2-back-meta less than 2.3.37-7.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034709" comment="openldap2-back-perl less than 2.3.37-7.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034710" comment="openldap2-devel-32bit less than 2.3.37-20.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034711" comment="openldap2-devel-64bit less than 2.3.37-20.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034712" comment="openldap2-devel less than 2.3.37-20.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034713" comment="openldap2 less than 2.3.37-7.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6716</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6716" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6716" source="CVE"/>
	<description>
	fs/direct-io.c in the dio subsystem in the Linux kernel before 2.6.23 does not properly zero out the dio struct, which allows local users to cause a denial of service (OOPS), as demonstrated by a certain fio test.
	</description>
 </metadata>
<!-- 3837c2df513f0088f0fdd19fc0db5adc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034714" comment="kernel-bigsmp less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034715" comment="kernel-debug less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034716" comment="kernel-default less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034717" comment="kernel-kdump less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034718" comment="kernel-ppc64 less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034719" comment="kernel-source less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034720" comment="kernel-syms less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034721" comment="kernel-xen less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034722" comment="kernel-xenpae less than 2.6.22.19-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6720</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6720" source="CVE"/>
	<description>
	libmikmod 3.1.9 through 3.2.0, as used by MikMod, SDL-mixer, and possibly other products, relies on the channel count of the last loaded song, rather than the currently playing song, for certain playback calculations, which allows user-assisted attackers to cause a denial of service (application crash) by loading multiple songs (aka MOD files) with different numbers of channels.
	</description>
 </metadata>
<!-- 483cd936b357a16ed8cf98eb89cf66bb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034723" comment="libmikmod-32bit less than 3.1.11a-34.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034724" comment="libmikmod-64bit less than 3.1.11a-34.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034725" comment="libmikmod-devel less than 3.1.11a-34.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034726" comment="libmikmod less than 3.1.11a-34.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6725</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2007-6725" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6725" source="CVE"/>
	<description>
	The CCITTFax decoding filter in Ghostscript 8.60, 8.61, and possibly other versions, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PDF file that triggers a buffer underflow in the cf_decode_2d function.
	</description>
 </metadata>
<!-- fdc70560402b44cb7ce9829765211428 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034727" comment="ghostscript-fonts-other less than 8.15.4-3.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034728" comment="ghostscript-fonts-rus less than 8.15.4-3.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034729" comment="ghostscript-fonts-std less than 8.15.4-3.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034730" comment="ghostscript-ijs-devel less than 8.15.4-3.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034731" comment="ghostscript-library less than 8.15.4-3.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034732" comment="ghostscript-omni less than 8.15.4-3.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034733" comment="ghostscript-x11 less than 8.15.4-3.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034734" comment="libgimpprint-devel less than 4.2.7-178.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034735" comment="libgimpprint less than 4.2.7-178.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0001</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0001" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0001" source="CVE"/>
	<description>
	VFS in the Linux kernel before 2.6.22.16, and 2.6.23.x before 2.6.23.14, performs tests of access mode by using the flag variable instead of the acc_mode variable, which might allow local users to bypass intended permissions and remove directories.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7fa3668378a0007b680c23ffc2916d63 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034139" comment="kernel-bigsmp less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034140" comment="kernel-debug less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034141" comment="kernel-default less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034142" comment="kernel-kdump less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034143" comment="kernel-ppc64 less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034144" comment="kernel-rt less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034145" comment="kernel-rt_debug less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034146" comment="kernel-source less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034147" comment="kernel-syms less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034148" comment="kernel-xen less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034149" comment="kernel-xenpae less than 2.6.22.16-0.2"/>
		</criteria>
	</criteria>
	<!-- 8b56e6bf4853c873dce7504107f8bea4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034150" comment="kernel-bigsmp less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034151" comment="kernel-debug less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034152" comment="kernel-default less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034153" comment="kernel-kdump less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034154" comment="kernel-ppc64 less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034155" comment="kernel-rt less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034156" comment="kernel-rt_debug less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034157" comment="kernel-source less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034158" comment="kernel-syms less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034159" comment="kernel-xen less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034160" comment="kernel-xenpae less than 2.6.22.16-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0006</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0006" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0006" source="CVE"/>
	<description>
	Buffer overflow in (1) X.Org Xserver before 1.4.1, and (2) the libfont and libXfont libraries on some platforms including Sun Solaris, allows context-dependent attackers to execute arbitrary code via a PCF font with a large difference between the last col and first col values in the PCF_BDF_ENCODINGS table.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b98c19ba6b09fe5ebb89ecc6aa69dd5d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034517" comment="xorg-x11-devel-32bit less than 7.2-103.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034518" comment="xorg-x11-devel-64bit less than 7.2-103.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034519" comment="xorg-x11-devel less than 7.2-103.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034520" comment="xorg-x11-libs-32bit less than 7.2-103.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034521" comment="xorg-x11-libs-64bit less than 7.2-103.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034522" comment="xorg-x11-libs less than 7.2-103.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034523" comment="xorg-x11-server-extra less than 7.2-143.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034524" comment="xorg-x11-server-sdk less than 7.2-143.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034525" comment="xorg-x11-server less than 7.2-143.9"/>
		</criteria>
	</criteria>
	<!-- e3fe1967d917baff2bbc65ac91d7f05f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034075" comment="xgl less than git_070104-77.3"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0007</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0007" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0007" source="CVE"/>
	<description>
	Linux kernel before 2.6.22.17, when using certain drivers that register a fault handler that does not perform range checks, allows local users to access kernel memory via an out-of-range offset.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7fa3668378a0007b680c23ffc2916d63 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034139" comment="kernel-bigsmp less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034140" comment="kernel-debug less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034141" comment="kernel-default less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034142" comment="kernel-kdump less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034143" comment="kernel-ppc64 less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034144" comment="kernel-rt less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034145" comment="kernel-rt_debug less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034146" comment="kernel-source less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034147" comment="kernel-syms less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034148" comment="kernel-xen less than 2.6.22.16-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034149" comment="kernel-xenpae less than 2.6.22.16-0.2"/>
		</criteria>
	</criteria>
	<!-- 8b56e6bf4853c873dce7504107f8bea4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034150" comment="kernel-bigsmp less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034151" comment="kernel-debug less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034152" comment="kernel-default less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034153" comment="kernel-kdump less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034154" comment="kernel-ppc64 less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034155" comment="kernel-rt less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034156" comment="kernel-rt_debug less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034157" comment="kernel-source less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034158" comment="kernel-syms less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034159" comment="kernel-xen less than 2.6.22.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034160" comment="kernel-xenpae less than 2.6.22.16-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0016</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0016" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0016" source="CVE"/>
	<description>
	Stack-based buffer overflow in the URL parsing implementation in Mozilla Firefox before 2.0.0.17 and SeaMonkey before 1.1.12 allows remote attackers to execute arbitrary code via a crafted UTF-8 URL in a link.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 48fcbb624a95b290275340017ad12e5c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034736" comment="MozillaThunderbird-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034737" comment="MozillaThunderbird less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- 6393a99a5913d7d11ba39976c6a96737 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034738" comment="seamonkey-dom-inspector less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034739" comment="seamonkey-irc less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034740" comment="seamonkey-mail less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034741" comment="seamonkey-spellchecker less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034742" comment="seamonkey-venkman less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034743" comment="seamonkey less than 1.1.12-0.1"/>
		</criteria>
	</criteria>
	<!-- aeadca331cd96b3eb60572e397c8360a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034744" comment="MozillaFirefox-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034745" comment="MozillaFirefox less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- cf6f6a3d88cd2e0c3aaf5f3d91439ad8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034746" comment="mozilla-xulrunner181-32bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034747" comment="mozilla-xulrunner181-64bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034748" comment="mozilla-xulrunner181-devel less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034749" comment="mozilla-xulrunner181-l10n less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034750" comment="mozilla-xulrunner181 less than 1.8.1.17-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0017</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0017" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0017" source="CVE"/>
	<description>
	The http-index-format MIME type parser (nsDirIndexParser) in Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 does not check for an allocation failure, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an HTTP index response with a crafted 200 header, which triggers memory corruption and a buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 061d649b399bf6dc687c2e75acae19b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034751" comment="epiphany-devel less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034752" comment="epiphany-doc less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034753" comment="epiphany-extensions less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034754" comment="epiphany less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034755" comment="mozilla-xulrunner181-32bit less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034756" comment="mozilla-xulrunner181-64bit less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034757" comment="mozilla-xulrunner181-devel less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034758" comment="mozilla-xulrunner181-l10n less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034759" comment="mozilla-xulrunner181 less than 1.8.1.18-0.1"/>
		</criteria>
	</criteria>
	<!-- 7c70bc51bdcfd393c1802132c39993c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034760" comment="MozillaFirefox-translations less than 2.0.0.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034761" comment="MozillaFirefox less than 2.0.0.18-0.1"/>
		</criteria>
	</criteria>
	<!-- d3727a2e3ce36a415dccc357e982ccb4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034762" comment="seamonkey-dom-inspector less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034763" comment="seamonkey-irc less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034764" comment="seamonkey-mail less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034765" comment="seamonkey-spellchecker less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034766" comment="seamonkey-venkman less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034767" comment="seamonkey less than 1.1.13-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0047</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0047" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0047" source="CVE"/>
	<description>
	Heap-based buffer overflow in the cgiCompileSearch function in CUPS 1.3.5, and other versions including the version bundled with Apple Mac OS X 10.5.2, when printer sharing is enabled, allows remote attackers to execute arbitrary code via crafted search expressions.
	</description>
 </metadata>
<!-- c20dec459bb942c25b5d993686984446 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034768" comment="cups-client less than 1.2.12-22.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034769" comment="cups-devel less than 1.2.12-22.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034770" comment="cups-libs-32bit less than 1.2.12-22.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034771" comment="cups-libs-64bit less than 1.2.12-22.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034772" comment="cups-libs less than 1.2.12-22.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034773" comment="cups less than 1.2.12-22.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0053</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0053" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0053" source="CVE"/>
	<description>
	Multiple buffer overflows in the HP-GL/2-to-PostScript filter in CUPS before 1.3.6 might allow remote attackers to execute arbitrary code via a crafted HP-GL/2 file.
	</description>
 </metadata>
<!-- 40e95c11d2bf2008c6700ec9264d29f6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034774" comment="cups-client less than 1.2.12-22.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034775" comment="cups-devel less than 1.2.12-22.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034776" comment="cups-libs-32bit less than 1.2.12-22.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034777" comment="cups-libs-64bit less than 1.2.12-22.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034778" comment="cups-libs less than 1.2.12-22.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034779" comment="cups less than 1.2.12-22.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0062</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0062" source="CVE"/>
	<description>
	KDC in MIT Kerberos 5 (krb5kdc) does not set a global variable for some krb4 message types, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted messages that trigger a NULL pointer dereference or double-free.
	</description>
 </metadata>
<!-- 6432264bc043c02c3d5a161366fca305 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034780" comment="krb5-32bit less than 1.6.2-22.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034781" comment="krb5-64bit less than 1.6.2-22.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034782" comment="krb5-apps-clients less than 1.6.2-22.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034783" comment="krb5-apps-servers less than 1.6.2-22.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034784" comment="krb5-client less than 1.6.2-22.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034785" comment="krb5-devel-32bit less than 1.6.2-22.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034786" comment="krb5-devel-64bit less than 1.6.2-22.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034787" comment="krb5-devel less than 1.6.2-22.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034788" comment="krb5-server less than 1.6.2-22.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034789" comment="krb5 less than 1.6.2-22.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0063</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0063" source="CVE"/>
	<description>
	The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote attackers to obtain sensitive information, aka "Uninitialized stack values."
	</description>
 </metadata>
<!-- 6432264bc043c02c3d5a161366fca305 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034780" comment="krb5-32bit less than 1.6.2-22.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034781" comment="krb5-64bit less than 1.6.2-22.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034782" comment="krb5-apps-clients less than 1.6.2-22.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034783" comment="krb5-apps-servers less than 1.6.2-22.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034784" comment="krb5-client less than 1.6.2-22.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034785" comment="krb5-devel-32bit less than 1.6.2-22.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034786" comment="krb5-devel-64bit less than 1.6.2-22.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034787" comment="krb5-devel less than 1.6.2-22.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034788" comment="krb5-server less than 1.6.2-22.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034789" comment="krb5 less than 1.6.2-22.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0072</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0072" source="CVE"/>
	<description>
	Format string vulnerability in the emf_multipart_encrypted function in mail/em-format.c in Evolution 2.12.3 and earlier allows remote attackers to execute arbitrary code via a crafted encrypted message, as demonstrated using the Version field.
	</description>
 </metadata>
<!-- ccfdb35068dd6be7ea24fc037b7bbc0e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034790" comment="evolution-devel less than 2.12.0-5.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034791" comment="evolution-pilot less than 2.12.0-5.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034792" comment="evolution less than 2.12.0-5.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0073</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0073" source="CVE"/>
	<description>
	Array index error in the sdpplin_parse function in input/libreal/sdpplin.c in xine-lib 1.1.10.1 allows remote RTSP servers to execute arbitrary code via a large streamid SDP parameter.
	</description>
 </metadata>
<!-- 518150c48ccde183908967dd3e740515 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034793" comment="xine-devel less than 1.1.8-14.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034794" comment="xine-extra less than 1.1.8-14.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034795" comment="xine-lib-32bit less than 1.1.8-14.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034796" comment="xine-lib-64bit less than 1.1.8-14.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034797" comment="xine-lib less than 1.1.8-14.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034798" comment="xine-ui less than 0.99.5-62.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0122</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0122" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0122" source="CVE"/>
	<description>
	Off-by-one error in the inet_network function in libbind in ISC BIND 9.4.2 and earlier, as used in libc in FreeBSD 6.2 through 7.0-PRERELEASE, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted input that triggers memory corruption.
	</description>
 </metadata>
<!-- efe579212766c03e1f4009c3a65156fa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034799" comment="bind-chrootenv less than 9.4.1.P1-12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034800" comment="bind-devel-64bit less than 9.4.1.P1-12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034801" comment="bind-devel less than 9.4.1.P1-12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034802" comment="bind-doc less than 9.4.1.P1-12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034803" comment="bind-libs-32bit less than 9.4.1.P1-12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034804" comment="bind-libs-64bit less than 9.4.1.P1-12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034805" comment="bind-libs less than 9.4.1.P1-12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034806" comment="bind-utils less than 9.4.1.P1-12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034807" comment="bind less than 9.4.1.P1-12.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0123</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0123" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0123" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in install.php for Moodle 1.8.3, and possibly other versions before 1.8.4, allows remote attackers to inject arbitrary web script or HTML via the dbname parameter.  NOTE: this issue only exists until the installation is complete.
	</description>
 </metadata>
<!-- 6fee42aac2630323e9c6ae40418e8467 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034808" comment="moodle-af less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034809" comment="moodle-ar less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034810" comment="moodle-be less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034811" comment="moodle-bg less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034812" comment="moodle-bs less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034813" comment="moodle-ca less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034814" comment="moodle-cs less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034815" comment="moodle-da less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034816" comment="moodle-de less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034817" comment="moodle-de_du less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034818" comment="moodle-el less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034819" comment="moodle-es less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034820" comment="moodle-et less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034821" comment="moodle-eu less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034822" comment="moodle-fa less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034823" comment="moodle-fi less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034824" comment="moodle-fr less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034825" comment="moodle-ga less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034826" comment="moodle-gl less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034827" comment="moodle-he less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034828" comment="moodle-hi less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034829" comment="moodle-hr less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034830" comment="moodle-hu less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034831" comment="moodle-id less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034832" comment="moodle-is less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034833" comment="moodle-it less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034834" comment="moodle-ja less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034835" comment="moodle-ka less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034836" comment="moodle-km less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034837" comment="moodle-kn less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034838" comment="moodle-ko less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034839" comment="moodle-lt less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034840" comment="moodle-lv less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034841" comment="moodle-mi_tn less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034842" comment="moodle-ms less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034843" comment="moodle-nl less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034844" comment="moodle-nn less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034845" comment="moodle-no less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034846" comment="moodle-pl less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034847" comment="moodle-pt less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034848" comment="moodle-ro less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034849" comment="moodle-ru less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034850" comment="moodle-sk less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034851" comment="moodle-sl less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034852" comment="moodle-so less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034853" comment="moodle-sq less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034854" comment="moodle-sr less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034855" comment="moodle-sv less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034856" comment="moodle-th less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034857" comment="moodle-tl less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034858" comment="moodle-tr less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034859" comment="moodle-uk less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034860" comment="moodle-vi less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034861" comment="moodle-zh_cn less than 1.8.2-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034862" comment="moodle less than 1.8.2-17.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0171</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0171" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0171" source="CVE"/>
	<description>
	regex/v4/perl_matcher_non_recursive.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (failed assertion and crash) via an invalid regular expression.
	</description>
 </metadata>
<!-- 4f912df5c583286348d282dbe9b2506c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034863" comment="boost-64bit less than 1.33.1-108.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034864" comment="boost-devel-64bit less than 1.33.1-108.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034865" comment="boost-devel less than 1.33.1-108.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034866" comment="boost-doc less than 1.33.1-108.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034867" comment="boost less than 1.33.1-108.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0172</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0172" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0172" source="CVE"/>
	<description>
	The get_repeat_type function in basic_regex_creator.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (NULL dereference and crash) via an invalid regular expression.
	</description>
 </metadata>
<!-- 4f912df5c583286348d282dbe9b2506c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034863" comment="boost-64bit less than 1.33.1-108.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034864" comment="boost-devel-64bit less than 1.33.1-108.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034865" comment="boost-devel less than 1.33.1-108.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034866" comment="boost-doc less than 1.33.1-108.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034867" comment="boost less than 1.33.1-108.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0225</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0225" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0225" source="CVE"/>
	<description>
	Heap-based buffer overflow in the rmff_dump_cont function in input/libreal/rmff.c in xine-lib 1.1.9 and earlier allows remote attackers to execute arbitrary code via the SDP Abstract attribute in an RTSP session, related to the rmff_dump_header function and related to disregarding the max field.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- f9bbc5c915ce83d9ecbc3570dfbfdce9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034868" comment="xine-devel less than 1.1.8-14.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034869" comment="xine-extra less than 1.1.8-14.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034870" comment="xine-lib-32bit less than 1.1.8-14.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034871" comment="xine-lib-64bit less than 1.1.8-14.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034872" comment="xine-lib less than 1.1.8-14.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0314</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0314" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0314" source="CVE"/>
	<description>
	Heap-based buffer overflow in spin.c in libclamav in ClamAV 0.92.1 allows remote attackers to execute arbitrary code via a crafted PeSpin packed PE binary with a modified length value.
	</description>
 </metadata>
<!-- ff03f9aef2831b62e43a820d6cf02519 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034692" comment="clamav-db less than 0.93-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034693" comment="clamav less than 0.93-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0318</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0318" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0318" source="CVE"/>
	<description>
	Integer overflow in the cli_scanpe function in libclamav in ClamAV before 0.92.1, as used in clamd, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted Petite packed PE file, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- a9108f3ea754b7c2755f65ad986a7443 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034873" comment="clamav-db less than 0.92.1-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033747" comment="clamav less than 0.92.1-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0320</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0320" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0320" source="CVE"/>
	<description>
	Heap-based buffer overflow in the OLE importer in OpenOffice.org before 2.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an OLE file with a crafted DocumentSummaryInformation stream.
	</description>
 </metadata>
<!-- 0abe09c4e8fdfd958e569c4846fbce31 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034295" comment="OpenOffice_org-af less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034296" comment="OpenOffice_org-ar less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034297" comment="OpenOffice_org-base less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034298" comment="OpenOffice_org-be-BY less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034299" comment="OpenOffice_org-bg less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034300" comment="OpenOffice_org-ca less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034301" comment="OpenOffice_org-calc less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034302" comment="OpenOffice_org-cs less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034303" comment="OpenOffice_org-cy less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034304" comment="OpenOffice_org-da less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034305" comment="OpenOffice_org-de less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034306" comment="OpenOffice_org-devel less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034307" comment="OpenOffice_org-draw less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034308" comment="OpenOffice_org-el less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034309" comment="OpenOffice_org-en-GB less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034310" comment="OpenOffice_org-es less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034311" comment="OpenOffice_org-et less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034312" comment="OpenOffice_org-fi less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034313" comment="OpenOffice_org-filters less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034314" comment="OpenOffice_org-fr less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034315" comment="OpenOffice_org-gnome less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034316" comment="OpenOffice_org-gu-IN less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034317" comment="OpenOffice_org-hi-IN less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034318" comment="OpenOffice_org-hr less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034319" comment="OpenOffice_org-hu less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034320" comment="OpenOffice_org-impress less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034321" comment="OpenOffice_org-it less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034322" comment="OpenOffice_org-ja less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034323" comment="OpenOffice_org-kde less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034324" comment="OpenOffice_org-km less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034325" comment="OpenOffice_org-ko less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034326" comment="OpenOffice_org-lt less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034327" comment="OpenOffice_org-mailmerge less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034328" comment="OpenOffice_org-math less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034329" comment="OpenOffice_org-mk less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034330" comment="OpenOffice_org-mono less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034331" comment="OpenOffice_org-nb less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034332" comment="OpenOffice_org-nl less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034333" comment="OpenOffice_org-nn less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034334" comment="OpenOffice_org-officebean less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034335" comment="OpenOffice_org-pa-IN less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034336" comment="OpenOffice_org-pl less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034337" comment="OpenOffice_org-pt-BR less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034338" comment="OpenOffice_org-pt less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034339" comment="OpenOffice_org-pyuno less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034340" comment="OpenOffice_org-ru less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034341" comment="OpenOffice_org-rw less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034342" comment="OpenOffice_org-sdk-doc less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034343" comment="OpenOffice_org-sdk less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034344" comment="OpenOffice_org-sk less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034345" comment="OpenOffice_org-sl less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034346" comment="OpenOffice_org-sr-CS less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034347" comment="OpenOffice_org-st less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034348" comment="OpenOffice_org-sv less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034349" comment="OpenOffice_org-testtool less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034350" comment="OpenOffice_org-tr less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034351" comment="OpenOffice_org-ts less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034352" comment="OpenOffice_org-vi less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034353" comment="OpenOffice_org-writer less than 2.3.0.1.2-10.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034354" comment="OpenOffice_org-xh less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034355" comment="OpenOffice_org-zh-CN less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034356" comment="OpenOffice_org-zh-TW less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034357" comment="OpenOffice_org-zu less than 2.3.0.1.2-2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034358" comment="OpenOffice_org less than 2.3.0.1.2-10.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0386</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0386" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0386" source="CVE"/>
	<description>
	Xdg-utils 1.0.2 and earlier allows user-assisted remote attackers to execute arbitrary commands via shell metacharacters in a URL argument to (1) xdg-open or (2) xdg-email.
	</description>
 </metadata>
<!-- 7aa08f7c556706569bb1cb8915ee7d09 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034874" comment="xdg-utils less than 1.0.1-86.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0411</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0411" source="CVE"/>
	<description>
	Stack-based buffer overflow in the zseticcspace function in zicc.c in Ghostscript 8.61 and earlier allows remote attackers to execute arbitrary code via a postscript (.ps) file containing a long Range array in a .seticcspace operator.
	</description>
 </metadata>
<!-- fe3d4251190b588f727d8e45603e1c66 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034875" comment="ghostscript-fonts-other less than 8.15.4-3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034876" comment="ghostscript-fonts-rus less than 8.15.4-3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034877" comment="ghostscript-fonts-std less than 8.15.4-3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034878" comment="ghostscript-ijs-devel less than 8.15.4-3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034879" comment="ghostscript-library less than 8.15.4-3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034880" comment="ghostscript-omni less than 8.15.4-3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034881" comment="ghostscript-x11 less than 8.15.4-3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034882" comment="libgimpprint-devel less than 4.2.7-178.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034883" comment="libgimpprint less than 4.2.7-178.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0412</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0412" source="CVE"/>
	<description>
	The browser engine in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allows remote attackers to cause a denial of service (crash) and possibly trigger memory corruption via vectors related to the (1) nsTableFrame::GetFrameAtOrBefore, (2) nsAccessibilityService::GetAccessible, (3) nsBindingManager::GetNestedInsertionPoint, (4) nsXBLPrototypeBinding::AttributeChanged, (5) nsColumnSetFrame::GetContentInsertionFrame, and (6) nsLineLayout::TrimTrailingWhiteSpaceIn methods, and other vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 03e9b2a76c00179921616aa76a3d63ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034884" comment="MozillaFirefox-translations less than 2.0.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034885" comment="MozillaFirefox less than 2.0.0.12-0.1"/>
		</criteria>
	</criteria>
	<!-- 134b86cad7ef1aa1da4d4c1c9ed038b2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034886" comment="MozillaThunderbird-translations less than 2.0.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034887" comment="MozillaThunderbird less than 2.0.0.12-1.1"/>
		</criteria>
	</criteria>
	<!-- c2296a53157f2173c4e50ae3e29f6ab2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034888" comment="seamonkey-dom-inspector less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034889" comment="seamonkey-irc less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034890" comment="seamonkey-mail less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034891" comment="seamonkey-spellchecker less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034892" comment="seamonkey-venkman less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034893" comment="seamonkey less than 1.1.8-0.1"/>
		</criteria>
	</criteria>
	<!-- da0ce71cc17ae833751e0a2b89fc5811 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034894" comment="epiphany-devel less than 2.20.0-8.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034895" comment="epiphany-doc less than 2.20.0-8.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034896" comment="epiphany-extensions less than 2.20.0-8.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034897" comment="epiphany less than 2.20.0-8.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034898" comment="mozilla-xulrunner181-32bit less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034899" comment="mozilla-xulrunner181-64bit less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034900" comment="mozilla-xulrunner181-devel less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034901" comment="mozilla-xulrunner181-l10n less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034902" comment="mozilla-xulrunner181 less than 1.8.1.12-1.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0413</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0413" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0413" source="CVE"/>
	<description>
	The JavaScript engine in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allows remote attackers to cause a denial of service (crash) and possibly trigger memory corruption via (1) a large switch statement, (2) certain uses of watch and eval, (3) certain uses of the mousedown event listener, and other vectors.
	</description>
 </metadata>
<!-- c2296a53157f2173c4e50ae3e29f6ab2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034888" comment="seamonkey-dom-inspector less than 1.1.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034889" comment="seamonkey-irc less than 1.1.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034890" comment="seamonkey-mail less than 1.1.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034891" comment="seamonkey-spellchecker less than 1.1.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034892" comment="seamonkey-venkman less than 1.1.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034893" comment="seamonkey less than 1.1.8-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0414</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0414" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0414" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows user-assisted remote attackers to trick the user into uploading arbitrary files via label tags that shift focus to a file input field, aka "focus spoofing."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 03e9b2a76c00179921616aa76a3d63ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034884" comment="MozillaFirefox-translations less than 2.0.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034885" comment="MozillaFirefox less than 2.0.0.12-0.1"/>
		</criteria>
	</criteria>
	<!-- 134b86cad7ef1aa1da4d4c1c9ed038b2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034886" comment="MozillaThunderbird-translations less than 2.0.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034887" comment="MozillaThunderbird less than 2.0.0.12-1.1"/>
		</criteria>
	</criteria>
	<!-- c2296a53157f2173c4e50ae3e29f6ab2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034888" comment="seamonkey-dom-inspector less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034889" comment="seamonkey-irc less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034890" comment="seamonkey-mail less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034891" comment="seamonkey-spellchecker less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034892" comment="seamonkey-venkman less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034893" comment="seamonkey less than 1.1.8-0.1"/>
		</criteria>
	</criteria>
	<!-- da0ce71cc17ae833751e0a2b89fc5811 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034894" comment="epiphany-devel less than 2.20.0-8.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034895" comment="epiphany-doc less than 2.20.0-8.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034896" comment="epiphany-extensions less than 2.20.0-8.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034897" comment="epiphany less than 2.20.0-8.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034898" comment="mozilla-xulrunner181-32bit less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034899" comment="mozilla-xulrunner181-64bit less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034900" comment="mozilla-xulrunner181-devel less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034901" comment="mozilla-xulrunner181-l10n less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034902" comment="mozilla-xulrunner181 less than 1.8.1.12-1.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0415</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0415" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0415" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allows remote attackers to execute script outside of the sandbox and conduct cross-site scripting (XSS) attacks via multiple vectors including the XMLDocument.load function, aka "JavaScript privilege escalation bugs."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 03e9b2a76c00179921616aa76a3d63ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034884" comment="MozillaFirefox-translations less than 2.0.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034885" comment="MozillaFirefox less than 2.0.0.12-0.1"/>
		</criteria>
	</criteria>
	<!-- 134b86cad7ef1aa1da4d4c1c9ed038b2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034886" comment="MozillaThunderbird-translations less than 2.0.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034887" comment="MozillaThunderbird less than 2.0.0.12-1.1"/>
		</criteria>
	</criteria>
	<!-- c2296a53157f2173c4e50ae3e29f6ab2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034888" comment="seamonkey-dom-inspector less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034889" comment="seamonkey-irc less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034890" comment="seamonkey-mail less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034891" comment="seamonkey-spellchecker less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034892" comment="seamonkey-venkman less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034893" comment="seamonkey less than 1.1.8-0.1"/>
		</criteria>
	</criteria>
	<!-- da0ce71cc17ae833751e0a2b89fc5811 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034894" comment="epiphany-devel less than 2.20.0-8.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034895" comment="epiphany-doc less than 2.20.0-8.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034896" comment="epiphany-extensions less than 2.20.0-8.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034897" comment="epiphany less than 2.20.0-8.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034898" comment="mozilla-xulrunner181-32bit less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034899" comment="mozilla-xulrunner181-64bit less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034900" comment="mozilla-xulrunner181-devel less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034901" comment="mozilla-xulrunner181-l10n less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034902" comment="mozilla-xulrunner181 less than 1.8.1.12-1.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0417</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0417" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0417" source="CVE"/>
	<description>
	CRLF injection vulnerability in Mozilla Firefox before 2.0.0.12 allows remote user-assisted web sites to corrupt the user's password store via newlines that are not properly handled when the user saves a password.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 03e9b2a76c00179921616aa76a3d63ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034884" comment="MozillaFirefox-translations less than 2.0.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034885" comment="MozillaFirefox less than 2.0.0.12-0.1"/>
		</criteria>
	</criteria>
	<!-- 134b86cad7ef1aa1da4d4c1c9ed038b2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034886" comment="MozillaThunderbird-translations less than 2.0.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034887" comment="MozillaThunderbird less than 2.0.0.12-1.1"/>
		</criteria>
	</criteria>
	<!-- c2296a53157f2173c4e50ae3e29f6ab2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034888" comment="seamonkey-dom-inspector less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034889" comment="seamonkey-irc less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034890" comment="seamonkey-mail less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034891" comment="seamonkey-spellchecker less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034892" comment="seamonkey-venkman less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034893" comment="seamonkey less than 1.1.8-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0418</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0418" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0418" source="CVE"/>
	<description>
	Directory traversal vulnerability in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8, when using "flat" addons, allows remote attackers to read arbitrary Javascript, image, and stylesheet files via the chrome: URI scheme, as demonstrated by stealing session information from sessionstore.js.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 03e9b2a76c00179921616aa76a3d63ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034884" comment="MozillaFirefox-translations less than 2.0.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034885" comment="MozillaFirefox less than 2.0.0.12-0.1"/>
		</criteria>
	</criteria>
	<!-- 134b86cad7ef1aa1da4d4c1c9ed038b2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034886" comment="MozillaThunderbird-translations less than 2.0.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034887" comment="MozillaThunderbird less than 2.0.0.12-1.1"/>
		</criteria>
	</criteria>
	<!-- c2296a53157f2173c4e50ae3e29f6ab2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034888" comment="seamonkey-dom-inspector less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034889" comment="seamonkey-irc less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034890" comment="seamonkey-mail less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034891" comment="seamonkey-spellchecker less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034892" comment="seamonkey-venkman less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034893" comment="seamonkey less than 1.1.8-0.1"/>
		</criteria>
	</criteria>
	<!-- da0ce71cc17ae833751e0a2b89fc5811 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034894" comment="epiphany-devel less than 2.20.0-8.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034895" comment="epiphany-doc less than 2.20.0-8.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034896" comment="epiphany-extensions less than 2.20.0-8.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034897" comment="epiphany less than 2.20.0-8.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034898" comment="mozilla-xulrunner181-32bit less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034899" comment="mozilla-xulrunner181-64bit less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034900" comment="mozilla-xulrunner181-devel less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034901" comment="mozilla-xulrunner181-l10n less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034902" comment="mozilla-xulrunner181 less than 1.8.1.12-1.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0419</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0419" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows remote attackers to steal navigation history and cause a denial of service (crash) via images in a page that uses designMode frames, which triggers memory corruption related to resize handles.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 03e9b2a76c00179921616aa76a3d63ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034884" comment="MozillaFirefox-translations less than 2.0.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034885" comment="MozillaFirefox less than 2.0.0.12-0.1"/>
		</criteria>
	</criteria>
	<!-- 134b86cad7ef1aa1da4d4c1c9ed038b2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034886" comment="MozillaThunderbird-translations less than 2.0.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034887" comment="MozillaThunderbird less than 2.0.0.12-1.1"/>
		</criteria>
	</criteria>
	<!-- c2296a53157f2173c4e50ae3e29f6ab2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034888" comment="seamonkey-dom-inspector less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034889" comment="seamonkey-irc less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034890" comment="seamonkey-mail less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034891" comment="seamonkey-spellchecker less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034892" comment="seamonkey-venkman less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034893" comment="seamonkey less than 1.1.8-0.1"/>
		</criteria>
	</criteria>
	<!-- da0ce71cc17ae833751e0a2b89fc5811 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034894" comment="epiphany-devel less than 2.20.0-8.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034895" comment="epiphany-doc less than 2.20.0-8.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034896" comment="epiphany-extensions less than 2.20.0-8.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034897" comment="epiphany less than 2.20.0-8.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034898" comment="mozilla-xulrunner181-32bit less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034899" comment="mozilla-xulrunner181-64bit less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034900" comment="mozilla-xulrunner181-devel less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034901" comment="mozilla-xulrunner181-l10n less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034902" comment="mozilla-xulrunner181 less than 1.8.1.12-1.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0420</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0420" source="CVE"/>
	<description>
	modules/libpr0n/decoders/bmp/nsBMPDecoder.cpp in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 does not properly perform certain calculations related to the mColors table, which allows remote attackers to read portions of memory uninitialized via a crafted 8-bit bitmap (BMP) file that triggers an out-of-bounds read within the heap, as demonstrated using a CANVAS element; or cause a denial of service (application crash) via a crafted 8-bit bitmap file that triggers an out-of-bounds read. NOTE: the initial public reports stated that this affected Firefox in Ubuntu 6.06 through 7.10.
	</description>
 </metadata>
<!-- 03e9b2a76c00179921616aa76a3d63ce -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034884" comment="MozillaFirefox-translations less than 2.0.0.12-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034885" comment="MozillaFirefox less than 2.0.0.12-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0553</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0553" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0553" source="CVE"/>
	<description>
	Stack-based buffer overflow in the ReadImage function in tkImgGIF.c in Tk (Tcl/Tk) before 8.5.1 allows remote attackers to execute arbitrary code via a crafted GIF image, a similar issue to CVE-2006-4484.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 688c3a565484bf40e245ddbbfd9a2ef7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034903" comment="tk-32bit less than 8.4.15-25.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034904" comment="tk-64bit less than 8.4.15-25.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034905" comment="tk-devel less than 8.4.15-25.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034906" comment="tk less than 8.4.15-25.3"/>
		</criteria>
	</criteria>
	<!-- ab5a31733d5d4eb3e990eef6a50da2c5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034033" comment="tkimg less than 1.3-125.2"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0564</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0564" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0564" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in Mailman before 2.1.10b1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors related to (1) editing templates and (2) the list's "info attribute" in the web administrator interface, a different vulnerability than CVE-2006-3636.
	</description>
 </metadata>
<!-- 9c9b5c83e5ae93eeed2887de78a0c0fe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034907" comment="mailman less than 2.1.9-90.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0591</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0591" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0591" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.12 and Thunderbird before 2.0.0.12 does not properly manage a delay timer used in confirmation dialogs, which might allow remote attackers to trick users into confirming an unsafe action, such as remote file execution, by using a timer to change the window focus, aka the "dialog refocus bug" or "ffclick2".
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 03e9b2a76c00179921616aa76a3d63ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034884" comment="MozillaFirefox-translations less than 2.0.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034885" comment="MozillaFirefox less than 2.0.0.12-0.1"/>
		</criteria>
	</criteria>
	<!-- 134b86cad7ef1aa1da4d4c1c9ed038b2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034886" comment="MozillaThunderbird-translations less than 2.0.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034887" comment="MozillaThunderbird less than 2.0.0.12-1.1"/>
		</criteria>
	</criteria>
	<!-- c2296a53157f2173c4e50ae3e29f6ab2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034888" comment="seamonkey-dom-inspector less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034889" comment="seamonkey-irc less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034890" comment="seamonkey-mail less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034891" comment="seamonkey-spellchecker less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034892" comment="seamonkey-venkman less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034893" comment="seamonkey less than 1.1.8-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0592</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0592" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0592" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows user-assisted remote attackers to cause a denial of service via a plain .txt file with a "Content-Disposition: attachment" and an invalid "Content-Type: plain/text," which prevents Firefox from rendering future plain text files within the browser.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 03e9b2a76c00179921616aa76a3d63ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034884" comment="MozillaFirefox-translations less than 2.0.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034885" comment="MozillaFirefox less than 2.0.0.12-0.1"/>
		</criteria>
	</criteria>
	<!-- 134b86cad7ef1aa1da4d4c1c9ed038b2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034886" comment="MozillaThunderbird-translations less than 2.0.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034887" comment="MozillaThunderbird less than 2.0.0.12-1.1"/>
		</criteria>
	</criteria>
	<!-- c2296a53157f2173c4e50ae3e29f6ab2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034888" comment="seamonkey-dom-inspector less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034889" comment="seamonkey-irc less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034890" comment="seamonkey-mail less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034891" comment="seamonkey-spellchecker less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034892" comment="seamonkey-venkman less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034893" comment="seamonkey less than 1.1.8-0.1"/>
		</criteria>
	</criteria>
	<!-- da0ce71cc17ae833751e0a2b89fc5811 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034894" comment="epiphany-devel less than 2.20.0-8.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034895" comment="epiphany-doc less than 2.20.0-8.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034896" comment="epiphany-extensions less than 2.20.0-8.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034897" comment="epiphany less than 2.20.0-8.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034898" comment="mozilla-xulrunner181-32bit less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034899" comment="mozilla-xulrunner181-64bit less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034900" comment="mozilla-xulrunner181-devel less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034901" comment="mozilla-xulrunner181-l10n less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034902" comment="mozilla-xulrunner181 less than 1.8.1.12-1.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0593</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0593" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0593" source="CVE"/>
	<description>
	Gecko-based browsers, including Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8, modify the .href property of stylesheet DOM nodes to the final URI of a 302 redirect, which might allow remote attackers to bypass the Same Origin Policy and read sensitive information from the original URL, such as with Single-Signon systems.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 03e9b2a76c00179921616aa76a3d63ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034884" comment="MozillaFirefox-translations less than 2.0.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034885" comment="MozillaFirefox less than 2.0.0.12-0.1"/>
		</criteria>
	</criteria>
	<!-- 134b86cad7ef1aa1da4d4c1c9ed038b2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034886" comment="MozillaThunderbird-translations less than 2.0.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034887" comment="MozillaThunderbird less than 2.0.0.12-1.1"/>
		</criteria>
	</criteria>
	<!-- c2296a53157f2173c4e50ae3e29f6ab2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034888" comment="seamonkey-dom-inspector less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034889" comment="seamonkey-irc less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034890" comment="seamonkey-mail less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034891" comment="seamonkey-spellchecker less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034892" comment="seamonkey-venkman less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034893" comment="seamonkey less than 1.1.8-0.1"/>
		</criteria>
	</criteria>
	<!-- da0ce71cc17ae833751e0a2b89fc5811 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034894" comment="epiphany-devel less than 2.20.0-8.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034895" comment="epiphany-doc less than 2.20.0-8.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034896" comment="epiphany-extensions less than 2.20.0-8.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034897" comment="epiphany less than 2.20.0-8.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034898" comment="mozilla-xulrunner181-32bit less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034899" comment="mozilla-xulrunner181-64bit less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034900" comment="mozilla-xulrunner181-devel less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034901" comment="mozilla-xulrunner181-l10n less than 1.8.1.12-1.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034902" comment="mozilla-xulrunner181 less than 1.8.1.12-1.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0594</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0594" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0594" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.12 does not always display a web forgery warning dialog if the entire contents of a web page are in a DIV tag that uses absolute positioning, which makes it easier for remote attackers to conduct phishing attacks.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 03e9b2a76c00179921616aa76a3d63ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034884" comment="MozillaFirefox-translations less than 2.0.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034885" comment="MozillaFirefox less than 2.0.0.12-0.1"/>
		</criteria>
	</criteria>
	<!-- 134b86cad7ef1aa1da4d4c1c9ed038b2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034886" comment="MozillaThunderbird-translations less than 2.0.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034887" comment="MozillaThunderbird less than 2.0.0.12-1.1"/>
		</criteria>
	</criteria>
	<!-- c2296a53157f2173c4e50ae3e29f6ab2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034888" comment="seamonkey-dom-inspector less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034889" comment="seamonkey-irc less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034890" comment="seamonkey-mail less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034891" comment="seamonkey-spellchecker less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034892" comment="seamonkey-venkman less than 1.1.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034893" comment="seamonkey less than 1.1.8-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0595</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0595" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0595" source="CVE"/>
	<description>
	dbus-daemon in D-Bus before 1.0.3, and 1.1.x before 1.1.20, recognizes send_interface attributes in allow directives in the security policy only for fully qualified method calls, which allows local users to bypass intended access restrictions via a method call with a NULL interface.
	</description>
 </metadata>
<!-- ddd3f3b9e356664eb09b3038752bdc01 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034908" comment="dbus-1-32bit less than 1.0.2-59.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034909" comment="dbus-1-64bit less than 1.0.2-59.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034910" comment="dbus-1-devel-doc less than 1.0.2-59.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034911" comment="dbus-1-devel less than 1.0.2-59.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034912" comment="dbus-1-glib-32bit less than 0.74-25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034913" comment="dbus-1-glib-64bit less than 0.74-25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034914" comment="dbus-1-glib-devel less than 0.74-25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034915" comment="dbus-1-glib-doc less than 0.74-25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034916" comment="dbus-1-glib less than 0.74-25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034917" comment="dbus-1-mono less than 0.63-90.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034918" comment="dbus-1-python less than 0.82.0-28.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034919" comment="dbus-1-qt3-32bit less than 0.62-110.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034920" comment="dbus-1-qt3-64bit less than 0.62-110.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034921" comment="dbus-1-qt3-devel less than 0.62-110.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034922" comment="dbus-1-qt3 less than 0.62-110.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034923" comment="dbus-1-x11 less than 1.0.2-67.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034924" comment="dbus-1 less than 1.0.2-59.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0596</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0596" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0596" source="CVE"/>
	<description>
	Memory leak in CUPS before 1.1.22, and possibly other versions, allows remote attackers to cause a denial of service (memory consumption and daemon crash) via a large number of requests to add and remove shared printers.
	</description>
 </metadata>
<!-- 5eea01dfc8c788ee46a4a3f897ceae1a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034925" comment="cups-client less than 1.2.12-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034926" comment="cups-devel less than 1.2.12-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034927" comment="cups-libs-32bit less than 1.2.12-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034928" comment="cups-libs-64bit less than 1.2.12-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034929" comment="cups-libs less than 1.2.12-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034930" comment="cups less than 1.2.12-22.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0597</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0597" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0597" source="CVE"/>
	<description>
	Use-after-free vulnerability in CUPS before 1.1.22, and possibly other versions, allows remote attackers to cause a denial of service (crash) via crafted IPP packets.
	</description>
 </metadata>
<!-- 5eea01dfc8c788ee46a4a3f897ceae1a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034925" comment="cups-client less than 1.2.12-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034926" comment="cups-devel less than 1.2.12-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034927" comment="cups-libs-32bit less than 1.2.12-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034928" comment="cups-libs-64bit less than 1.2.12-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034929" comment="cups-libs less than 1.2.12-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034930" comment="cups less than 1.2.12-22.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0600</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0600" source="CVE"/>
	<description>
	The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- ce69efad906e121671acbbfba61ac379 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034642" comment="kernel-bigsmp less than 2.6.22.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034643" comment="kernel-debug less than 2.6.22.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034644" comment="kernel-default less than 2.6.22.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034645" comment="kernel-kdump less than 2.6.22.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034646" comment="kernel-ppc64 less than 2.6.22.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034647" comment="kernel-rt less than 2.6.22.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034648" comment="kernel-rt_debug less than 2.6.22.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034649" comment="kernel-source less than 2.6.22.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034650" comment="kernel-syms less than 2.6.22.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034651" comment="kernel-xen less than 2.6.22.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034652" comment="kernel-xenpae less than 2.6.22.17-0.1"/>
		</criteria>
	</criteria>
	<!-- dda6610eac43b25e4baef74689c8d7c5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034654" comment="kernel-bigsmp less than 2.6.22.18-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034655" comment="kernel-debug less than 2.6.22.18-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034656" comment="kernel-default less than 2.6.22.18-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034657" comment="kernel-kdump less than 2.6.22.18-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034658" comment="kernel-ppc64 less than 2.6.22.18-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034659" comment="kernel-source less than 2.6.22.18-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034660" comment="kernel-syms less than 2.6.22.18-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034661" comment="kernel-xen less than 2.6.22.18-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034662" comment="kernel-xenpae less than 2.6.22.18-0.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0655</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0655" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0655" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Adobe Reader and Acrobat before 8.1.2 have unknown impact and attack vectors.
	</description>
 </metadata>
<!-- 3e1d1ea5f50419ba08891a752f91282f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034931" comment="acroread less than 8.1.2-1.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0658</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0658" source="CVE"/>
	<description>
	slapd/back-bdb/modrdn.c in the BDB backend for slapd in OpenLDAP 2.3.39 allows remote authenticated users to cause a denial of service (daemon crash) via a modrdn operation with a NOOP (LDAP_X_NO_OPERATION) control, a related issue to CVE-2007-6698.
	</description>
 </metadata>
<!-- e15950b0697ed9fee8fdd803961e8fb7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034708" comment="openldap2-back-meta less than 2.3.37-7.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034709" comment="openldap2-back-perl less than 2.3.37-7.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034710" comment="openldap2-devel-32bit less than 2.3.37-20.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034711" comment="openldap2-devel-64bit less than 2.3.37-20.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034712" comment="openldap2-devel less than 2.3.37-20.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034713" comment="openldap2 less than 2.3.37-7.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0667</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0667" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0667" source="CVE"/>
	<description>
	The DOC.print function in the Adobe JavaScript API, as used by Adobe Acrobat and Reader before 8.1.2, allows remote attackers to configure silent non-interactive printing, and trigger the printing of an arbitrary number of copies of a document.  NOTE: this issue might be subsumed by CVE-2008-0655.
	</description>
 </metadata>
<!-- 3e1d1ea5f50419ba08891a752f91282f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034931" comment="acroread less than 8.1.2-1.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0668</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0668" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0668" source="CVE"/>
	<description>
	The excel_read_HLINK function in plugins/excel/ms-excel-read.c in Gnome Office Gnumeric before 1.8.1 allows user-assisted remote attackers to execute arbitrary code via a crafted XLS file containing XLS HLINK opcodes, possibly because of an integer signedness error that leads to an integer overflow.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- ed678757e2abf73395d05650865d7274 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034932" comment="gnumeric-devel less than 1.7.11-32.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034933" comment="gnumeric less than 1.7.11-32.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0674</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0674" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0674" source="CVE"/>
	<description>
	Buffer overflow in PCRE before 7.6 allows remote attackers to execute arbitrary code via a regular expression containing a character class with a large number of characters with Unicode code points greater than 255.
	</description>
 </metadata>
<!-- 0c9115ab19987a3ea474667a4f9e4b0a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034934" comment="pcre-32bit less than 7.2-14.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034935" comment="pcre-64bit less than 7.2-14.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034936" comment="pcre-devel less than 7.2-14.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034937" comment="pcre less than 7.2-14.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0726</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0726" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0726" source="CVE"/>
	<description>
	Integer overflow in Adobe Reader and Acrobat 8.1.1 and earlier allows remote attackers to execute arbitrary code via crafted arguments to the printSepsWithParams, which triggers memory corruption.
	</description>
 </metadata>
<!-- 3e1d1ea5f50419ba08891a752f91282f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034931" comment="acroread less than 8.1.2-1.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0728</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0728" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0728" source="CVE"/>
	<description>
	The unmew11 function in libclamav/mew.c in libclamav in ClamAV before 0.92.1 has unknown impact and attack vectors that trigger "heap corruption."
	</description>
 </metadata>
<!-- a9108f3ea754b7c2755f65ad986a7443 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034873" comment="clamav-db less than 0.92.1-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033747" comment="clamav less than 0.92.1-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0732</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0732" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0732" source="CVE"/>
	<description>
	The init script for Apache Geronimo on SUSE Linux follows symlinks when performing a chown operation, which might allow local users to obtain access to unspecified files or directories.
	</description>
 </metadata>
<!-- 2b9c3cf922cf92a328134d506a872404 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034938" comment="geronimo-jetty-servlet-container less than 1.1-138.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034939" comment="geronimo-tomcat-servlet-container less than 1.1-138.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034940" comment="geronimo less than 1.1-138.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0783</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0783" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in Cacti 0.8.7 before 0.8.7b and 0.8.6 before 0.8.6k allow remote attackers to inject arbitrary web script or HTML via (1) the view_type parameter to graph.php; (2) the filter parameter to graph_view.php; (3) the action parameter to the draw_navigation_text function in lib/functions.php, reachable through index.php (aka the login page) or data_input.php; or (4) the login_username parameter to index.php.
	</description>
 </metadata>
<!-- 3099a1e918f668f78780387bd6490edd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034941" comment="cacti less than 0.8.6j-64.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0784</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0784" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0784" source="CVE"/>
	<description>
	graph.php in Cacti 0.8.7 before 0.8.7b and 0.8.6 before 0.8.6k allows remote attackers to obtain the full path via an invalid local_graph_id parameter and other unspecified vectors.
	</description>
 </metadata>
<!-- 3099a1e918f668f78780387bd6490edd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034941" comment="cacti less than 0.8.6j-64.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0785</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0785" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0785" source="CVE"/>
	<description>
	Multiple SQL injection vulnerabilities in Cacti 0.8.7 before 0.8.7b and 0.8.6 before 0.8.6k allow remote authenticated users to execute arbitrary SQL commands via the (1) graph_list parameter to graph_view.php, (2) leaf_id and id parameters to tree.php, (3) local_graph_id parameter to graph_xport.php, and (4) login_username parameter to index.php/login.
	</description>
 </metadata>
<!-- 3099a1e918f668f78780387bd6490edd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034941" comment="cacti less than 0.8.6j-64.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0786</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0786" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0786" source="CVE"/>
	<description>
	CRLF injection vulnerability in Cacti 0.8.7 before 0.8.7b and 0.8.6 before 0.8.6k, when running on older PHP interpreters, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.
	</description>
 </metadata>
<!-- 3099a1e918f668f78780387bd6490edd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034941" comment="cacti less than 0.8.6j-64.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0882</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0882" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0882" source="CVE"/>
	<description>
	Double free vulnerability in the process_browse_data function in CUPS 1.3.5 allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via crafted UDP Browse packets to the cupsd port (631/udp), related to an unspecified manipulation of a remote printer.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 5eea01dfc8c788ee46a4a3f897ceae1a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034925" comment="cups-client less than 1.2.12-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034926" comment="cups-devel less than 1.2.12-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034927" comment="cups-libs-32bit less than 1.2.12-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034928" comment="cups-libs-64bit less than 1.2.12-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034929" comment="cups-libs less than 1.2.12-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034930" comment="cups less than 1.2.12-22.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0883</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0883" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0883" source="CVE"/>
	<description>
	acroread in Adobe Acrobat Reader 8.1.2 allows local users to overwrite arbitrary files via a symlink attack on temporary files related to SSL certificate handling.
	</description>
 </metadata>
<!-- ca8b938258caef518d1257096269d66e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034942" comment="acroread less than 8.1.2-1.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0887</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0887" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0887" source="CVE"/>
	<description>
	gnome-screensaver before 2.22.1, when a remote authentication server is enabled, crashes upon an unlock attempt during a network outage, which allows physically proximate attackers to gain access to the locked session, a related issue to CVE-2007-1859.
	</description>
 </metadata>
<!-- 2b1e5465767ba40e552a46140772107f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034943" comment="gnome-screensaver less than 2.20.0-6.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0888</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0888" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0888" source="CVE"/>
	<description>
	The NEEDBITS macro in the inflate_dynamic function in inflate.c for unzip can be invoked using invalid buffers, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors that trigger a free of uninitialized or previously-freed data.
	</description>
 </metadata>
<!-- d3ce9d2927e4dfa8d896cb2244d4b88e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034944" comment="unzip less than 5.52-77.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0928</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0928" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0928" source="CVE"/>
	<description>
	Qemu 0.9.1 and earlier does not perform range checks for block device read or write requests, which allows guest host users with root privileges to access arbitrary memory and escape the virtual machine.
	</description>
 </metadata>
<!-- 0e2b33e755c079848c85abff921e8caa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034945" comment="qemu less than 0.10.1-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0947</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0947" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0947" source="CVE"/>
	<description>
	Buffer overflow in the RPC library used by libgssrpc and kadmind in MIT Kerberos 5 (krb5) 1.4 through 1.6.3 allows remote attackers to execute arbitrary code by triggering a large number of open file descriptors.
	</description>
 </metadata>
<!-- 6432264bc043c02c3d5a161366fca305 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034780" comment="krb5-32bit less than 1.6.2-22.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034781" comment="krb5-64bit less than 1.6.2-22.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034782" comment="krb5-apps-clients less than 1.6.2-22.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034783" comment="krb5-apps-servers less than 1.6.2-22.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034784" comment="krb5-client less than 1.6.2-22.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034785" comment="krb5-devel-32bit less than 1.6.2-22.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034786" comment="krb5-devel-64bit less than 1.6.2-22.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034787" comment="krb5-devel less than 1.6.2-22.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034788" comment="krb5-server less than 1.6.2-22.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034789" comment="krb5 less than 1.6.2-22.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0948</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0948" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0948" source="CVE"/>
	<description>
	Buffer overflow in the RPC library (lib/rpc/rpc_dtablesize.c) used by libgssrpc and kadmind in MIT Kerberos 5 (krb5) 1.2.2, and probably other versions before 1.3, when running on systems whose unistd.h does not define the FD_SETSIZE macro, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by triggering a large number of open file descriptors.
	</description>
 </metadata>
<!-- 6432264bc043c02c3d5a161366fca305 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034780" comment="krb5-32bit less than 1.6.2-22.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034781" comment="krb5-64bit less than 1.6.2-22.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034782" comment="krb5-apps-clients less than 1.6.2-22.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034783" comment="krb5-apps-servers less than 1.6.2-22.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034784" comment="krb5-client less than 1.6.2-22.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034785" comment="krb5-devel-32bit less than 1.6.2-22.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034786" comment="krb5-devel-64bit less than 1.6.2-22.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034787" comment="krb5-devel less than 1.6.2-22.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034788" comment="krb5-server less than 1.6.2-22.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034789" comment="krb5 less than 1.6.2-22.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0960</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0960" source="CVE"/>
	<description>
	SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte.
	</description>
 </metadata>
<!-- 5c5533dfe70147c9aaa62dc81727e486 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034946" comment="libsnmp15 less than 5.4.1-19.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034947" comment="net-snmp-32bit less than 5.4.1-19.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034948" comment="net-snmp-64bit less than 5.4.1-19.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034949" comment="net-snmp-devel-64bit less than 5.4.1-19.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034950" comment="net-snmp-devel less than 5.4.1-19.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034951" comment="net-snmp less than 5.4.1-19.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034952" comment="perl-SNMP less than 5.4.1-19.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034953" comment="snmp-mibs less than 5.4.1-19.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0983</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-0983" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0983" source="CVE"/>
	<description>
	lighttpd 1.4.18, and possibly other versions before 1.5.0, does not properly calculate the size of a file descriptor array, which allows remote attackers to cause a denial of service (crash) via a large number of connections, which triggers an out-of-bounds access.
	</description>
 </metadata>
<!-- 807198b51cac8ff675e1626c5bfd8cb9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034954" comment="lighttpd-mod_cml less than 1.4.18-1.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034955" comment="lighttpd-mod_magnet less than 1.4.18-1.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034956" comment="lighttpd-mod_mysql_vhost less than 1.4.18-1.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034957" comment="lighttpd-mod_rrdtool less than 1.4.18-1.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034958" comment="lighttpd-mod_trigger_b4_dl less than 1.4.18-1.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034959" comment="lighttpd-mod_webdav less than 1.4.18-1.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034960" comment="lighttpd less than 1.4.18-1.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1066</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1066" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1066" source="CVE"/>
	<description>
	The modifier.regex_replace.php plugin in Smarty before 2.6.19, as used by Serendipity (S9Y) and other products, allows attackers to call arbitrary PHP functions via templates, related to a '\0' character in a search string.
	</description>
 </metadata>
<!-- c869ca6ab2647d6db29f95ac8de08a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034961" comment="moodle-af less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034962" comment="moodle-ar less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034963" comment="moodle-be less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034964" comment="moodle-bg less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034965" comment="moodle-bs less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034966" comment="moodle-ca less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034967" comment="moodle-cs less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034968" comment="moodle-da less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034969" comment="moodle-de less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034970" comment="moodle-de_du less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034971" comment="moodle-el less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034972" comment="moodle-es less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034973" comment="moodle-et less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034974" comment="moodle-eu less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034975" comment="moodle-fa less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034976" comment="moodle-fi less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034977" comment="moodle-fr less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034978" comment="moodle-ga less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034979" comment="moodle-gl less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034980" comment="moodle-he less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034981" comment="moodle-hi less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034982" comment="moodle-hr less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034983" comment="moodle-hu less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034984" comment="moodle-id less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034985" comment="moodle-is less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034986" comment="moodle-it less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034987" comment="moodle-ja less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034988" comment="moodle-ka less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034989" comment="moodle-km less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034990" comment="moodle-kn less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034991" comment="moodle-ko less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034992" comment="moodle-lt less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034993" comment="moodle-lv less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034994" comment="moodle-mi_tn less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034995" comment="moodle-ms less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034996" comment="moodle-nl less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034997" comment="moodle-nn less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034998" comment="moodle-no less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034999" comment="moodle-pl less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035000" comment="moodle-pt less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035001" comment="moodle-ro less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035002" comment="moodle-ru less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035003" comment="moodle-sk less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035004" comment="moodle-sl less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035005" comment="moodle-so less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035006" comment="moodle-sq less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035007" comment="moodle-sr less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035008" comment="moodle-sv less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035009" comment="moodle-th less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035010" comment="moodle-tl less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035011" comment="moodle-tr less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035012" comment="moodle-uk less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035013" comment="moodle-vi less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035014" comment="moodle-zh_cn less than 1.8.2-17.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035015" comment="moodle less than 1.8.2-17.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1070</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1070" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1070" source="CVE"/>
	<description>
	The SCTP dissector in Wireshark (formerly Ethereal) 0.99.5 through 0.99.7 allows remote attackers to cause a denial of service (crash) via a malformed packet.
	</description>
 </metadata>
<!-- 899a275bcffe343645eb5dd237bb631a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035016" comment="wireshark-devel less than 0.99.6-31.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035017" comment="wireshark less than 0.99.6-31.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1071</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1071" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1071" source="CVE"/>
	<description>
	The SNMP dissector in Wireshark (formerly Ethereal) 0.99.6 through 0.99.7 allows remote attackers to cause a denial of service (crash) via a malformed packet.
	</description>
 </metadata>
<!-- 899a275bcffe343645eb5dd237bb631a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035016" comment="wireshark-devel less than 0.99.6-31.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035017" comment="wireshark less than 0.99.6-31.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1072</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1072" source="CVE"/>
	<description>
	The TFTP dissector in Wireshark (formerly Ethereal) 0.6.0 through 0.99.7, when running on Ubuntu 7.10, allows remote attackers to cause a denial of service (crash or memory consumption) via a malformed packet, possibly related to a Cairo library bug.
	</description>
 </metadata>
<!-- 899a275bcffe343645eb5dd237bb631a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035016" comment="wireshark-devel less than 0.99.6-31.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035017" comment="wireshark less than 0.99.6-31.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1080</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1080" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1080" source="CVE"/>
	<description>
	Opera before 9.26 allows user-assisted remote attackers to read arbitrary files by tricking a user into typing the characters of the target filename into a file input.
	</description>
 </metadata>
<!-- 98ccccf4a62112cba9131015217021f0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035018" comment="opera less than 9.26-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1081</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1081" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1081" source="CVE"/>
	<description>
	Opera before 9.26 allows user-assisted remote attackers to execute arbitrary script via images that contain custom comments, which are treated as script when the user displays the image properties.
	</description>
 </metadata>
<!-- 98ccccf4a62112cba9131015217021f0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035018" comment="opera less than 9.26-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1082</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1082" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1082" source="CVE"/>
	<description>
	Opera before 9.26 allows remote attackers to "bypass sanitization filters" and conduct cross-site scripting (XSS) attacks via crafted attribute values in an XML document, which are not properly handled during DOM presentation.
	</description>
 </metadata>
<!-- 98ccccf4a62112cba9131015217021f0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035018" comment="opera less than 9.26-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1096</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1096" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1096" source="CVE"/>
	<description>
	The load_tile function in the XCF coder in coders/xcf.c in (1) ImageMagick 6.2.8-0 and (2) GraphicsMagick (aka gm) 1.1.7 allows user-assisted remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted .xcf file that triggers an out-of-bounds heap write, possibly related to the ScaleCharToQuantum function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 661a415b78f29372d73afd35cc7e7377 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035019" comment="ImageMagick-devel less than 6.3.5.10-2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035020" comment="ImageMagick-extra less than 6.3.5.10-2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035021" comment="ImageMagick less than 6.3.5.10-2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035022" comment="libMagick++-devel less than 6.3.5.10-2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035023" comment="libMagick++10 less than 6.3.5.10-2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035024" comment="libMagick10 less than 6.3.5.10-2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035025" comment="libWand10 less than 6.3.5.10-2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035026" comment="perl-PerlMagick less than 6.3.5.10-2.2"/>
		</criteria>
	</criteria>
	<!-- 96ed1ef1b937b772ab6bfe8fdb3e84bb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035027" comment="GraphicsMagick-devel less than 1.1.8-20.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035028" comment="GraphicsMagick less than 1.1.8-20.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035029" comment="libGraphicsMagick++-devel less than 1.1.8-20.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035030" comment="libGraphicsMagick++1 less than 1.1.8-20.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035031" comment="libGraphicsMagick1 less than 1.1.8-20.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035032" comment="libGraphicsMagickWand0 less than 1.1.8-20.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035033" comment="perl-GraphicsMagick less than 1.1.8-20.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1097</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1097" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1097" source="CVE"/>
	<description>
	Heap-based buffer overflow in the ReadPCXImage function in the PCX coder in coders/pcx.c in (1) ImageMagick 6.2.4-5 and 6.2.8-0 and (2) GraphicsMagick (aka gm) 1.1.7 allows user-assisted remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted .pcx file that triggers incorrect memory allocation for the scanline array, leading to memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 661a415b78f29372d73afd35cc7e7377 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035019" comment="ImageMagick-devel less than 6.3.5.10-2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035020" comment="ImageMagick-extra less than 6.3.5.10-2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035021" comment="ImageMagick less than 6.3.5.10-2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035022" comment="libMagick++-devel less than 6.3.5.10-2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035023" comment="libMagick++10 less than 6.3.5.10-2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035024" comment="libMagick10 less than 6.3.5.10-2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035025" comment="libWand10 less than 6.3.5.10-2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035026" comment="perl-PerlMagick less than 6.3.5.10-2.2"/>
		</criteria>
	</criteria>
	<!-- 96ed1ef1b937b772ab6bfe8fdb3e84bb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035027" comment="GraphicsMagick-devel less than 1.1.8-20.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035028" comment="GraphicsMagick less than 1.1.8-20.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035029" comment="libGraphicsMagick++-devel less than 1.1.8-20.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035030" comment="libGraphicsMagick++1 less than 1.1.8-20.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035031" comment="libGraphicsMagick1 less than 1.1.8-20.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035032" comment="libGraphicsMagickWand0 less than 1.1.8-20.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035033" comment="perl-GraphicsMagick less than 1.1.8-20.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1100</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1100" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1100" source="CVE"/>
	<description>
	Buffer overflow in the cli_scanpe function in libclamav (libclamav/pe.c) for ClamAV 0.92 and 0.92.1 allows remote attackers to execute arbitrary code via a crafted Upack PE file.
	</description>
 </metadata>
<!-- ff03f9aef2831b62e43a820d6cf02519 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034692" comment="clamav-db less than 0.93-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034693" comment="clamav less than 0.93-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1105</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1105" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1105" source="CVE"/>
	<description>
	Heap-based buffer overflow in the receive_smb_raw function in util/sock.c in Samba 3.0.0 through 3.0.29 allows remote attackers to execute arbitrary code via a crafted SMB response.
	</description>
 </metadata>
<!-- 5cca1d3789ec2462e2a4a9344dd530e0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035034" comment="cifs-mount less than 3.0.26a-3.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035035" comment="ldapsmb less than 1.34b-110.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035036" comment="libmsrpc-devel less than 3.0.26a-3.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035037" comment="libmsrpc less than 3.0.26a-3.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035038" comment="libsmbclient-32bit less than 3.0.26a-3.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035039" comment="libsmbclient-64bit less than 3.0.26a-3.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035040" comment="libsmbclient-devel less than 3.0.26a-3.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035041" comment="libsmbclient less than 3.0.26a-3.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035042" comment="libsmbsharemodes-devel less than 3.0.26a-3.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035043" comment="libsmbsharemodes less than 3.0.26a-3.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035044" comment="samba-32bit less than 3.0.26a-3.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035045" comment="samba-64bit less than 3.0.26a-3.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035046" comment="samba-client-32bit less than 3.0.26a-3.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035047" comment="samba-client-64bit less than 3.0.26a-3.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035048" comment="samba-client less than 3.0.26a-3.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035049" comment="samba-devel less than 3.0.26a-3.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035050" comment="samba-krb-printing less than 3.0.26a-3.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035051" comment="samba-python less than 3.0.26a-3.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035052" comment="samba-vscan less than 0.3.6b-181.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035053" comment="samba-winbind-32bit less than 3.0.26a-3.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035054" comment="samba-winbind-64bit less than 3.0.26a-3.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035055" comment="samba-winbind less than 3.0.26a-3.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035056" comment="samba less than 3.0.26a-3.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1108</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1108" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1108" source="CVE"/>
	<description>
	Buffer overflow in Evolution 2.22.1, when the ITip Formatter plugin is disabled, allows remote attackers to execute arbitrary code via a long timezone string in an iCalendar attachment.
	</description>
 </metadata>
<!-- f49898a4b07394548c53fdf795154405 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035057" comment="evolution-devel less than 2.12.0-5.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035058" comment="evolution-pilot less than 2.12.0-5.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035059" comment="evolution less than 2.12.0-5.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1109</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1109" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1109" source="CVE"/>
	<description>
	Heap-based buffer overflow in Evolution 2.22.1 allows user-assisted remote attackers to execute arbitrary code via a long DESCRIPTION property in an iCalendar attachment, which is not properly handled during a reply in the calendar view (aka the Calendars window).
	</description>
 </metadata>
<!-- f49898a4b07394548c53fdf795154405 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035057" comment="evolution-devel less than 2.12.0-5.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035058" comment="evolution-pilot less than 2.12.0-5.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035059" comment="evolution less than 2.12.0-5.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1111</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1111" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1111" source="CVE"/>
	<description>
	mod_cgi in lighttpd 1.4.18 sends the source code of CGI scripts instead of a 500 error when a fork failure occurs, which might allow remote attackers to obtain sensitive information.
	</description>
 </metadata>
<!-- 807198b51cac8ff675e1626c5bfd8cb9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034954" comment="lighttpd-mod_cml less than 1.4.18-1.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034955" comment="lighttpd-mod_magnet less than 1.4.18-1.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034956" comment="lighttpd-mod_mysql_vhost less than 1.4.18-1.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034957" comment="lighttpd-mod_rrdtool less than 1.4.18-1.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034958" comment="lighttpd-mod_trigger_b4_dl less than 1.4.18-1.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034959" comment="lighttpd-mod_webdav less than 1.4.18-1.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034960" comment="lighttpd less than 1.4.18-1.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1142</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1142" source="CVE"/>
	<description>
	rxvt 2.6.4 opens a terminal window on :0 if the DISPLAY environment variable is not set, which might allow local users to hijack X11 connections.  NOTE: it was later reported that rxvt-unicode, mrxvt, aterm, multi-aterm, and wterm are also affected.  NOTE: realistic attack scenarios require that the victim enters a command on the wrong machine.
	</description>
 </metadata>
<!-- 8bf75a0d68acecd2887398f1ed38be88 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035060" comment="rxvt-unicode less than 8.3-16.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1145</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1145" source="CVE"/>
	<description>
	Directory traversal vulnerability in WEBrick in Ruby 1.8 before 1.8.5-p115 and 1.8.6-p114, and 1.9 through 1.9.0-1, when running on systems that support backslash (\) path separators or case-insensitive file names, allows remote attackers to access arbitrary files via (1) "..%5c" (encoded backslash) sequences or (2) filenames that match patterns in the :NondisclosureName option.
	</description>
 </metadata>
<!-- 8e2d9589bcc85d88502a19667437e254 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035061" comment="ruby-devel less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035062" comment="ruby-doc-html less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035063" comment="ruby-doc-ri less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035064" comment="ruby-examples less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035065" comment="ruby-test-suite less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035066" comment="ruby-tk less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035067" comment="ruby less than 1.8.6.p36-20.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1149</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1149" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1149" source="CVE"/>
	<description>
	phpMyAdmin before 2.11.5 accesses $_REQUEST to obtain some parameters instead of $_GET and $_POST, which allows attackers in the same domain to override certain variables and conduct SQL injection and Cross-Site Request Forgery (CSRF) attacks by using crafted cookies.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 210bef7353b9649fc050be76231b51bf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035068" comment="phpMyAdmin less than 2.11.9-0.1"/>
	</criteria>
	<!-- 73adad68b37fe8bb88a7a57d6f7234c4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035069" comment="phpMyAdmin less than 2.11.9.4-0.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1167</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1167" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1167" source="CVE"/>
	<description>
	Stack-based buffer overflow in the useragent function in useragent.c in Squid Analysis Report Generator (Sarg) 2.2.3.1 allows remote attackers to execute arbitrary code via a long Squid proxy server User-Agent header.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 0471e0794e2c5250961aece3383ce818 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035070" comment="sarg less than 2.2.3.1-39.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1168</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1168" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1168" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Squid Analysis Report Generator (Sarg) 2.2.3.1 allows remote attackers to inject arbitrary web script or HTML via the User-Agent header, which is not properly handled when displaying the Squid proxy log.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
	</description>
 </metadata>
<!-- 0471e0794e2c5250961aece3383ce818 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035070" comment="sarg less than 2.2.3.1-39.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1185</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1185" source="CVE"/>
	<description>
	Unspecified vulnerability in the Virtual Machine for Sun Java Runtime Environment (JRE) and JDK 6 Update 4 and earlier, 5.0 Update 14 and earlier, and SDK/JRE 1.4.2_16 and earlier allows remote attackers to gain privileges via an untrusted application or applet, a different issue than CVE-2008-1186, aka "the first issue."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1715d56279830bcf301fcb8ac1809e81 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035071" comment="java-1_6_0-sun-alsa less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035072" comment="java-1_6_0-sun-demo less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035073" comment="java-1_6_0-sun-devel less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035074" comment="java-1_6_0-sun-jdbc less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035075" comment="java-1_6_0-sun-plugin less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035076" comment="java-1_6_0-sun less than 1.6.0.u5-0.1"/>
		</criteria>
	</criteria>
	<!-- f7102b47ce4bb241c3132b3647d5d4db -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035077" comment="java-1_5_0-sun-alsa less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035078" comment="java-1_5_0-sun-demo less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035079" comment="java-1_5_0-sun-devel less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035080" comment="java-1_5_0-sun-jdbc less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035081" comment="java-1_5_0-sun-plugin less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035082" comment="java-1_5_0-sun-src less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035083" comment="java-1_5_0-sun less than 1.5.0_update15-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1186</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1186" source="CVE"/>
	<description>
	Unspecified vulnerability in the Virtual Machine for Sun Java Runtime Environment (JRE) and JDK 5.0 Update 13 and earlier, and SDK/JRE 1.4.2_16 and earlier, allows remote attackers to gain privileges via an untrusted application or applet, a different issue than CVE-2008-1185, aka "the second issue."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1715d56279830bcf301fcb8ac1809e81 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035071" comment="java-1_6_0-sun-alsa less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035072" comment="java-1_6_0-sun-demo less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035073" comment="java-1_6_0-sun-devel less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035074" comment="java-1_6_0-sun-jdbc less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035075" comment="java-1_6_0-sun-plugin less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035076" comment="java-1_6_0-sun less than 1.6.0.u5-0.1"/>
		</criteria>
	</criteria>
	<!-- f7102b47ce4bb241c3132b3647d5d4db -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035077" comment="java-1_5_0-sun-alsa less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035078" comment="java-1_5_0-sun-demo less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035079" comment="java-1_5_0-sun-devel less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035080" comment="java-1_5_0-sun-jdbc less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035081" comment="java-1_5_0-sun-plugin less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035082" comment="java-1_5_0-sun-src less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035083" comment="java-1_5_0-sun less than 1.5.0_update15-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1187</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1187" source="CVE"/>
	<description>
	Unspecified vulnerability in Sun Java Runtime Environment (JRE) and JDK 6 Update 4 and earlier, 5.0 Update 14 and earlier, and SDK/JRE 1.4.2_16 and earlier allows remote attackers to cause a denial of service (JRE crash) and possibly execute arbitrary code via unknown vectors related to XSLT transforms.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1715d56279830bcf301fcb8ac1809e81 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035071" comment="java-1_6_0-sun-alsa less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035072" comment="java-1_6_0-sun-demo less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035073" comment="java-1_6_0-sun-devel less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035074" comment="java-1_6_0-sun-jdbc less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035075" comment="java-1_6_0-sun-plugin less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035076" comment="java-1_6_0-sun less than 1.6.0.u5-0.1"/>
		</criteria>
	</criteria>
	<!-- f7102b47ce4bb241c3132b3647d5d4db -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035077" comment="java-1_5_0-sun-alsa less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035078" comment="java-1_5_0-sun-demo less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035079" comment="java-1_5_0-sun-devel less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035080" comment="java-1_5_0-sun-jdbc less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035081" comment="java-1_5_0-sun-plugin less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035082" comment="java-1_5_0-sun-src less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035083" comment="java-1_5_0-sun less than 1.5.0_update15-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1188</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1188" source="CVE"/>
	<description>
	Multiple buffer overflows in the useEncodingDecl function in Java Web Start in Sun JDK and JRE 6 Update 4 and earlier, and 5.0 Update 14 and earlier, allow remote attackers to execute arbitrary code via a JNLP file with (1) a long key name in the xml header or (2) a long charset value, different issues than CVE-2008-1189, aka "The first two issues."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1715d56279830bcf301fcb8ac1809e81 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035071" comment="java-1_6_0-sun-alsa less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035072" comment="java-1_6_0-sun-demo less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035073" comment="java-1_6_0-sun-devel less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035074" comment="java-1_6_0-sun-jdbc less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035075" comment="java-1_6_0-sun-plugin less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035076" comment="java-1_6_0-sun less than 1.6.0.u5-0.1"/>
		</criteria>
	</criteria>
	<!-- f7102b47ce4bb241c3132b3647d5d4db -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035077" comment="java-1_5_0-sun-alsa less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035078" comment="java-1_5_0-sun-demo less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035079" comment="java-1_5_0-sun-devel less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035080" comment="java-1_5_0-sun-jdbc less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035081" comment="java-1_5_0-sun-plugin less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035082" comment="java-1_5_0-sun-src less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035083" comment="java-1_5_0-sun less than 1.5.0_update15-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1189</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1189" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1189" source="CVE"/>
	<description>
	Buffer overflow in Java Web Start in Sun JDK and JRE 6 Update 4 and earlier, 5.0 Update 14 and earlier, and SDK/JRE 1.4.2_16 and earlier allows remote attackers to execute arbitrary code via unknown vectors, a different issue than CVE-2008-1188, aka the "third" issue.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1715d56279830bcf301fcb8ac1809e81 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035071" comment="java-1_6_0-sun-alsa less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035072" comment="java-1_6_0-sun-demo less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035073" comment="java-1_6_0-sun-devel less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035074" comment="java-1_6_0-sun-jdbc less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035075" comment="java-1_6_0-sun-plugin less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035076" comment="java-1_6_0-sun less than 1.6.0.u5-0.1"/>
		</criteria>
	</criteria>
	<!-- f7102b47ce4bb241c3132b3647d5d4db -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035077" comment="java-1_5_0-sun-alsa less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035078" comment="java-1_5_0-sun-demo less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035079" comment="java-1_5_0-sun-devel less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035080" comment="java-1_5_0-sun-jdbc less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035081" comment="java-1_5_0-sun-plugin less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035082" comment="java-1_5_0-sun-src less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035083" comment="java-1_5_0-sun less than 1.5.0_update15-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1190</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1190" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1190" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Web Start in Sun JDK and JRE 6 Update 4 and earlier, 5.0 Update 14 and earlier, and SDK/JRE 1.4.2_16 and earlier allows remote attackers to gain privileges via an untrusted application, a different issue than CVE-2008-1191, aka the "fourth" issue.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1715d56279830bcf301fcb8ac1809e81 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035071" comment="java-1_6_0-sun-alsa less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035072" comment="java-1_6_0-sun-demo less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035073" comment="java-1_6_0-sun-devel less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035074" comment="java-1_6_0-sun-jdbc less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035075" comment="java-1_6_0-sun-plugin less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035076" comment="java-1_6_0-sun less than 1.6.0.u5-0.1"/>
		</criteria>
	</criteria>
	<!-- f7102b47ce4bb241c3132b3647d5d4db -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035077" comment="java-1_5_0-sun-alsa less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035078" comment="java-1_5_0-sun-demo less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035079" comment="java-1_5_0-sun-devel less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035080" comment="java-1_5_0-sun-jdbc less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035081" comment="java-1_5_0-sun-plugin less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035082" comment="java-1_5_0-sun-src less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035083" comment="java-1_5_0-sun less than 1.5.0_update15-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1191</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1191" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Web Start in Sun JDK and JRE 6 Update 4 and earlier allows remote attackers to create arbitrary files via an untrusted application, a different issue than CVE-2008-1190, aka "The fifth issue."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1715d56279830bcf301fcb8ac1809e81 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035071" comment="java-1_6_0-sun-alsa less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035072" comment="java-1_6_0-sun-demo less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035073" comment="java-1_6_0-sun-devel less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035074" comment="java-1_6_0-sun-jdbc less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035075" comment="java-1_6_0-sun-plugin less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035076" comment="java-1_6_0-sun less than 1.6.0.u5-0.1"/>
		</criteria>
	</criteria>
	<!-- f7102b47ce4bb241c3132b3647d5d4db -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035077" comment="java-1_5_0-sun-alsa less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035078" comment="java-1_5_0-sun-demo less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035079" comment="java-1_5_0-sun-devel less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035080" comment="java-1_5_0-sun-jdbc less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035081" comment="java-1_5_0-sun-plugin less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035082" comment="java-1_5_0-sun-src less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035083" comment="java-1_5_0-sun less than 1.5.0_update15-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1192</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1192" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1192" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Plug-in for Sun JDK and JRE 6 Update 4 and earlier, and 5.0 Update 14 and earlier; and SDK and JRE 1.4.2_16 and earlier, and 1.3.1_21 and earlier; allows remote attackers to bypass the same origin policy and "execute local applications" via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1715d56279830bcf301fcb8ac1809e81 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035071" comment="java-1_6_0-sun-alsa less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035072" comment="java-1_6_0-sun-demo less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035073" comment="java-1_6_0-sun-devel less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035074" comment="java-1_6_0-sun-jdbc less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035075" comment="java-1_6_0-sun-plugin less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035076" comment="java-1_6_0-sun less than 1.6.0.u5-0.1"/>
		</criteria>
	</criteria>
	<!-- f7102b47ce4bb241c3132b3647d5d4db -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035077" comment="java-1_5_0-sun-alsa less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035078" comment="java-1_5_0-sun-demo less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035079" comment="java-1_5_0-sun-devel less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035080" comment="java-1_5_0-sun-jdbc less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035081" comment="java-1_5_0-sun-plugin less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035082" comment="java-1_5_0-sun-src less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035083" comment="java-1_5_0-sun less than 1.5.0_update15-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1193</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1193" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1193" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Runtime Environment Image Parsing Library in Sun JDK and JRE 6 Update 4 and earlier, and 5.0 Update 14 and earlier, allows remote attackers to gain privileges via an untrusted application.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1715d56279830bcf301fcb8ac1809e81 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035071" comment="java-1_6_0-sun-alsa less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035072" comment="java-1_6_0-sun-demo less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035073" comment="java-1_6_0-sun-devel less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035074" comment="java-1_6_0-sun-jdbc less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035075" comment="java-1_6_0-sun-plugin less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035076" comment="java-1_6_0-sun less than 1.6.0.u5-0.1"/>
		</criteria>
	</criteria>
	<!-- f7102b47ce4bb241c3132b3647d5d4db -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035077" comment="java-1_5_0-sun-alsa less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035078" comment="java-1_5_0-sun-demo less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035079" comment="java-1_5_0-sun-devel less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035080" comment="java-1_5_0-sun-jdbc less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035081" comment="java-1_5_0-sun-plugin less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035082" comment="java-1_5_0-sun-src less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035083" comment="java-1_5_0-sun less than 1.5.0_update15-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1194</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1194" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1194" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the color management library in Sun JDK and JRE 6 Update 4 and earlier, and 5.0 Update 14 and earlier, allows remote attackers to cause a denial of service (crash) via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1715d56279830bcf301fcb8ac1809e81 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035071" comment="java-1_6_0-sun-alsa less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035072" comment="java-1_6_0-sun-demo less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035073" comment="java-1_6_0-sun-devel less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035074" comment="java-1_6_0-sun-jdbc less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035075" comment="java-1_6_0-sun-plugin less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035076" comment="java-1_6_0-sun less than 1.6.0.u5-0.1"/>
		</criteria>
	</criteria>
	<!-- f7102b47ce4bb241c3132b3647d5d4db -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035077" comment="java-1_5_0-sun-alsa less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035078" comment="java-1_5_0-sun-demo less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035079" comment="java-1_5_0-sun-devel less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035080" comment="java-1_5_0-sun-jdbc less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035081" comment="java-1_5_0-sun-plugin less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035082" comment="java-1_5_0-sun-src less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035083" comment="java-1_5_0-sun less than 1.5.0_update15-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1195</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1195" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1195" source="CVE"/>
	<description>
	Unspecified vulnerability in Sun JDK and Java Runtime Environment (JRE) 6 Update 4 and earlier and 5.0 Update 14 and earlier; and SDK and JRE 1.4.2_16 and earlier; allows remote attackers to access arbitrary network services on the local host via unspecified vectors related to JavaScript and Java APIs.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1715d56279830bcf301fcb8ac1809e81 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035071" comment="java-1_6_0-sun-alsa less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035072" comment="java-1_6_0-sun-demo less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035073" comment="java-1_6_0-sun-devel less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035074" comment="java-1_6_0-sun-jdbc less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035075" comment="java-1_6_0-sun-plugin less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035076" comment="java-1_6_0-sun less than 1.6.0.u5-0.1"/>
		</criteria>
	</criteria>
	<!-- 974fa8c2b9c5a922e58c39ae1ce454b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034368" comment="epiphany-devel less than 2.20.0-8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034369" comment="epiphany-doc less than 2.20.0-8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034370" comment="epiphany-extensions less than 2.20.0-8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034371" comment="epiphany less than 2.20.0-8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034372" comment="mozilla-xulrunner181-32bit less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034373" comment="mozilla-xulrunner181-64bit less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034374" comment="mozilla-xulrunner181-devel less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034375" comment="mozilla-xulrunner181-l10n less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034376" comment="mozilla-xulrunner181 less than 1.8.1.13-0.1"/>
		</criteria>
	</criteria>
	<!-- ad4dd6c7b4ca468a0cd46e1ee027bec0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034377" comment="MozillaFirefox-translations less than 2.0.0.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034378" comment="MozillaFirefox less than 2.0.0.13-0.1"/>
		</criteria>
	</criteria>
	<!-- d9220bda5e78338dc7c41920e81a8586 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034379" comment="seamonkey-dom-inspector less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034380" comment="seamonkey-irc less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034381" comment="seamonkey-mail less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034382" comment="seamonkey-spellchecker less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034383" comment="seamonkey-venkman less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034384" comment="seamonkey less than 1.1.9-1.1"/>
		</criteria>
	</criteria>
	<!-- f7102b47ce4bb241c3132b3647d5d4db -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035077" comment="java-1_5_0-sun-alsa less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035078" comment="java-1_5_0-sun-demo less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035079" comment="java-1_5_0-sun-devel less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035080" comment="java-1_5_0-sun-jdbc less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035081" comment="java-1_5_0-sun-plugin less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035082" comment="java-1_5_0-sun-src less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035083" comment="java-1_5_0-sun less than 1.5.0_update15-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1196</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1196" source="CVE"/>
	<description>
	Stack-based buffer overflow in Java Web Start (javaws.exe) in Sun JDK and JRE 6 Update 4 and earlier and 5.0 Update 14 and earlier; and SDK and JRE 1.4.2_16 and earlier; allows remote attackers to execute arbitrary code via a crafted JNLP file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1715d56279830bcf301fcb8ac1809e81 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035071" comment="java-1_6_0-sun-alsa less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035072" comment="java-1_6_0-sun-demo less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035073" comment="java-1_6_0-sun-devel less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035074" comment="java-1_6_0-sun-jdbc less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035075" comment="java-1_6_0-sun-plugin less than 1.6.0.u5-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035076" comment="java-1_6_0-sun less than 1.6.0.u5-0.1"/>
		</criteria>
	</criteria>
	<!-- f7102b47ce4bb241c3132b3647d5d4db -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035077" comment="java-1_5_0-sun-alsa less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035078" comment="java-1_5_0-sun-demo less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035079" comment="java-1_5_0-sun-devel less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035080" comment="java-1_5_0-sun-jdbc less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035081" comment="java-1_5_0-sun-plugin less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035082" comment="java-1_5_0-sun-src less than 1.5.0_update15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035083" comment="java-1_5_0-sun less than 1.5.0_update15-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1199</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1199" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1199" source="CVE"/>
	<description>
	Dovecot before 1.0.11, when configured to use mail_extra_groups to allow Dovecot to create dotlocks in /var/mail, might allow local users to read sensitive mail files for other users, or modify files or directories that are writable by group, via a symlink attack.
	</description>
 </metadata>
<!-- 9cda526d2d8d02d89c0e87864b07350a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034694" comment="dovecot-devel less than 1.0.5-6.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034695" comment="dovecot less than 1.0.5-6.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1218</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1218" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1218" source="CVE"/>
	<description>
	Argument injection vulnerability in Dovecot 1.0.x before 1.0.13, and 1.1.x before 1.1.rc3, when using blocking passdbs, allows remote attackers to bypass the password check via a password containing TAB characters, which are treated as argument delimiters that enable the skip_password_check field to be specified.
	</description>
 </metadata>
<!-- 9cda526d2d8d02d89c0e87864b07350a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034694" comment="dovecot-devel less than 1.0.5-6.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034695" comment="dovecot less than 1.0.5-6.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1227</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1227" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1227" source="CVE"/>
	<description>
	Stack-based buffer overflow in the silc_fingerprint function in lib/silcutil/silcutil.c in Secure Internet Live Conferencing (SILC) Toolkit 1.1.5, and unspecified earlier versions, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via long input data.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 15154d8db891a830f8945f3ecc4f6175 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035084" comment="silc-toolkit-devel less than 1.1.2-14.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035085" comment="silc-toolkit less than 1.1.2-14.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1232</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1232" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1232" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via a crafted string that is used in the message argument to the HttpServletResponse.sendError method.
	</description>
 </metadata>
<!-- 32b7b80406da89486b8b8399787167dd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035086" comment="tomcat55-admin-webapps less than 5.5.23-113.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035087" comment="tomcat55-common-lib less than 5.5.23-113.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035088" comment="tomcat55-jasper-javadoc less than 5.5.23-113.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035089" comment="tomcat55-jasper less than 5.5.23-113.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035090" comment="tomcat55-jsp-2_0-api-javadoc less than 5.5.23-113.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035091" comment="tomcat55-jsp-2_0-api less than 5.5.23-113.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035092" comment="tomcat55-server-lib less than 5.5.23-113.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035093" comment="tomcat55-servlet-2_4-api-javadoc less than 5.5.23-113.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035094" comment="tomcat55-servlet-2_4-api less than 5.5.23-113.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035095" comment="tomcat55-webapps less than 5.5.23-113.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035096" comment="tomcat55 less than 5.5.23-113.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1233</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1233" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1233" source="CVE"/>
	<description>
	Unspecified vulnerability in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allows remote attackers to execute arbitrary code via "XPCNativeWrapper pollution."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 974fa8c2b9c5a922e58c39ae1ce454b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034368" comment="epiphany-devel less than 2.20.0-8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034369" comment="epiphany-doc less than 2.20.0-8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034370" comment="epiphany-extensions less than 2.20.0-8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034371" comment="epiphany less than 2.20.0-8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034372" comment="mozilla-xulrunner181-32bit less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034373" comment="mozilla-xulrunner181-64bit less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034374" comment="mozilla-xulrunner181-devel less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034375" comment="mozilla-xulrunner181-l10n less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034376" comment="mozilla-xulrunner181 less than 1.8.1.13-0.1"/>
		</criteria>
	</criteria>
	<!-- ad4dd6c7b4ca468a0cd46e1ee027bec0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034377" comment="MozillaFirefox-translations less than 2.0.0.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034378" comment="MozillaFirefox less than 2.0.0.13-0.1"/>
		</criteria>
	</criteria>
	<!-- d9220bda5e78338dc7c41920e81a8586 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034379" comment="seamonkey-dom-inspector less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034380" comment="seamonkey-irc less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034381" comment="seamonkey-mail less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034382" comment="seamonkey-spellchecker less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034383" comment="seamonkey-venkman less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034384" comment="seamonkey less than 1.1.9-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1234</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1234" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1234" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allows remote attackers to inject arbitrary web script or HTML via event handlers, aka "Universal XSS using event handlers."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 974fa8c2b9c5a922e58c39ae1ce454b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034368" comment="epiphany-devel less than 2.20.0-8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034369" comment="epiphany-doc less than 2.20.0-8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034370" comment="epiphany-extensions less than 2.20.0-8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034371" comment="epiphany less than 2.20.0-8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034372" comment="mozilla-xulrunner181-32bit less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034373" comment="mozilla-xulrunner181-64bit less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034374" comment="mozilla-xulrunner181-devel less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034375" comment="mozilla-xulrunner181-l10n less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034376" comment="mozilla-xulrunner181 less than 1.8.1.13-0.1"/>
		</criteria>
	</criteria>
	<!-- ad4dd6c7b4ca468a0cd46e1ee027bec0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034377" comment="MozillaFirefox-translations less than 2.0.0.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034378" comment="MozillaFirefox less than 2.0.0.13-0.1"/>
		</criteria>
	</criteria>
	<!-- d9220bda5e78338dc7c41920e81a8586 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034379" comment="seamonkey-dom-inspector less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034380" comment="seamonkey-irc less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034381" comment="seamonkey-mail less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034382" comment="seamonkey-spellchecker less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034383" comment="seamonkey-venkman less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034384" comment="seamonkey less than 1.1.9-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1235</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1235" source="CVE"/>
	<description>
	Unspecified vulnerability in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allows remote attackers to execute arbitrary code via unknown vectors that cause JavaScript to execute with the wrong principal, aka "Privilege escalation via incorrect principals."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 974fa8c2b9c5a922e58c39ae1ce454b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034368" comment="epiphany-devel less than 2.20.0-8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034369" comment="epiphany-doc less than 2.20.0-8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034370" comment="epiphany-extensions less than 2.20.0-8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034371" comment="epiphany less than 2.20.0-8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034372" comment="mozilla-xulrunner181-32bit less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034373" comment="mozilla-xulrunner181-64bit less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034374" comment="mozilla-xulrunner181-devel less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034375" comment="mozilla-xulrunner181-l10n less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034376" comment="mozilla-xulrunner181 less than 1.8.1.13-0.1"/>
		</criteria>
	</criteria>
	<!-- ad4dd6c7b4ca468a0cd46e1ee027bec0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034377" comment="MozillaFirefox-translations less than 2.0.0.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034378" comment="MozillaFirefox less than 2.0.0.13-0.1"/>
		</criteria>
	</criteria>
	<!-- d9220bda5e78338dc7c41920e81a8586 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034379" comment="seamonkey-dom-inspector less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034380" comment="seamonkey-irc less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034381" comment="seamonkey-mail less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034382" comment="seamonkey-spellchecker less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034383" comment="seamonkey-venkman less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034384" comment="seamonkey less than 1.1.9-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1236</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1236" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1236" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors related to the layout engine.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 974fa8c2b9c5a922e58c39ae1ce454b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034368" comment="epiphany-devel less than 2.20.0-8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034369" comment="epiphany-doc less than 2.20.0-8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034370" comment="epiphany-extensions less than 2.20.0-8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034371" comment="epiphany less than 2.20.0-8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034372" comment="mozilla-xulrunner181-32bit less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034373" comment="mozilla-xulrunner181-64bit less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034374" comment="mozilla-xulrunner181-devel less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034375" comment="mozilla-xulrunner181-l10n less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034376" comment="mozilla-xulrunner181 less than 1.8.1.13-0.1"/>
		</criteria>
	</criteria>
	<!-- ad4dd6c7b4ca468a0cd46e1ee027bec0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034377" comment="MozillaFirefox-translations less than 2.0.0.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034378" comment="MozillaFirefox less than 2.0.0.13-0.1"/>
		</criteria>
	</criteria>
	<!-- d9220bda5e78338dc7c41920e81a8586 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034379" comment="seamonkey-dom-inspector less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034380" comment="seamonkey-irc less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034381" comment="seamonkey-mail less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034382" comment="seamonkey-spellchecker less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034383" comment="seamonkey-venkman less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034384" comment="seamonkey less than 1.1.9-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1237</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1237" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1237" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors related to the JavaScript engine.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6db438c80b88b371b0ff9baa360f5a4c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035097" comment="MozillaFirefox-translations less than 2.0.0.14-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035098" comment="MozillaFirefox less than 2.0.0.14-0.1"/>
		</criteria>
	</criteria>
	<!-- 974fa8c2b9c5a922e58c39ae1ce454b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034368" comment="epiphany-devel less than 2.20.0-8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034369" comment="epiphany-doc less than 2.20.0-8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034370" comment="epiphany-extensions less than 2.20.0-8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034371" comment="epiphany less than 2.20.0-8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034372" comment="mozilla-xulrunner181-32bit less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034373" comment="mozilla-xulrunner181-64bit less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034374" comment="mozilla-xulrunner181-devel less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034375" comment="mozilla-xulrunner181-l10n less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034376" comment="mozilla-xulrunner181 less than 1.8.1.13-0.1"/>
		</criteria>
	</criteria>
	<!-- ad4dd6c7b4ca468a0cd46e1ee027bec0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034377" comment="MozillaFirefox-translations less than 2.0.0.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034378" comment="MozillaFirefox less than 2.0.0.13-0.1"/>
		</criteria>
	</criteria>
	<!-- d9220bda5e78338dc7c41920e81a8586 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034379" comment="seamonkey-dom-inspector less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034380" comment="seamonkey-irc less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034381" comment="seamonkey-mail less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034382" comment="seamonkey-spellchecker less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034383" comment="seamonkey-venkman less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034384" comment="seamonkey less than 1.1.9-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1238</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1238" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.13 and SeaMonkey before 1.1.9, when generating the HTTP Referer header, does not list the entire URL when it contains Basic Authentication credentials without a username, which makes it easier for remote attackers to bypass application protection mechanisms that rely on Referer headers, such as with some Cross-Site Request Forgery (CSRF) mechanisms.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 974fa8c2b9c5a922e58c39ae1ce454b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034368" comment="epiphany-devel less than 2.20.0-8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034369" comment="epiphany-doc less than 2.20.0-8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034370" comment="epiphany-extensions less than 2.20.0-8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034371" comment="epiphany less than 2.20.0-8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034372" comment="mozilla-xulrunner181-32bit less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034373" comment="mozilla-xulrunner181-64bit less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034374" comment="mozilla-xulrunner181-devel less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034375" comment="mozilla-xulrunner181-l10n less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034376" comment="mozilla-xulrunner181 less than 1.8.1.13-0.1"/>
		</criteria>
	</criteria>
	<!-- ad4dd6c7b4ca468a0cd46e1ee027bec0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034377" comment="MozillaFirefox-translations less than 2.0.0.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034378" comment="MozillaFirefox less than 2.0.0.13-0.1"/>
		</criteria>
	</criteria>
	<!-- d9220bda5e78338dc7c41920e81a8586 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034379" comment="seamonkey-dom-inspector less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034380" comment="seamonkey-irc less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034381" comment="seamonkey-mail less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034382" comment="seamonkey-spellchecker less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034383" comment="seamonkey-venkman less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034384" comment="seamonkey less than 1.1.9-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1240</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1240" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1240" source="CVE"/>
	<description>
	LiveConnect in Mozilla Firefox before 2.0.0.13 and SeaMonkey before 1.1.9 does not properly parse the content origin for jar: URIs before sending them to the Java plugin, which allows remote attackers to access arbitrary ports on the local machine.  NOTE: this is closely related to CVE-2008-1195.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 974fa8c2b9c5a922e58c39ae1ce454b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034368" comment="epiphany-devel less than 2.20.0-8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034369" comment="epiphany-doc less than 2.20.0-8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034370" comment="epiphany-extensions less than 2.20.0-8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034371" comment="epiphany less than 2.20.0-8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034372" comment="mozilla-xulrunner181-32bit less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034373" comment="mozilla-xulrunner181-64bit less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034374" comment="mozilla-xulrunner181-devel less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034375" comment="mozilla-xulrunner181-l10n less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034376" comment="mozilla-xulrunner181 less than 1.8.1.13-0.1"/>
		</criteria>
	</criteria>
	<!-- ad4dd6c7b4ca468a0cd46e1ee027bec0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034377" comment="MozillaFirefox-translations less than 2.0.0.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034378" comment="MozillaFirefox less than 2.0.0.13-0.1"/>
		</criteria>
	</criteria>
	<!-- d9220bda5e78338dc7c41920e81a8586 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034379" comment="seamonkey-dom-inspector less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034380" comment="seamonkey-irc less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034381" comment="seamonkey-mail less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034382" comment="seamonkey-spellchecker less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034383" comment="seamonkey-venkman less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034384" comment="seamonkey less than 1.1.9-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1241</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1241" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1241" source="CVE"/>
	<description>
	GUI overlay vulnerability in Mozilla Firefox before 2.0.0.13 and SeaMonkey before 1.1.9 allows remote attackers to spoof form elements and redirect user inputs via a borderless XUL pop-up window from a background tab.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 974fa8c2b9c5a922e58c39ae1ce454b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034368" comment="epiphany-devel less than 2.20.0-8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034369" comment="epiphany-doc less than 2.20.0-8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034370" comment="epiphany-extensions less than 2.20.0-8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034371" comment="epiphany less than 2.20.0-8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034372" comment="mozilla-xulrunner181-32bit less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034373" comment="mozilla-xulrunner181-64bit less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034374" comment="mozilla-xulrunner181-devel less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034375" comment="mozilla-xulrunner181-l10n less than 1.8.1.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034376" comment="mozilla-xulrunner181 less than 1.8.1.13-0.1"/>
		</criteria>
	</criteria>
	<!-- ad4dd6c7b4ca468a0cd46e1ee027bec0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034377" comment="MozillaFirefox-translations less than 2.0.0.13-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034378" comment="MozillaFirefox less than 2.0.0.13-0.1"/>
		</criteria>
	</criteria>
	<!-- d9220bda5e78338dc7c41920e81a8586 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034379" comment="seamonkey-dom-inspector less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034380" comment="seamonkey-irc less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034381" comment="seamonkey-mail less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034382" comment="seamonkey-spellchecker less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034383" comment="seamonkey-venkman less than 1.1.9-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034384" comment="seamonkey less than 1.1.9-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1270</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1270" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1270" source="CVE"/>
	<description>
	mod_userdir in lighttpd 1.4.18 and earlier, when userdir.path is not set, uses a default of $HOME, which might allow remote attackers to read arbitrary files, as demonstrated by accessing the ~nobody directory.
	</description>
 </metadata>
<!-- 807198b51cac8ff675e1626c5bfd8cb9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034954" comment="lighttpd-mod_cml less than 1.4.18-1.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034955" comment="lighttpd-mod_magnet less than 1.4.18-1.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034956" comment="lighttpd-mod_mysql_vhost less than 1.4.18-1.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034957" comment="lighttpd-mod_rrdtool less than 1.4.18-1.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034958" comment="lighttpd-mod_trigger_b4_dl less than 1.4.18-1.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034959" comment="lighttpd-mod_webdav less than 1.4.18-1.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034960" comment="lighttpd less than 1.4.18-1.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1284</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1284" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1284" source="CVE"/>
	<description>
	Directory traversal vulnerability in Horde 3.1.6, Groupware before 1.0.5, and Groupware Webmail Edition before 1.0.6, when running with certain configurations, allows remote authenticated users to read and execute arbitrary files via ".." sequences and a null byte in the theme name.
	</description>
 </metadata>
<!-- 053dcf38e8e9d6fdeeb7f45d6ec75497 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035099" comment="horde less than 3.1.4-55.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1290</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1290" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1290" source="CVE"/>
	<description>
	ViewVC before 1.0.5 includes "all-forbidden" files within search results that list CVS or Subversion (SVN) commits, which allows remote attackers to obtain sensitive information.
	</description>
 </metadata>
<!-- 3e98780dca4b5d3f502d07c3558db551 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035100" comment="viewvc less than 1.0.4-25.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1291</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1291" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1291" source="CVE"/>
	<description>
	ViewVC before 1.0.5 stores sensitive information under the web root with insufficient access control, which allows remote attackers to read files and list folders under the hidden CVSROOT folder.
	</description>
 </metadata>
<!-- 3e98780dca4b5d3f502d07c3558db551 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035100" comment="viewvc less than 1.0.4-25.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1292</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1292" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1292" source="CVE"/>
	<description>
	ViewVC before 1.0.5 provides revision metadata without properly checking whether access was intended, which allows remote attackers to obtain sensitive information by reading (1) forbidden pathnames in the revision view, (2) log history that can only be reached by traversing a forbidden object, or (3) forbidden diff view path parameters.
	</description>
 </metadata>
<!-- 3e98780dca4b5d3f502d07c3558db551 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035100" comment="viewvc less than 1.0.4-25.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1360</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1360" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1360" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Nagios before 2.11 allows remote attackers to inject arbitrary web script or HTML via unknown vectors to unspecified CGI scripts, a different issue than CVE-2007-5624.
	</description>
 </metadata>
<!-- 3a56807cb39c716cb519298b66970cc9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034509" comment="nagios-www less than 2.9-48.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034510" comment="nagios less than 2.9-48.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1367</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1367" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1367" source="CVE"/>
	<description>
	gcc 4.3.x does not generate a cld instruction while compiling functions used for string manipulation such as memcpy and memmove on x86 and i386, which can prevent the direction flag (DF) from being reset in violation of ABI conventions and cause data to be copied in the wrong direction during signal handling in the Linux kernel, which might allow context-dependent attackers to trigger memory corruption. NOTE: this issue was originally reported for CPU consumption in SBCL.
	</description>
 </metadata>
<!-- dda6610eac43b25e4baef74689c8d7c5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034654" comment="kernel-bigsmp less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034655" comment="kernel-debug less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034656" comment="kernel-default less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034657" comment="kernel-kdump less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034658" comment="kernel-ppc64 less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034659" comment="kernel-source less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034660" comment="kernel-syms less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034661" comment="kernel-xen less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034662" comment="kernel-xenpae less than 2.6.22.18-0.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1372</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1372" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1372" source="CVE"/>
	<description>
	bzlib.c in bzip2 before 1.0.5 allows user-assisted remote attackers to cause a denial of service (crash) via a crafted file that triggers a buffer over-read, as demonstrated by the PROTOS GENOME test suite for Archive Formats.
	</description>
 </metadata>
<!-- 845789df8b09692b1eaba2953e10f06a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035101" comment="bzip2-doc less than 1.0.4-42.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035102" comment="bzip2 less than 1.0.4-42.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035103" comment="libbz2-1-32bit less than 1.0.4-42.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035104" comment="libbz2-1-64bit less than 1.0.4-42.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035105" comment="libbz2-1 less than 1.0.4-42.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035106" comment="libbz2-devel less than 1.0.4-42.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1373</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1373" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1373" source="CVE"/>
	<description>
	Buffer overflow in the gif_read_lzw function in CUPS 1.3.6 allows remote attackers to have an unknown impact via a GIF file with a large code_size value, a similar issue to CVE-2006-4484.
	</description>
 </metadata>
<!-- 40e95c11d2bf2008c6700ec9264d29f6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034774" comment="cups-client less than 1.2.12-22.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034775" comment="cups-devel less than 1.2.12-22.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034776" comment="cups-libs-32bit less than 1.2.12-22.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034777" comment="cups-libs-64bit less than 1.2.12-22.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034778" comment="cups-libs less than 1.2.12-22.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034779" comment="cups less than 1.2.12-22.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1375</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1375" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1375" source="CVE"/>
	<description>
	Race condition in the directory notification subsystem (dnotify) in Linux kernel 2.6.x before 2.6.24.6, and 2.6.25 before 2.6.25.1, allows local users to cause a denial of service (OOPS) and possibly gain privileges via unspecified vectors.
	</description>
 </metadata>
<!-- dda6610eac43b25e4baef74689c8d7c5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034654" comment="kernel-bigsmp less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034655" comment="kernel-debug less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034656" comment="kernel-default less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034657" comment="kernel-kdump less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034658" comment="kernel-ppc64 less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034659" comment="kernel-source less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034660" comment="kernel-syms less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034661" comment="kernel-xen less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034662" comment="kernel-xenpae less than 2.6.22.18-0.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1377</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1377" source="CVE"/>
	<description>
	The (1) SProcRecordCreateContext and (2) SProcRecordRegisterClients functions in the Record extension and the (3) SProcSecurityGenerateAuthorization function in the Security extension in the X server 1.4 in X.Org X11R7.3 allow context-dependent attackers to execute arbitrary code via requests with crafted length values that specify an arbitrary number of bytes to be swapped on the heap, which triggers heap corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 75a32e4e4e2b032f558b96eb5c932d65 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035107" comment="xgl less than git_070104-77.6"/>
	</criteria>
	<!-- a6b6f56aefad64e254c5f20d2ba9d296 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034161" comment="xorg-x11-Xvnc less than 7.1-91.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034162" comment="xorg-x11-server-extra less than 7.2-143.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034163" comment="xorg-x11-server-sdk less than 7.2-143.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034164" comment="xorg-x11-server less than 7.2-143.13"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1379</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1379" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1379" source="CVE"/>
	<description>
	Integer overflow in the fbShmPutImage function in the MIT-SHM extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to read arbitrary process memory via crafted values for a Pixmap width and height.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 75a32e4e4e2b032f558b96eb5c932d65 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035107" comment="xgl less than git_070104-77.6"/>
	</criteria>
	<!-- a6b6f56aefad64e254c5f20d2ba9d296 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034161" comment="xorg-x11-Xvnc less than 7.1-91.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034162" comment="xorg-x11-server-extra less than 7.2-143.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034163" comment="xorg-x11-server-sdk less than 7.2-143.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034164" comment="xorg-x11-server less than 7.2-143.13"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1380</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1380" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1380" source="CVE"/>
	<description>
	The JavaScript engine in Mozilla Firefox before 2.0.0.14, Thunderbird before 2.0.0.14, and SeaMonkey before 1.1.10 allows remote attackers to cause a denial of service (garbage collector crash) and possibly have other impacts via a crafted web page.  NOTE: this is due to an incorrect fix for CVE-2008-1237.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 24a736dce3c163ecdf7f810777ba0b87 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035108" comment="epiphany-devel less than 2.20.0-8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035109" comment="epiphany-doc less than 2.20.0-8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035110" comment="epiphany-extensions less than 2.20.0-8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035111" comment="epiphany less than 2.20.0-8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035112" comment="mozilla-xulrunner181-32bit less than 1.8.1.14-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035113" comment="mozilla-xulrunner181-64bit less than 1.8.1.14-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035114" comment="mozilla-xulrunner181-devel less than 1.8.1.14-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035115" comment="mozilla-xulrunner181-l10n less than 1.8.1.14-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035116" comment="mozilla-xulrunner181 less than 1.8.1.14-0.2"/>
		</criteria>
	</criteria>
	<!-- 6db438c80b88b371b0ff9baa360f5a4c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035097" comment="MozillaFirefox-translations less than 2.0.0.14-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035098" comment="MozillaFirefox less than 2.0.0.14-0.1"/>
		</criteria>
	</criteria>
	<!-- 7822d9ed6d83495eafb25a252f669316 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035117" comment="MozillaThunderbird-translations less than 2.0.0.14-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035118" comment="MozillaThunderbird less than 2.0.0.14-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1382</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1382" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1382" source="CVE"/>
	<description>
	libpng 1.0.6 through 1.0.32, 1.2.0 through 1.2.26, and 1.4.0beta01 through 1.4.0beta19 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PNG file with zero length "unknown" chunks, which trigger an access of uninitialized memory.
	</description>
 </metadata>
<!-- 900e59676ac7750e1311c79fd1f7af15 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035119" comment="libpng-32bit less than 1.2.18-15.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035120" comment="libpng-64bit less than 1.2.18-15.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035121" comment="libpng-devel-32bit less than 1.2.18-15.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035122" comment="libpng-devel-64bit less than 1.2.18-15.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035123" comment="libpng-devel less than 1.2.18-15.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035124" comment="libpng less than 1.2.18-15.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1384</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1384" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1384" source="CVE"/>
	<description>
	Integer overflow in PHP 5.2.5 and earlier allows context-dependent attackers to cause a denial of service and possibly have unspecified other impact via a printf format parameter with a large width specifier, related to the php_sprintf_appendstring function in formatted_print.c and probably other functions for formatted strings (aka *printf functions).
	</description>
 </metadata>
<!-- 2c36f6049c8ab2264e527271912d1d90 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035125" comment="apache2-mod_php5 less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035126" comment="php5-bcmath less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035127" comment="php5-bz2 less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035128" comment="php5-calendar less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035129" comment="php5-ctype less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035130" comment="php5-curl less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035131" comment="php5-dba less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035132" comment="php5-dbase less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035133" comment="php5-devel less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035134" comment="php5-dom less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035135" comment="php5-exif less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035136" comment="php5-fastcgi less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035137" comment="php5-ftp less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035138" comment="php5-gd less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035139" comment="php5-gettext less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035140" comment="php5-gmp less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035141" comment="php5-hash less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035142" comment="php5-iconv less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035143" comment="php5-imap less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035144" comment="php5-json less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035145" comment="php5-ldap less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035146" comment="php5-mbstring less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035147" comment="php5-mcrypt less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035148" comment="php5-mhash less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035149" comment="php5-mysql less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035150" comment="php5-ncurses less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035151" comment="php5-odbc less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035152" comment="php5-openssl less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035153" comment="php5-pcntl less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035154" comment="php5-pdo less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035155" comment="php5-pear less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035156" comment="php5-pgsql less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035157" comment="php5-posix less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035158" comment="php5-pspell less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035159" comment="php5-readline less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035160" comment="php5-shmop less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035161" comment="php5-snmp less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035162" comment="php5-soap less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035163" comment="php5-sockets less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035164" comment="php5-sqlite less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035165" comment="php5-suhosin less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035166" comment="php5-sysvmsg less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035167" comment="php5-sysvsem less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035168" comment="php5-sysvshm less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035169" comment="php5-tidy less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035170" comment="php5-tokenizer less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035171" comment="php5-wddx less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035172" comment="php5-xmlreader less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035173" comment="php5-xmlrpc less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035174" comment="php5-xmlwriter less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035175" comment="php5-xsl less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035176" comment="php5-zip less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035177" comment="php5-zlib less than 5.2.6-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1387</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1387" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1387" source="CVE"/>
	<description>
	ClamAV before 0.93 allows remote attackers to cause a denial of service (CPU consumption) via a crafted ARJ archive, as demonstrated by the PROTOS GENOME test suite for Archive Formats.
	</description>
 </metadata>
<!-- ff03f9aef2831b62e43a820d6cf02519 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034692" comment="clamav-db less than 0.93-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034693" comment="clamav less than 0.93-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1389</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1389" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1389" source="CVE"/>
	<description>
	libclamav/chmunpack.c in the chm-parser in ClamAV before 0.94 allows remote attackers to cause a denial of service (application crash) via a malformed CHM file, related to an "invalid memory access."
	</description>
 </metadata>
<!-- 52c9d8c4668a4786035121ed839b40aa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035178" comment="clamav-db less than 0.94-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033770" comment="clamav less than 0.94-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1419</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1419" source="CVE"/>
	<description>
	Xiph.org libvorbis 1.2.0 and earlier does not properly handle a zero value for codebook.dim, which allows remote attackers to cause a denial of service (crash or infinite loop) or trigger an integer overflow.
	</description>
 </metadata>
<!-- 13500b866bb97a3f03480e68c5406b49 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035179" comment="libvorbis-32bit less than 1.2.0-11.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035180" comment="libvorbis-64bit less than 1.2.0-11.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035181" comment="libvorbis-devel less than 1.2.0-11.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035182" comment="libvorbis-doc less than 1.2.0-11.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035183" comment="libvorbis less than 1.2.0-11.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1420</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1420" source="CVE"/>
	<description>
	Integer overflow in residue partition value (aka partvals) evaluation in Xiph.org libvorbis 1.2.0 and earlier allows remote attackers to execute arbitrary code via a crafted OGG file, which triggers a heap overflow.
	</description>
 </metadata>
<!-- 13500b866bb97a3f03480e68c5406b49 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035179" comment="libvorbis-32bit less than 1.2.0-11.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035180" comment="libvorbis-64bit less than 1.2.0-11.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035181" comment="libvorbis-devel less than 1.2.0-11.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035182" comment="libvorbis-doc less than 1.2.0-11.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035183" comment="libvorbis less than 1.2.0-11.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1423</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1423" source="CVE"/>
	<description>
	Integer overflow in a certain quantvals and quantlist calculation in Xiph.org libvorbis 1.2.0 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted OGG file with a large virtual space for its codebook, which triggers a heap overflow.
	</description>
 </metadata>
<!-- 13500b866bb97a3f03480e68c5406b49 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035179" comment="libvorbis-32bit less than 1.2.0-11.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035180" comment="libvorbis-64bit less than 1.2.0-11.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035181" comment="libvorbis-devel less than 1.2.0-11.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035182" comment="libvorbis-doc less than 1.2.0-11.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035183" comment="libvorbis less than 1.2.0-11.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1447</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447" source="CVE"/>
	<description>
	The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0751f29b41ad4aa88d3d283b72aca89d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035184" comment="bind-chrootenv less than 9.4.1.P1-12.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035185" comment="bind-devel-64bit less than 9.4.1.P1-12.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035186" comment="bind-devel less than 9.4.1.P1-12.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035187" comment="bind-doc less than 9.4.1.P1-12.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035188" comment="bind-libs-32bit less than 9.4.1.P1-12.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035189" comment="bind-libs-64bit less than 9.4.1.P1-12.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035190" comment="bind-libs less than 9.4.1.P1-12.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035191" comment="bind-utils less than 9.4.1.P1-12.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035192" comment="bind less than 9.4.1.P1-12.5"/>
		</criteria>
	</criteria>
	<!-- 3ea73f18ea8e55bcc2626bbf75feb4ad -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035193" comment="dnsmasq less than 2.45-0.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1468</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1468" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1468" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in namazu.cgi in Namazu before 2.0.18 allows remote attackers to inject arbitrary web script or HTML via UTF-7 encoded input, related to failure to set the charset, a different vector than CVE-2004-1318 and CVE-2001-1350. NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- e04c326193460a44f9943e087f044694 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035194" comment="namazu-cgi less than 2.0.18-24.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035195" comment="namazu-devel less than 2.0.18-24.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035196" comment="namazu less than 2.0.18-24.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1482</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1482" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1482" source="CVE"/>
	<description>
	Multiple integer overflows in xine-lib 1.1.11 and earlier allow remote attackers to trigger heap-based buffer overflows and possibly execute arbitrary code via (1) a crafted .FLV file, which triggers an overflow in demuxers/demux_flv.c; (2) a crafted .MOV file, which triggers an overflow in demuxers/demux_qt.c; (3) a crafted .RM file, which triggers an overflow in demuxers/demux_real.c; (4) a crafted .MVE file, which triggers an overflow in demuxers/demux_wc3movie.c; (5) a crafted .MKV file, which triggers an overflow in demuxers/ebml.c; or (6) a crafted .CAK file, which triggers an overflow in demuxers/demux_film.c.
	</description>
 </metadata>
<!-- efac2f190600fb5f3b729d7b86cf58fa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035197" comment="xine-devel less than 1.1.8-14.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035198" comment="xine-extra less than 1.1.8-14.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035199" comment="xine-lib-32bit less than 1.1.8-14.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035200" comment="xine-lib-64bit less than 1.1.8-14.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035201" comment="xine-lib less than 1.1.8-14.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035202" comment="xine-ui less than 0.99.5-62.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1483</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1483" source="CVE"/>
	<description>
	OpenSSH 4.3p2, and probably other versions, allows local users to hijack forwarded X connections by causing ssh to set DISPLAY to :10, even when another process is listening on the associated port, as demonstrated by opening TCP port 6010 (IPv4) and sniffing a cookie sent by Emacs.
	</description>
 </metadata>
<!-- 90f94006762e9327d42eb5e9236da67a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035203" comment="openssh-askpass less than 4.6p1-58.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035204" comment="openssh less than 4.6p1-58.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1502</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1502" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1502" source="CVE"/>
	<description>
	The _bad_protocol_once function in phpgwapi/inc/class.kses.inc.php in KSES, as used in eGroupWare before 1.4.003, Moodle before 1.8.5, and other products, allows remote attackers to bypass HTML filtering and conduct cross-site scripting (XSS) attacks via a string containing crafted URL protocols.
	</description>
 </metadata>
<!-- ce76c562de6267f6fff1db814d14daac -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035205" comment="moodle-af less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035206" comment="moodle-ar less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035207" comment="moodle-be less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035208" comment="moodle-bg less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035209" comment="moodle-bs less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035210" comment="moodle-ca less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035211" comment="moodle-cs less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035212" comment="moodle-da less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035213" comment="moodle-de less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035214" comment="moodle-de_du less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035215" comment="moodle-el less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035216" comment="moodle-es less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035217" comment="moodle-et less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035218" comment="moodle-eu less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035219" comment="moodle-fa less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035220" comment="moodle-fi less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035221" comment="moodle-fr less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035222" comment="moodle-ga less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035223" comment="moodle-gl less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035224" comment="moodle-he less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035225" comment="moodle-hi less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035226" comment="moodle-hr less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035227" comment="moodle-hu less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035228" comment="moodle-id less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035229" comment="moodle-is less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035230" comment="moodle-it less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035231" comment="moodle-ja less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035232" comment="moodle-ka less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035233" comment="moodle-km less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035234" comment="moodle-kn less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035235" comment="moodle-ko less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035236" comment="moodle-lt less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035237" comment="moodle-lv less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035238" comment="moodle-mi_tn less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035239" comment="moodle-ms less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035240" comment="moodle-nl less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035241" comment="moodle-nn less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035242" comment="moodle-no less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035243" comment="moodle-pl less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035244" comment="moodle-pt less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035245" comment="moodle-ro less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035246" comment="moodle-ru less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035247" comment="moodle-sk less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035248" comment="moodle-sl less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035249" comment="moodle-so less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035250" comment="moodle-sq less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035251" comment="moodle-sr less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035252" comment="moodle-sv less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035253" comment="moodle-th less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035254" comment="moodle-tl less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035255" comment="moodle-tr less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035256" comment="moodle-uk less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035257" comment="moodle-vi less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035258" comment="moodle-zh_cn less than 1.8.2-17.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035259" comment="moodle less than 1.8.2-17.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1515</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1515" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1515" source="CVE"/>
	<description>
	The SOAP interface in OTRS 2.1.x before 2.1.8 and 2.2.x before 2.2.6 allows remote attackers to "read and modify objects" via SOAP requests, related to "Missing security checks."
	</description>
 </metadata>
<!-- ae2035e52e50fd126241d163039bf35b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035260" comment="otrs less than 2.1.7-39.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1531</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1531" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1531" source="CVE"/>
	<description>
	The connection_state_machine function (connections.c) in lighttpd 1.4.19 and earlier, and 1.5.x before 1.5.0, allows remote attackers to cause a denial of service (active SSL connection loss) by triggering an SSL error, such as disconnecting before a download has finished, which causes all active SSL connections to be lost.
	</description>
 </metadata>
<!-- f91284cb6a42a0b1f5805f78e00213b3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035261" comment="lighttpd-mod_cml less than 1.4.18-1.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035262" comment="lighttpd-mod_magnet less than 1.4.18-1.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035263" comment="lighttpd-mod_mysql_vhost less than 1.4.18-1.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035264" comment="lighttpd-mod_rrdtool less than 1.4.18-1.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035265" comment="lighttpd-mod_trigger_b4_dl less than 1.4.18-1.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035266" comment="lighttpd-mod_webdav less than 1.4.18-1.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035267" comment="lighttpd less than 1.4.18-1.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1552</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1552" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1552" source="CVE"/>
	<description>
	The silc_pkcs1_decode function in the silccrypt library (silcpkcs1.c) in Secure Internet Live Conferencing (SILC) Toolkit before 1.1.7, SILC Client before 1.1.4, and SILC Server before 1.1.2 allows remote attackers to execute arbitrary code via a crafted PKCS#1 message, which triggers an integer underflow, signedness error, and a buffer overflow.  NOTE: the researcher describes this as an integer overflow, but CVE uses the "underflow" term in cases of wraparound from unsigned subtraction.
	</description>
 </metadata>
<!-- 1b9fa8a81c0a3b66a9ef6fb4ecb7897d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035268" comment="silc-toolkit-devel less than 1.1.2-14.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035269" comment="silc-toolkit less than 1.1.2-14.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1561</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1561" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1561" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Wireshark (formerly Ethereal) 0.99.5 through 0.99.8 allow remote attackers to cause a denial of service (application crash) via a malformed packet to the (1) X.509sat or (2) Roofnet dissectors.  NOTE: Vector 2 might also lead to a hang.
	</description>
 </metadata>
<!-- 9bdc4d9b11c3e9ba26a0ba41ef6fe34d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035270" comment="wireshark-devel less than 0.99.6-31.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035271" comment="wireshark less than 0.99.6-31.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1562</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1562" source="CVE"/>
	<description>
	The LDAP dissector in Wireshark (formerly Ethereal) 0.99.2 through 0.99.8 allows remote attackers to cause a denial of service (application crash) via a malformed packet, a different vulnerability than CVE-2006-5740.
	</description>
 </metadata>
<!-- 9bdc4d9b11c3e9ba26a0ba41ef6fe34d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035270" comment="wireshark-devel less than 0.99.6-31.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035271" comment="wireshark less than 0.99.6-31.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1563</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1563" source="CVE"/>
	<description>
	The "decode as" feature in packet-bssap.c in the SCCP dissector in Wireshark (formerly Ethereal) 0.99.6 through 0.99.8 allows remote attackers to cause a denial of service (application crash) via a malformed packet.
	</description>
 </metadata>
<!-- 9bdc4d9b11c3e9ba26a0ba41ef6fe34d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035270" comment="wireshark-devel less than 0.99.6-31.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035271" comment="wireshark less than 0.99.6-31.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1567</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1567" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1567" source="CVE"/>
	<description>
	phpMyAdmin before 2.11.5.1 stores the MySQL (1) username and (2) password, and the (3) Blowfish secret key, in cleartext in a Session file under /tmp, which allows local users to obtain sensitive information.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 210bef7353b9649fc050be76231b51bf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035068" comment="phpMyAdmin less than 2.11.9-0.1"/>
	</criteria>
	<!-- 73adad68b37fe8bb88a7a57d6f7234c4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035069" comment="phpMyAdmin less than 2.11.9.4-0.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1586</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1586" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1586" source="CVE"/>
	<description>
	ImageIO in Apple iPhone OS 1.0 through 2.1 and iPhone OS for iPod touch 1.1 through 2.1 allow remote attackers to cause a denial of service (memory consumption and device reset) via a crafted TIFF image.
	</description>
 </metadata>
<!-- fd6a7b1f51e96a87a0d34df3c4f6f410 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035272" comment="libtiff-devel-32bit less than 3.8.2-68.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035273" comment="libtiff-devel-64bit less than 3.8.2-68.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035274" comment="libtiff-devel less than 3.8.2-68.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035275" comment="libtiff3-32bit less than 3.8.2-68.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035276" comment="libtiff3-64bit less than 3.8.2-68.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035277" comment="libtiff3 less than 3.8.2-68.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035278" comment="tiff less than 3.8.2-68.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1612</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1612" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1612" source="CVE"/>
	<description>
	The arrayShrink function (lib/Array.c) in Squid 2.6.STABLE17 allows attackers to cause a denial of service (process exit) via unknown vectors that cause an array to shrink to 0 entries, which triggers an assert error.  NOTE: this issue is due to an incorrect fix for CVE-2007-6239.
	</description>
 </metadata>
<!-- e090a7f9d4955679952e01a06f5f6c3c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035279" comment="squid less than 2.6.STABLE14-23.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1615</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1615" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1615" source="CVE"/>
	<description>
	Linux kernel 2.6.18, and possibly other versions, when running on AMD64 architectures, allows local users to cause a denial of service (crash) via certain ptrace calls.
	</description>
 </metadata>
<!-- dda6610eac43b25e4baef74689c8d7c5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034654" comment="kernel-bigsmp less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034655" comment="kernel-debug less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034656" comment="kernel-default less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034657" comment="kernel-kdump less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034658" comment="kernel-ppc64 less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034659" comment="kernel-source less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034660" comment="kernel-syms less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034661" comment="kernel-xen less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034662" comment="kernel-xenpae less than 2.6.22.18-0.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1628</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1628" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1628" source="CVE"/>
	<description>
	Stack-based buffer overflow in the audit_log_user_command function in lib/audit_logging.c in Linux Audit before 1.7 might allow remote attackers to execute arbitrary code via a long command argument. NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- b9e72984f8a36ba5c8a49ca35d1f3b19 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035280" comment="audit-devel less than 1.5.5-13.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035281" comment="audit-libs-32bit less than 1.5.5-13.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035282" comment="audit-libs-64bit less than 1.5.5-13.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035283" comment="audit-libs-python less than 1.5.5-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035284" comment="audit-libs less than 1.5.5-13.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035285" comment="audit less than 1.5.5-13.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1637</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1637" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1637" source="CVE"/>
	<description>
	PowerDNS Recursor before 3.1.5 uses insufficient randomness to calculate (1) TRXID values and (2) UDP source port numbers, which makes it easier for remote attackers to poison a DNS cache, related to (a) algorithmic deficiencies in rand and random functions in external libraries, (b) use of a 32-bit seed value, and (c) choice of the time of day as the sole seeding information.
	</description>
 </metadata>
<!-- 91c6f5be6b51e62cd7a6b5b127b6492b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035286" comment="pdns-recursor less than 3.1.4-58.3"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1654</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1654" source="CVE"/>
	<description>
	Interaction error between Adobe Flash and multiple Universal Plug and Play (UPnP) services allow remote attackers to perform Cross-Site Request Forgery (CSRF) style attacks by using the Flash navigateToURL function to send a SOAP message to a UPnP control point, as demonstrated by changing the primary DNS server.
	</description>
 </metadata>
<!-- 140c8f76fc987fafe79a6a7581620944 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031150" comment="flash-player less than 9.0.124.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1655</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1655" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1655" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player 9.0.115.0 and earlier, and 8.0.39.0 and earlier, makes it easier for remote attackers to conduct DNS rebinding attacks via unknown vectors.
	</description>
 </metadata>
<!-- 140c8f76fc987fafe79a6a7581620944 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031150" comment="flash-player less than 9.0.124.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1657</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1657" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1657" source="CVE"/>
	<description>
	OpenSSH 4.4 up to versions before 4.9 allows remote authenticated users to bypass the sshd_config ForceCommand directive by modifying the .ssh/rc session file.
	</description>
 </metadata>
<!-- 90f94006762e9327d42eb5e9236da67a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035203" comment="openssh-askpass less than 4.6p1-58.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035204" comment="openssh less than 4.6p1-58.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1669</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1669" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1669" source="CVE"/>
	<description>
	Linux kernel before 2.6.25.2 does not apply a certain protection mechanism for fcntl functionality, which allows local users to (1) execute code in parallel or (2) exploit a race condition to obtain "re-ordered access to the descriptor table."
	</description>
 </metadata>
<!-- dda6610eac43b25e4baef74689c8d7c5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034654" comment="kernel-bigsmp less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034655" comment="kernel-debug less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034656" comment="kernel-default less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034657" comment="kernel-kdump less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034658" comment="kernel-ppc64 less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034659" comment="kernel-source less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034660" comment="kernel-syms less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034661" comment="kernel-xen less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034662" comment="kernel-xenpae less than 2.6.22.18-0.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1670</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1670" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1670" source="CVE"/>
	<description>
	Heap-based buffer overflow in the progressive PNG Image loader (decoders/pngloader.cpp) in KHTML in KDE 4.0.x up to 4.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted image.
	</description>
 </metadata>
<!-- e55e402f654b5f19e3f2c0f1e0b07632 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035287" comment="kdelibs4-core less than 3.93.0.svn712047-6.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035288" comment="kdelibs4-doc less than 3.93.0.svn712047-6.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035289" comment="kdelibs4 less than 3.93.0.svn712047-6.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035290" comment="libkde4-32bit less than 3.93.0.svn712047-6.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035291" comment="libkde4-64bit less than 3.93.0.svn712047-6.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035292" comment="libkde4-devel less than 3.93.0.svn712047-6.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035293" comment="libkde4 less than 3.93.0.svn712047-6.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035294" comment="libkdecore4-32bit less than 3.93.0.svn712047-6.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035295" comment="libkdecore4-64bit less than 3.93.0.svn712047-6.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035296" comment="libkdecore4-devel less than 3.93.0.svn712047-6.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035297" comment="libkdecore4 less than 3.93.0.svn712047-6.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1671</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1671" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1671" source="CVE"/>
	<description>
	start_kdeinit in KDE 3.5.5 through 3.5.9, when installed setuid root, allows local users to cause a denial of service and possibly execute arbitrary code via "user-influenceable input" (probably command-line arguments) that cause start_kdeinit to send SIGUSR1 signals to other processes.
	</description>
 </metadata>
<!-- efb4d466a39b102aa2a614e94a88f41d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035298" comment="kdelibs3-32bit less than 3.5.7-72.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035299" comment="kdelibs3-64bit less than 3.5.7-72.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035300" comment="kdelibs3-arts-32bit less than 3.5.7-72.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035301" comment="kdelibs3-arts-64bit less than 3.5.7-72.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035302" comment="kdelibs3-arts less than 3.5.7-72.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035303" comment="kdelibs3-default-style-32bit less than 3.5.7-72.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035304" comment="kdelibs3-default-style-64bit less than 3.5.7-72.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035305" comment="kdelibs3-default-style less than 3.5.7-72.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035306" comment="kdelibs3-devel less than 3.5.7-72.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035307" comment="kdelibs3-doc less than 3.5.7-72.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035308" comment="kdelibs3 less than 3.5.7-72.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1673</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1673" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1673" source="CVE"/>
	<description>
	The asn1 implementation in (a) the Linux kernel 2.4 before 2.4.36.6 and 2.6 before 2.6.25.5, as used in the cifs and ip_nat_snmp_basic modules; and (b) the gxsnmp package; does not properly validate length values during decoding of ASN.1 BER data, which allows remote attackers to cause a denial of service (crash) or execute arbitrary code via (1) a length greater than the working buffer, which can lead to an unspecified overflow; (2) an oid length of zero, which can lead to an off-by-one error; or (3) an indefinite length for a primitive encoding.
	</description>
 </metadata>
<!-- 3837c2df513f0088f0fdd19fc0db5adc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034714" comment="kernel-bigsmp less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034715" comment="kernel-debug less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034716" comment="kernel-default less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034717" comment="kernel-kdump less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034718" comment="kernel-ppc64 less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034719" comment="kernel-source less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034720" comment="kernel-syms less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034721" comment="kernel-xen less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034722" comment="kernel-xenpae less than 2.6.22.19-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1678</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1678" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1678" source="CVE"/>
	<description>
	Memory leak in the zlib_stateful_init function in crypto/comp/c_zlib.c in libssl in OpenSSL 0.9.8f through 0.9.8h allows remote attackers to cause a denial of service (memory consumption) via multiple calls, as demonstrated by initial SSL client handshakes to the Apache HTTP Server mod_ssl that specify a compression algorithm.
	</description>
 </metadata>
<!-- 4a87d325376f89ec79eb900ebffe9dcd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034679" comment="apache2-devel less than 2.2.4-70.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034680" comment="apache2-doc less than 2.2.4-70.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034681" comment="apache2-example-pages less than 2.2.4-70.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034682" comment="apache2-prefork less than 2.2.4-70.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034683" comment="apache2-utils less than 2.2.4-70.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034684" comment="apache2-worker less than 2.2.4-70.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034685" comment="apache2 less than 2.2.4-70.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1679</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1679" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1679" source="CVE"/>
	<description>
	Multiple integer overflows in imageop.c in Python before 2.5.3 allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted images that trigger heap-based buffer overflows.  NOTE: this issue is due to an incomplete fix for CVE-2007-4965.
	</description>
 </metadata>
<!-- c8b656554bbd35c8bfbd98a7d349cf23 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035309" comment="python-32bit less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035310" comment="python-64bit less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035311" comment="python-curses less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035312" comment="python-demo less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035313" comment="python-devel less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035314" comment="python-gdbm less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035315" comment="python-idle less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035316" comment="python-tk less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035317" comment="python-xml less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035318" comment="python less than 2.5.1-39.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1686</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1686" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1686" source="CVE"/>
	<description>
	Array index vulnerability in Speex 1.1.12 and earlier, as used in libfishsound 0.9.0 and earlier, including Illiminable DirectShow Filters and Annodex Plugins for Firefox, xine-lib before 1.1.12, and many other products, allows remote attackers to execute arbitrary code via a header structure containing a negative offset, which is used to dereference a function pointer.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4ecdeebb3533538d5f55b11e3898c4e2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035319" comment="vorbis-tools less than 1.1.1-112.2"/>
	</criteria>
	<!-- ae15639a84132604f76d900c3cb5d114 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035320" comment="gstreamer010-plugins-good-doc less than 0.10.6-41.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035321" comment="gstreamer010-plugins-good-extra less than 0.10.6-41.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035322" comment="gstreamer010-plugins-good less than 0.10.6-41.2"/>
		</criteria>
	</criteria>
	<!-- b1eacb216fc1ea87bdd7d36a11a2cf77 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035323" comment="xine-devel less than 1.1.8-14.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035324" comment="xine-extra less than 1.1.8-14.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035325" comment="xine-lib-32bit less than 1.1.8-14.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035326" comment="xine-lib-64bit less than 1.1.8-14.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035327" comment="xine-lib less than 1.1.8-14.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035328" comment="xine-ui less than 0.99.5-62.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1693</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1693" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1693" source="CVE"/>
	<description>
	The CairoFont::create function in CairoFontEngine.cc in Poppler, possibly before 0.8.0, as used in Xpdf, Evince, ePDFview, KWord, and other applications, does not properly handle embedded fonts in PDF files, which allows remote attackers to execute arbitrary code via a crafted font object, related to dereferencing a function pointer associated with the type of this font object.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a613bbd2feea00637e2980c57234bfca -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035329" comment="cups-client less than 1.2.12-22.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035330" comment="cups-devel less than 1.2.12-22.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035331" comment="cups-libs-32bit less than 1.2.12-22.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035332" comment="cups-libs-64bit less than 1.2.12-22.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035333" comment="cups-libs less than 1.2.12-22.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035334" comment="cups less than 1.2.12-22.15"/>
		</criteria>
	</criteria>
	<!-- caccb63f25b1b4ca52ab1bc7d6362cf9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035335" comment="poppler-devel less than 0.5.4-101.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035336" comment="poppler-doc less than 0.5.4-101.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035337" comment="poppler-glib less than 0.5.4-101.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035338" comment="poppler-qt4 less than 0.5.4-101.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035339" comment="poppler-qt less than 0.5.4-101.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035340" comment="poppler-tools less than 0.5.4-101.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035341" comment="poppler less than 0.5.4-101.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1720</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1720" source="CVE"/>
	<description>
	Buffer overflow in rsync 2.6.9 to 3.0.1, with extended attribute (xattr) support enabled, might allow remote attackers to execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- a0282a5790142cca3fed04872e7e183c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035342" comment="rsync less than 2.6.9-55.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1722</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1722" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1722" source="CVE"/>
	<description>
	Multiple integer overflows in (1) filter/image-png.c and (2) filter/image-zoom.c in CUPS 1.3 allow attackers to cause a denial of service (crash) and trigger memory corruption, as demonstrated via a crafted PNG image.
	</description>
 </metadata>
<!-- a613bbd2feea00637e2980c57234bfca -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035329" comment="cups-client less than 1.2.12-22.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035330" comment="cups-devel less than 1.2.12-22.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035331" comment="cups-libs-32bit less than 1.2.12-22.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035332" comment="cups-libs-64bit less than 1.2.12-22.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035333" comment="cups-libs less than 1.2.12-22.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035334" comment="cups less than 1.2.12-22.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1761</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1761" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1761" source="CVE"/>
	<description>
	Opera before 9.27 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted newsfeed source, which triggers an invalid memory access.
	</description>
 </metadata>
<!-- 9e934fe8f90d458740da270ed3dbc56a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035343" comment="opera less than 9.27-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1762</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1762" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1762" source="CVE"/>
	<description>
	Opera before 9.27 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted scaled image pattern in an HTML CANVAS element, which triggers memory corruption.
	</description>
 </metadata>
<!-- 9e934fe8f90d458740da270ed3dbc56a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035343" comment="opera less than 9.27-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1767</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1767" source="CVE"/>
	<description>
	Buffer overflow in pattern.c in libxslt before 1.1.24 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XSL style sheet file with a long XSLT "transformation match" condition that triggers a large number of steps.
	</description>
 </metadata>
<!-- 4217664d46f2b4c739c4fb5f6450b2da -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035344" comment="libxslt-32bit less than 1.1.20-41.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035345" comment="libxslt-64bit less than 1.1.20-41.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035346" comment="libxslt-devel-32bit less than 1.1.20-41.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035347" comment="libxslt-devel-64bit less than 1.1.20-41.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035348" comment="libxslt-devel less than 1.1.20-41.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035349" comment="libxslt less than 1.1.20-41.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1801</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1801" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1801" source="CVE"/>
	<description>
	Integer underflow in the iso_recv_msg function (iso.c) in rdesktop 1.5.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Remote Desktop Protocol (RDP) request with a small length field.
	</description>
 </metadata>
<!-- b4ffc88003e3df67328113a1d3132ba5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035350" comment="rdesktop less than 1.5.0-79.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1802</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1802" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1802" source="CVE"/>
	<description>
	Buffer overflow in the process_redirect_pdu (rdp.c) function in rdesktop 1.5.0 allows remote attackers to execute arbitrary code via a Remote Desktop Protocol (RDP) redirect request with modified length fields.
	</description>
 </metadata>
<!-- b4ffc88003e3df67328113a1d3132ba5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035350" comment="rdesktop less than 1.5.0-79.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1803</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1803" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1803" source="CVE"/>
	<description>
	Integer signedness error in the xrealloc function (rdesktop.c) in RDesktop 1.5.0 allows remote attackers to execute arbitrary code via unknown parameters that trigger a heap-based overflow.  NOTE: the role of the channel_process function was not specified by the original researcher.
	</description>
 </metadata>
<!-- b4ffc88003e3df67328113a1d3132ba5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035350" comment="rdesktop less than 1.5.0-79.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1806</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1806" source="CVE"/>
	<description>
	Integer overflow in FreeType2 before 2.3.6 allows context-dependent attackers to execute arbitrary code via a crafted set of 16-bit length values within the Private dictionary table in a Printer Font Binary (PFB) file, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 4864dc5c6464cc9fbcb74c6d0e0a933a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035351" comment="freetype2-32bit less than 2.3.5-18.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035352" comment="freetype2-64bit less than 2.3.5-18.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035353" comment="freetype2-devel-32bit less than 2.3.5-18.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035354" comment="freetype2-devel-64bit less than 2.3.5-18.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035355" comment="freetype2-devel less than 2.3.5-18.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035356" comment="freetype2 less than 2.3.5-18.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1807</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1807" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1807" source="CVE"/>
	<description>
	FreeType2 before 2.3.6 allow context-dependent attackers to execute arbitrary code via an invalid "number of axes" field in a Printer Font Binary (PFB) file, which triggers a free of arbitrary memory locations, leading to memory corruption.
	</description>
 </metadata>
<!-- 4864dc5c6464cc9fbcb74c6d0e0a933a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035351" comment="freetype2-32bit less than 2.3.5-18.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035352" comment="freetype2-64bit less than 2.3.5-18.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035353" comment="freetype2-devel-32bit less than 2.3.5-18.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035354" comment="freetype2-devel-64bit less than 2.3.5-18.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035355" comment="freetype2-devel less than 2.3.5-18.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035356" comment="freetype2 less than 2.3.5-18.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1808</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1808" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1808" source="CVE"/>
	<description>
	Multiple off-by-one errors in FreeType2 before 2.3.6 allow context-dependent attackers to execute arbitrary code via (1) a crafted table in a Printer Font Binary (PFB) file or (2) a crafted SHC instruction in a TrueType Font (TTF) file, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 4864dc5c6464cc9fbcb74c6d0e0a933a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035351" comment="freetype2-32bit less than 2.3.5-18.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035352" comment="freetype2-64bit less than 2.3.5-18.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035353" comment="freetype2-devel-32bit less than 2.3.5-18.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035354" comment="freetype2-devel-64bit less than 2.3.5-18.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035355" comment="freetype2-devel less than 2.3.5-18.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035356" comment="freetype2 less than 2.3.5-18.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1833</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1833" source="CVE"/>
	<description>
	Heap-based buffer overflow in pe.c in libclamav in ClamAV 0.92.1 allows remote attackers to execute arbitrary code via a crafted WWPack compressed PE binary.
	</description>
 </metadata>
<!-- ff03f9aef2831b62e43a820d6cf02519 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034692" comment="clamav-db less than 0.93-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034693" comment="clamav less than 0.93-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1835</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1835" source="CVE"/>
	<description>
	ClamAV before 0.93 allows remote attackers to bypass the scanning enging via a RAR file with an invalid version number, which cannot be parsed by ClamAV but can be extracted by Winrar.
	</description>
 </metadata>
<!-- ff03f9aef2831b62e43a820d6cf02519 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034692" comment="clamav-db less than 0.93-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034693" comment="clamav less than 0.93-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1836</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1836" source="CVE"/>
	<description>
	The rfc2231 function in message.c in libclamav in ClamAV before 0.93 allows remote attackers to cause a denial of service (crash) via a crafted message that produces a string that is not null terminated, which triggers a buffer over-read.
	</description>
 </metadata>
<!-- ff03f9aef2831b62e43a820d6cf02519 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034692" comment="clamav-db less than 0.93-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034693" comment="clamav less than 0.93-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1837</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1837" source="CVE"/>
	<description>
	libclamunrar in ClamAV before 0.93 allows remote attackers to cause a denial of service (crash) via crafted RAR files that trigger "memory problems," as demonstrated by the PROTOS GENOME test suite for Archive Formats.
	</description>
 </metadata>
<!-- ff03f9aef2831b62e43a820d6cf02519 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034692" comment="clamav-db less than 0.93-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034693" comment="clamav less than 0.93-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1878</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1878" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1878" source="CVE"/>
	<description>
	Stack-based buffer overflow in the demux_nsf_send_chunk function in src/demuxers/demux_nsf.c in xine-lib 1.1.12 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long NSF title.
	</description>
 </metadata>
<!-- b1eacb216fc1ea87bdd7d36a11a2cf77 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035323" comment="xine-devel less than 1.1.8-14.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035324" comment="xine-extra less than 1.1.8-14.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035325" comment="xine-lib-32bit less than 1.1.8-14.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035326" comment="xine-lib-64bit less than 1.1.8-14.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035327" comment="xine-lib less than 1.1.8-14.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035328" comment="xine-ui less than 0.99.5-62.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1887</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1887" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1887" source="CVE"/>
	<description>
	Python 2.5.2 and earlier allows context-dependent attackers to execute arbitrary code via multiple vectors that cause a negative size value to be provided to the PyString_FromStringAndSize function, which allocates less memory than expected when assert() is disabled and triggers a buffer overflow.
	</description>
 </metadata>
<!-- c8b656554bbd35c8bfbd98a7d349cf23 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035309" comment="python-32bit less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035310" comment="python-64bit less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035311" comment="python-curses less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035312" comment="python-demo less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035313" comment="python-devel less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035314" comment="python-gdbm less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035315" comment="python-idle less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035316" comment="python-tk less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035317" comment="python-xml less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035318" comment="python less than 2.5.1-39.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1891</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1891" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1891" source="CVE"/>
	<description>
	Directory traversal vulnerability in WEBrick in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2, when using NTFS or FAT filesystems, allows remote attackers to read arbitrary CGI files via a trailing (1) + (plus), (2) %2b (encoded plus), (3) . (dot), (4) %2e (encoded dot), or (5) %20 (encoded space) character in the URI, possibly related to the WEBrick::HTTPServlet::FileHandler and WEBrick::HTTPServer.new functionality and the :DocumentRoot option.
	</description>
 </metadata>
<!-- 8e2d9589bcc85d88502a19667437e254 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035061" comment="ruby-devel less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035062" comment="ruby-doc-html less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035063" comment="ruby-doc-ri less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035064" comment="ruby-examples less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035065" comment="ruby-test-suite less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035066" comment="ruby-tk less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035067" comment="ruby less than 1.8.6.p36-20.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1922</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1922" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1922" source="CVE"/>
	<description>
	Multiple stack-based buffer overflows in Sarg might allow attackers to execute arbitrary code via unknown vectors, probably a crafted Squid log file.
	</description>
 </metadata>
<!-- 176c1a376734fbb5b35ee3898f0538c1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035357" comment="sarg less than 2.2.3.1-39.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1924</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1924" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1924" source="CVE"/>
	<description>
	Unspecified vulnerability in phpMyAdmin before 2.11.5.2, when running on shared hosts, allows remote authenticated users with CREATE table permissions to read arbitrary files via a crafted HTTP POST request, related to use of an undefined UploadDir variable.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 210bef7353b9649fc050be76231b51bf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035068" comment="phpMyAdmin less than 2.11.9-0.1"/>
	</criteria>
	<!-- 73adad68b37fe8bb88a7a57d6f7234c4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035069" comment="phpMyAdmin less than 2.11.9.4-0.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1927</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1927" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1927" source="CVE"/>
	<description>
	Double free vulnerability in Perl 5.8.8 allows context-dependent attackers to cause a denial of service (memory corruption and crash) via a crafted regular expression containing UTF8 characters.  NOTE: this issue might only be present on certain operating systems.
	</description>
 </metadata>
<!-- bac707c25cbb462255a9c49e1d11ffeb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035358" comment="perl-32bit less than 5.8.8-76.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035359" comment="perl-64bit less than 5.8.8-76.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035360" comment="perl-base less than 5.8.8-76.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035361" comment="perl less than 5.8.8-76.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1945</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1945" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1945" source="CVE"/>
	<description>
	QEMU 0.9.0 does not properly handle changes to removable media, which allows guest OS users to read arbitrary files on the host OS by using the diskformat: parameter in the -usbdevice option to modify the disk-image header to identify a different format, a related issue to CVE-2008-2004.
	</description>
 </metadata>
<!-- 0e2b33e755c079848c85abff921e8caa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034945" comment="qemu less than 0.10.1-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1947</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1947" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1947" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Apache Tomcat 5.5.9 through 5.5.26 and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via the name parameter (aka the hostname attribute) to host-manager/html/add.
	</description>
 </metadata>
<!-- 40ea82815f8299453a7e930b03ea640a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035362" comment="tomcat55-admin-webapps less than 5.5.23-113.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035363" comment="tomcat55-common-lib less than 5.5.23-113.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035364" comment="tomcat55-jasper-javadoc less than 5.5.23-113.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035365" comment="tomcat55-jasper less than 5.5.23-113.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035366" comment="tomcat55-jsp-2_0-api-javadoc less than 5.5.23-113.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035367" comment="tomcat55-jsp-2_0-api less than 5.5.23-113.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035368" comment="tomcat55-server-lib less than 5.5.23-113.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035369" comment="tomcat55-servlet-2_4-api-javadoc less than 5.5.23-113.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035370" comment="tomcat55-servlet-2_4-api less than 5.5.23-113.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035371" comment="tomcat55-webapps less than 5.5.23-113.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035372" comment="tomcat55 less than 5.5.23-113.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1948</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1948" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1948" source="CVE"/>
	<description>
	The _gnutls_server_name_recv_params function in lib/ext_server_name.c in libgnutls in gnutls-serv in GnuTLS before 2.2.4 does not properly calculate the number of Server Names in a TLS 1.0 Client Hello message during extension handling, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a zero value for the length of Server Names, which leads to a buffer overflow in session resumption data in the pack_security_parameters function, aka GNUTLS-SA-2008-1-1.
	</description>
 </metadata>
<!-- b5f41eb3ee195f78c46b95dfa96fd450 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035373" comment="gnutls-32bit less than 1.6.1-36.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035374" comment="gnutls-64bit less than 1.6.1-36.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035375" comment="gnutls-devel-32bit less than 1.6.1-36.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035376" comment="gnutls-devel-64bit less than 1.6.1-36.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035377" comment="gnutls-devel less than 1.6.1-36.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035378" comment="gnutls less than 1.6.1-36.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1949</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1949" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1949" source="CVE"/>
	<description>
	The _gnutls_recv_client_kx_message function in lib/gnutls_kx.c in libgnutls in gnutls-serv in GnuTLS before 2.2.4 continues to process Client Hello messages within a TLS message after one has already been processed, which allows remote attackers to cause a denial of service (NULL dereference and crash) via a TLS message containing multiple Client Hello messages, aka GNUTLS-SA-2008-1-2.
	</description>
 </metadata>
<!-- b5f41eb3ee195f78c46b95dfa96fd450 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035373" comment="gnutls-32bit less than 1.6.1-36.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035374" comment="gnutls-64bit less than 1.6.1-36.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035375" comment="gnutls-devel-32bit less than 1.6.1-36.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035376" comment="gnutls-devel-64bit less than 1.6.1-36.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035377" comment="gnutls-devel less than 1.6.1-36.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035378" comment="gnutls less than 1.6.1-36.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1950</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1950" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1950" source="CVE"/>
	<description>
	Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record with an invalid Record Length, which leads to an invalid cipher padding length, aka GNUTLS-SA-2008-1-3.
	</description>
 </metadata>
<!-- b5f41eb3ee195f78c46b95dfa96fd450 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035373" comment="gnutls-32bit less than 1.6.1-36.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035374" comment="gnutls-64bit less than 1.6.1-36.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035375" comment="gnutls-devel-32bit less than 1.6.1-36.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035376" comment="gnutls-devel-64bit less than 1.6.1-36.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035377" comment="gnutls-devel less than 1.6.1-36.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035378" comment="gnutls less than 1.6.1-36.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1996</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-1996" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1996" source="CVE"/>
	<description>
	licq before 1.3.6 allows remote attackers to cause a denial of service (file-descriptor exhaustion and application crash) via a large number of connections.
	</description>
 </metadata>
<!-- 74a6a4e144f72c189092afab9ac69dc5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035379" comment="licq-icqnd less than 1.3.4-125.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035380" comment="licq less than 1.3.4-125.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2004</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2004" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2004" source="CVE"/>
	<description>
	The drive_init function in QEMU 0.9.1 determines the format of a raw disk image based on the header, which allows local guest users to read arbitrary files on the host by modifying the header to identify a different format, which is used when the guest is restarted.
	</description>
 </metadata>
<!-- ee6e543fa7beaea81e6e0aecd278d7c2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035381" comment="qemu less than 0.9.0.cvs-35.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2025</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2025" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2025" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Apache Struts before 1.2.9-162.31.1 on SUSE Linux Enterprise (SLE) 11, before 1.2.9-108.2 on SUSE openSUSE 10.3, before 1.2.9-198.2 on SUSE openSUSE 11.0, and before 1.2.9-162.163.2 on SUSE openSUSE 11.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to "insufficient quoting of parameters."
	</description>
 </metadata>
<!-- c682b5327539dc71ac6da407e2a329a6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035382" comment="struts-javadoc less than 1.2.9-108.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035383" comment="struts-manual less than 1.2.9-108.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035384" comment="struts-webapps-tomcat5 less than 1.2.9-108.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035385" comment="struts less than 1.2.9-108.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2050</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2050" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2050" source="CVE"/>
	<description>
	Stack-based buffer overflow in the FastCGI SAPI (fastcgi.c) in PHP before 5.2.6 has unknown impact and attack vectors.
	</description>
 </metadata>
<!-- 2c36f6049c8ab2264e527271912d1d90 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035125" comment="apache2-mod_php5 less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035126" comment="php5-bcmath less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035127" comment="php5-bz2 less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035128" comment="php5-calendar less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035129" comment="php5-ctype less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035130" comment="php5-curl less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035131" comment="php5-dba less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035132" comment="php5-dbase less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035133" comment="php5-devel less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035134" comment="php5-dom less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035135" comment="php5-exif less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035136" comment="php5-fastcgi less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035137" comment="php5-ftp less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035138" comment="php5-gd less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035139" comment="php5-gettext less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035140" comment="php5-gmp less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035141" comment="php5-hash less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035142" comment="php5-iconv less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035143" comment="php5-imap less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035144" comment="php5-json less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035145" comment="php5-ldap less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035146" comment="php5-mbstring less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035147" comment="php5-mcrypt less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035148" comment="php5-mhash less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035149" comment="php5-mysql less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035150" comment="php5-ncurses less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035151" comment="php5-odbc less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035152" comment="php5-openssl less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035153" comment="php5-pcntl less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035154" comment="php5-pdo less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035155" comment="php5-pear less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035156" comment="php5-pgsql less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035157" comment="php5-posix less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035158" comment="php5-pspell less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035159" comment="php5-readline less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035160" comment="php5-shmop less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035161" comment="php5-snmp less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035162" comment="php5-soap less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035163" comment="php5-sockets less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035164" comment="php5-sqlite less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035165" comment="php5-suhosin less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035166" comment="php5-sysvmsg less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035167" comment="php5-sysvsem less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035168" comment="php5-sysvshm less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035169" comment="php5-tidy less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035170" comment="php5-tokenizer less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035171" comment="php5-wddx less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035172" comment="php5-xmlreader less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035173" comment="php5-xmlrpc less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035174" comment="php5-xmlwriter less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035175" comment="php5-xsl less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035176" comment="php5-zip less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035177" comment="php5-zlib less than 5.2.6-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2051</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2051" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2051" source="CVE"/>
	<description>
	The escapeshellcmd API function in PHP before 5.2.6 has unknown impact and context-dependent attack vectors related to "incomplete multibyte chars."
	</description>
 </metadata>
<!-- 2c36f6049c8ab2264e527271912d1d90 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035125" comment="apache2-mod_php5 less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035126" comment="php5-bcmath less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035127" comment="php5-bz2 less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035128" comment="php5-calendar less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035129" comment="php5-ctype less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035130" comment="php5-curl less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035131" comment="php5-dba less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035132" comment="php5-dbase less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035133" comment="php5-devel less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035134" comment="php5-dom less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035135" comment="php5-exif less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035136" comment="php5-fastcgi less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035137" comment="php5-ftp less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035138" comment="php5-gd less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035139" comment="php5-gettext less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035140" comment="php5-gmp less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035141" comment="php5-hash less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035142" comment="php5-iconv less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035143" comment="php5-imap less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035144" comment="php5-json less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035145" comment="php5-ldap less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035146" comment="php5-mbstring less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035147" comment="php5-mcrypt less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035148" comment="php5-mhash less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035149" comment="php5-mysql less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035150" comment="php5-ncurses less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035151" comment="php5-odbc less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035152" comment="php5-openssl less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035153" comment="php5-pcntl less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035154" comment="php5-pdo less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035155" comment="php5-pear less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035156" comment="php5-pgsql less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035157" comment="php5-posix less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035158" comment="php5-pspell less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035159" comment="php5-readline less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035160" comment="php5-shmop less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035161" comment="php5-snmp less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035162" comment="php5-soap less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035163" comment="php5-sockets less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035164" comment="php5-sqlite less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035165" comment="php5-suhosin less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035166" comment="php5-sysvmsg less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035167" comment="php5-sysvsem less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035168" comment="php5-sysvshm less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035169" comment="php5-tidy less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035170" comment="php5-tokenizer less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035171" comment="php5-wddx less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035172" comment="php5-xmlreader less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035173" comment="php5-xmlrpc less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035174" comment="php5-xmlwriter less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035175" comment="php5-xsl less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035176" comment="php5-zip less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035177" comment="php5-zlib less than 5.2.6-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2079</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2079" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2079" source="CVE"/>
	<description>
	MySQL 4.1.x before 4.1.24, 5.0.x before 5.0.60, 5.1.x before 5.1.24, and 6.0.x before 6.0.5 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are within the MySQL home data directory, which can point to tables that are created in the future.
	</description>
 </metadata>
<!-- c4b7968ba8262091c58a73fdf922c22a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034054" comment="libmysqlclient-devel less than 5.0.45-22.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034055" comment="libmysqlclient15-32bit less than 5.0.45-22.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034056" comment="libmysqlclient15-64bit less than 5.0.45-22.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034057" comment="libmysqlclient15 less than 5.0.45-22.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034058" comment="libmysqlclient_r15-32bit less than 5.0.45-22.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034059" comment="libmysqlclient_r15-64bit less than 5.0.45-22.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034060" comment="libmysqlclient_r15 less than 5.0.45-22.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034061" comment="mysql-Max less than 5.0.45-22.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034062" comment="mysql-bench less than 5.0.45-22.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034063" comment="mysql-client less than 5.0.45-22.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034064" comment="mysql-debug less than 5.0.45-22.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034065" comment="mysql-tools less than 5.0.45-22.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034066" comment="mysql less than 5.0.45-22.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2086</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2086" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2086" source="CVE"/>
	<description>
	Sun Java Web Start and Java Plug-in for JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allow remote attackers to execute arbitrary code via a crafted jnlp file that modifies the (1) java.home, (2) java.ext.dirs, or (3) user.home System Properties, aka "Java Web Start File Inclusion" and CR 6694892.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035386" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035387" comment="java-1_5_0-sun-demo less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035388" comment="java-1_5_0-sun-devel less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035389" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035390" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035391" comment="java-1_5_0-sun-src less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035392" comment="java-1_5_0-sun less than 1.5.0_update17-0.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035393" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035394" comment="java-1_6_0-sun-demo less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035395" comment="java-1_6_0-sun-devel less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035396" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035397" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035398" comment="java-1_6_0-sun less than 1.6.0.u11-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2097</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2097" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2097" source="CVE"/>
	<description>
	Buffer overflow in the openwsman management service in VMware ESXi 3.5 and ESX 3.5 allows remote authenticated users to gain privileges via an "invalid Content-Length."
	</description>
 </metadata>
<!-- 35c553eb971e5818b4f55fc7e52738be -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035399" comment="openwsman-client less than 1.2.0-14.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035400" comment="openwsman-devel less than 1.2.0-14.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035401" comment="openwsman-server less than 1.2.0-14.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035402" comment="openwsman less than 1.2.0-14.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2107</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2107" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2107" source="CVE"/>
	<description>
	The GENERATE_SEED macro in PHP 4.x before 4.4.8 and 5.x before 5.2.5, when running on 32-bit systems, performs a multiplication using values that can produce a zero seed in rare circumstances, which allows context-dependent attackers to predict subsequent values of the rand and mt_rand functions and possibly bypass protection mechanisms that rely on an unknown initial seed.
	</description>
 </metadata>
<!-- 2c36f6049c8ab2264e527271912d1d90 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035125" comment="apache2-mod_php5 less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035126" comment="php5-bcmath less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035127" comment="php5-bz2 less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035128" comment="php5-calendar less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035129" comment="php5-ctype less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035130" comment="php5-curl less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035131" comment="php5-dba less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035132" comment="php5-dbase less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035133" comment="php5-devel less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035134" comment="php5-dom less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035135" comment="php5-exif less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035136" comment="php5-fastcgi less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035137" comment="php5-ftp less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035138" comment="php5-gd less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035139" comment="php5-gettext less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035140" comment="php5-gmp less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035141" comment="php5-hash less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035142" comment="php5-iconv less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035143" comment="php5-imap less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035144" comment="php5-json less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035145" comment="php5-ldap less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035146" comment="php5-mbstring less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035147" comment="php5-mcrypt less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035148" comment="php5-mhash less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035149" comment="php5-mysql less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035150" comment="php5-ncurses less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035151" comment="php5-odbc less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035152" comment="php5-openssl less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035153" comment="php5-pcntl less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035154" comment="php5-pdo less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035155" comment="php5-pear less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035156" comment="php5-pgsql less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035157" comment="php5-posix less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035158" comment="php5-pspell less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035159" comment="php5-readline less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035160" comment="php5-shmop less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035161" comment="php5-snmp less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035162" comment="php5-soap less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035163" comment="php5-sockets less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035164" comment="php5-sqlite less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035165" comment="php5-suhosin less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035166" comment="php5-sysvmsg less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035167" comment="php5-sysvsem less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035168" comment="php5-sysvshm less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035169" comment="php5-tidy less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035170" comment="php5-tokenizer less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035171" comment="php5-wddx less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035172" comment="php5-xmlreader less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035173" comment="php5-xmlrpc less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035174" comment="php5-xmlwriter less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035175" comment="php5-xsl less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035176" comment="php5-zip less than 5.2.6-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035177" comment="php5-zlib less than 5.2.6-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2136</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2136" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2136" source="CVE"/>
	<description>
	Memory leak in the ipip6_rcv function in net/ipv6/sit.c in the Linux kernel 2.4 before 2.4.36.5 and 2.6 before 2.6.25.3 allows remote attackers to cause a denial of service (memory consumption) via network traffic to a Simple Internet Transition (SIT) tunnel interface, related to the pskb_may_pull and kfree_skb functions, and management of an skb reference count.
	</description>
 </metadata>
<!-- dda6610eac43b25e4baef74689c8d7c5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034654" comment="kernel-bigsmp less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034655" comment="kernel-debug less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034656" comment="kernel-default less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034657" comment="kernel-kdump less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034658" comment="kernel-ppc64 less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034659" comment="kernel-source less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034660" comment="kernel-syms less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034661" comment="kernel-xen less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034662" comment="kernel-xenpae less than 2.6.22.18-0.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2142</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2142" source="CVE"/>
	<description>
	Emacs 21 and XEmacs automatically load and execute .flc (fast lock) files that are associated with other files that are edited within Emacs, which allows user-assisted attackers to execute arbitrary code.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a09d55d12562d4cc2fd6f33254990a8a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035403" comment="xemacs-packages-el less than 20070427-27.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035404" comment="xemacs-packages-info less than 20070427-27.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035405" comment="xemacs-packages less than 20070427-27.2"/>
		</criteria>
	</criteria>
	<!-- e9782167cb83afbb8920e336d928e23f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035406" comment="emacs-el less than 22.1-40.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035407" comment="emacs-info less than 22.1-40.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035408" comment="emacs-nox less than 22.1-40.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035409" comment="emacs-x11 less than 22.1-40.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035410" comment="emacs less than 22.1-40.10"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2148</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2148" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2148" source="CVE"/>
	<description>
	The utimensat system call (sys_utimensat) in Linux kernel 2.6.22 and other versions before 2.6.25.3 does not check file permissions when certain UTIME_NOW and UTIME_OMIT combinations are used, which allows local users to modify file times of arbitrary files, possibly leading to a denial of service.
	</description>
 </metadata>
<!-- dda6610eac43b25e4baef74689c8d7c5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034654" comment="kernel-bigsmp less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034655" comment="kernel-debug less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034656" comment="kernel-default less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034657" comment="kernel-kdump less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034658" comment="kernel-ppc64 less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034659" comment="kernel-source less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034660" comment="kernel-syms less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034661" comment="kernel-xen less than 2.6.22.18-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034662" comment="kernel-xenpae less than 2.6.22.18-0.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2233</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2233" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2233" source="CVE"/>
	<description>
	The client in Openwsman 1.2.0 and 2.0.0, in unknown configurations, allows remote Openwsman servers to replay SSL sessions via unspecified vectors.
	</description>
 </metadata>
<!-- d8de51a7a7bf95ef8e9ed9002c124bc5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035411" comment="openwsman-client less than 1.2.0-14.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035412" comment="openwsman-devel less than 1.2.0-14.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035413" comment="openwsman-server less than 1.2.0-14.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035414" comment="openwsman less than 1.2.0-14.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2234</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2234" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2234" source="CVE"/>
	<description>
	Multiple buffer overflows in Openwsman 1.2.0 and 2.0.0 allow remote attackers to execute arbitrary code via a crafted "Authorization: Basic" HTTP header.
	</description>
 </metadata>
<!-- d8de51a7a7bf95ef8e9ed9002c124bc5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035411" comment="openwsman-client less than 1.2.0-14.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035412" comment="openwsman-devel less than 1.2.0-14.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035413" comment="openwsman-server less than 1.2.0-14.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035414" comment="openwsman less than 1.2.0-14.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2235</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2235" source="CVE"/>
	<description>
	OpenSC before 0.11.5 uses weak permissions (ADMIN file control information of 00) for the 5015 directory on smart cards and USB crypto tokens running Siemens CardOS M4, which allows physically proximate attackers to change the PIN.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- bc585ff1ceb92bdb83ac53c4c29d5210 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035415" comment="libopensc2-32bit less than 0.11.3-21.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035416" comment="libopensc2-64bit less than 0.11.3-21.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035417" comment="libopensc2 less than 0.11.3-21.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035418" comment="opensc-32bit less than 0.11.3-21.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035419" comment="opensc-64bit less than 0.11.3-21.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035420" comment="opensc-devel less than 0.11.3-21.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035421" comment="opensc less than 0.11.3-21.2"/>
		</criteria>
	</criteria>
	<!-- c600d2f5bbb047710b6e84397c4fe84e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035422" comment="libopensc2-32bit less than 0.11.3-21.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035423" comment="libopensc2-64bit less than 0.11.3-21.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035424" comment="libopensc2 less than 0.11.3-21.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035425" comment="opensc-32bit less than 0.11.3-21.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035426" comment="opensc-64bit less than 0.11.3-21.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035427" comment="opensc-devel less than 0.11.3-21.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035428" comment="opensc less than 0.11.3-21.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2237</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2237" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2237" source="CVE"/>
	<description>
	Heap-based buffer overflow in OpenOffice.org (OOo) 2.x before 2.4.2 allows remote attackers to execute arbitrary code via a crafted WMF file associated with a StarOffice/StarSuite document.
	</description>
 </metadata>
<!-- 32c0adf7d03e6d4364b600f088248fd1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035429" comment="OpenOffice_org-af less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035430" comment="OpenOffice_org-ar less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035431" comment="OpenOffice_org-base less than 2.3.0.1.2-10.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035432" comment="OpenOffice_org-be-BY less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035433" comment="OpenOffice_org-bg less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035434" comment="OpenOffice_org-ca less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035435" comment="OpenOffice_org-calc less than 2.3.0.1.2-10.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035436" comment="OpenOffice_org-cs less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035437" comment="OpenOffice_org-cy less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035438" comment="OpenOffice_org-da less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035439" comment="OpenOffice_org-de less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035440" comment="OpenOffice_org-devel less than 2.3.0.1.2-10.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035441" comment="OpenOffice_org-draw less than 2.3.0.1.2-10.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035442" comment="OpenOffice_org-el less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035443" comment="OpenOffice_org-en-GB less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035444" comment="OpenOffice_org-es less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035445" comment="OpenOffice_org-et less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035446" comment="OpenOffice_org-fi less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035447" comment="OpenOffice_org-filters less than 2.3.0.1.2-10.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035448" comment="OpenOffice_org-fr less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035449" comment="OpenOffice_org-gnome less than 2.3.0.1.2-10.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035450" comment="OpenOffice_org-gu-IN less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035451" comment="OpenOffice_org-hi-IN less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035452" comment="OpenOffice_org-hr less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035453" comment="OpenOffice_org-hu less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035454" comment="OpenOffice_org-impress less than 2.3.0.1.2-10.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035455" comment="OpenOffice_org-it less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035456" comment="OpenOffice_org-ja less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035457" comment="OpenOffice_org-kde less than 2.3.0.1.2-10.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035458" comment="OpenOffice_org-km less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035459" comment="OpenOffice_org-ko less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035460" comment="OpenOffice_org-lt less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035461" comment="OpenOffice_org-mailmerge less than 2.3.0.1.2-10.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035462" comment="OpenOffice_org-math less than 2.3.0.1.2-10.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035463" comment="OpenOffice_org-mk less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035464" comment="OpenOffice_org-mono less than 2.3.0.1.2-10.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035465" comment="OpenOffice_org-nb less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035466" comment="OpenOffice_org-nl less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035467" comment="OpenOffice_org-nn less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035468" comment="OpenOffice_org-officebean less than 2.3.0.1.2-10.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035469" comment="OpenOffice_org-pa-IN less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035470" comment="OpenOffice_org-pl less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035471" comment="OpenOffice_org-pt-BR less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035472" comment="OpenOffice_org-pt less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035473" comment="OpenOffice_org-pyuno less than 2.3.0.1.2-10.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035474" comment="OpenOffice_org-ru less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035475" comment="OpenOffice_org-rw less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035476" comment="OpenOffice_org-sdk-doc less than 2.3.0.1.2-10.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035477" comment="OpenOffice_org-sdk less than 2.3.0.1.2-10.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035478" comment="OpenOffice_org-sk less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035479" comment="OpenOffice_org-sl less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035480" comment="OpenOffice_org-sr-CS less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035481" comment="OpenOffice_org-st less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035482" comment="OpenOffice_org-sv less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035483" comment="OpenOffice_org-testtool less than 2.3.0.1.2-10.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035484" comment="OpenOffice_org-tr less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035485" comment="OpenOffice_org-ts less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035486" comment="OpenOffice_org-vi less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035487" comment="OpenOffice_org-writer less than 2.3.0.1.2-10.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035488" comment="OpenOffice_org-xh less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035489" comment="OpenOffice_org-zh-CN less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035490" comment="OpenOffice_org-zh-TW less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035491" comment="OpenOffice_org-zu less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035492" comment="OpenOffice_org less than 2.3.0.1.2-10.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2238</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2238" source="CVE"/>
	<description>
	Multiple integer overflows in OpenOffice.org (OOo) 2.x before 2.4.2 allow remote attackers to execute arbitrary code via crafted EMR records in an EMF file associated with a StarOffice/StarSuite document, which trigger a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 32c0adf7d03e6d4364b600f088248fd1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035429" comment="OpenOffice_org-af less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035430" comment="OpenOffice_org-ar less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035431" comment="OpenOffice_org-base less than 2.3.0.1.2-10.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035432" comment="OpenOffice_org-be-BY less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035433" comment="OpenOffice_org-bg less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035434" comment="OpenOffice_org-ca less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035435" comment="OpenOffice_org-calc less than 2.3.0.1.2-10.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035436" comment="OpenOffice_org-cs less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035437" comment="OpenOffice_org-cy less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035438" comment="OpenOffice_org-da less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035439" comment="OpenOffice_org-de less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035440" comment="OpenOffice_org-devel less than 2.3.0.1.2-10.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035441" comment="OpenOffice_org-draw less than 2.3.0.1.2-10.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035442" comment="OpenOffice_org-el less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035443" comment="OpenOffice_org-en-GB less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035444" comment="OpenOffice_org-es less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035445" comment="OpenOffice_org-et less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035446" comment="OpenOffice_org-fi less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035447" comment="OpenOffice_org-filters less than 2.3.0.1.2-10.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035448" comment="OpenOffice_org-fr less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035449" comment="OpenOffice_org-gnome less than 2.3.0.1.2-10.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035450" comment="OpenOffice_org-gu-IN less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035451" comment="OpenOffice_org-hi-IN less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035452" comment="OpenOffice_org-hr less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035453" comment="OpenOffice_org-hu less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035454" comment="OpenOffice_org-impress less than 2.3.0.1.2-10.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035455" comment="OpenOffice_org-it less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035456" comment="OpenOffice_org-ja less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035457" comment="OpenOffice_org-kde less than 2.3.0.1.2-10.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035458" comment="OpenOffice_org-km less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035459" comment="OpenOffice_org-ko less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035460" comment="OpenOffice_org-lt less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035461" comment="OpenOffice_org-mailmerge less than 2.3.0.1.2-10.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035462" comment="OpenOffice_org-math less than 2.3.0.1.2-10.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035463" comment="OpenOffice_org-mk less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035464" comment="OpenOffice_org-mono less than 2.3.0.1.2-10.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035465" comment="OpenOffice_org-nb less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035466" comment="OpenOffice_org-nl less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035467" comment="OpenOffice_org-nn less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035468" comment="OpenOffice_org-officebean less than 2.3.0.1.2-10.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035469" comment="OpenOffice_org-pa-IN less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035470" comment="OpenOffice_org-pl less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035471" comment="OpenOffice_org-pt-BR less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035472" comment="OpenOffice_org-pt less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035473" comment="OpenOffice_org-pyuno less than 2.3.0.1.2-10.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035474" comment="OpenOffice_org-ru less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035475" comment="OpenOffice_org-rw less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035476" comment="OpenOffice_org-sdk-doc less than 2.3.0.1.2-10.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035477" comment="OpenOffice_org-sdk less than 2.3.0.1.2-10.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035478" comment="OpenOffice_org-sk less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035479" comment="OpenOffice_org-sl less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035480" comment="OpenOffice_org-sr-CS less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035481" comment="OpenOffice_org-st less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035482" comment="OpenOffice_org-sv less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035483" comment="OpenOffice_org-testtool less than 2.3.0.1.2-10.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035484" comment="OpenOffice_org-tr less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035485" comment="OpenOffice_org-ts less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035486" comment="OpenOffice_org-vi less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035487" comment="OpenOffice_org-writer less than 2.3.0.1.2-10.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035488" comment="OpenOffice_org-xh less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035489" comment="OpenOffice_org-zh-CN less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035490" comment="OpenOffice_org-zh-TW less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035491" comment="OpenOffice_org-zu less than 2.3.0.1.2-2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035492" comment="OpenOffice_org less than 2.3.0.1.2-10.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2292</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2292" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2292" source="CVE"/>
	<description>
	Buffer overflow in the __snprint_value function in snmp_get in Net-SNMP 5.1.4, 5.2.4, and 5.4.1, as used in SNMP.xs for Perl, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large OCTETSTRING in an attribute value pair (AVP).
	</description>
 </metadata>
<!-- 5c5533dfe70147c9aaa62dc81727e486 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034946" comment="libsnmp15 less than 5.4.1-19.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034947" comment="net-snmp-32bit less than 5.4.1-19.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034948" comment="net-snmp-64bit less than 5.4.1-19.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034949" comment="net-snmp-devel-64bit less than 5.4.1-19.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034950" comment="net-snmp-devel less than 5.4.1-19.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034951" comment="net-snmp less than 5.4.1-19.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034952" comment="perl-SNMP less than 5.4.1-19.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034953" comment="snmp-mibs less than 5.4.1-19.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2315</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2315" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2315" source="CVE"/>
	<description>
	Multiple integer overflows in Python 2.5.2 and earlier allow context-dependent attackers to have an unknown impact via vectors related to the (1) stringobject, (2) unicodeobject, (3) bufferobject, (4) longobject, (5) tupleobject, (6) stropmodule, (7) gcmodule, and (8) mmapmodule modules.  NOTE: The expandtabs integer overflows in stringobject and unicodeobject in 2.5.2 are covered by CVE-2008-5031.
	</description>
 </metadata>
<!-- c8b656554bbd35c8bfbd98a7d349cf23 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035309" comment="python-32bit less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035310" comment="python-64bit less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035311" comment="python-curses less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035312" comment="python-demo less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035313" comment="python-devel less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035314" comment="python-gdbm less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035315" comment="python-idle less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035316" comment="python-tk less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035317" comment="python-xml less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035318" comment="python less than 2.5.1-39.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2316</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2316" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2316" source="CVE"/>
	<description>
	Integer overflow in _hashopenssl.c in the hashlib module in Python 2.5.2 and earlier might allow context-dependent attackers to defeat cryptographic digests, related to "partial hashlib hashing of data exceeding 4GB."
	</description>
 </metadata>
<!-- c8b656554bbd35c8bfbd98a7d349cf23 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035309" comment="python-32bit less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035310" comment="python-64bit less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035311" comment="python-curses less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035312" comment="python-demo less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035313" comment="python-devel less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035314" comment="python-gdbm less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035315" comment="python-idle less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035316" comment="python-tk less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035317" comment="python-xml less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035318" comment="python less than 2.5.1-39.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2327</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2327" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2327" source="CVE"/>
	<description>
	Multiple buffer underflows in the (1) LZWDecode, (2) LZWDecodeCompat, and (3) LZWDecodeVector functions in tif_lzw.c in the LZW decoder in LibTIFF 3.8.2 and earlier allow context-dependent attackers to execute arbitrary code via a crafted TIFF file, related to improper handling of the CODE_CLEAR code.
	</description>
 </metadata>
<!-- 305e62b046e5a6cb3066d3b78eae5989 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035493" comment="libtiff-devel-32bit less than 3.8.2-68.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035494" comment="libtiff-devel-64bit less than 3.8.2-68.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035495" comment="libtiff-devel less than 3.8.2-68.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035496" comment="libtiff3-32bit less than 3.8.2-68.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035497" comment="libtiff3-64bit less than 3.8.2-68.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035498" comment="libtiff3 less than 3.8.2-68.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035499" comment="tiff less than 3.8.2-68.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2357</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2357" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2357" source="CVE"/>
	<description>
	Stack-based buffer overflow in the split_redraw function in split.c in mtr before 0.73, when invoked with the -p (aka --split) option, allows remote attackers to execute arbitrary code via a crafted DNS PTR record.  NOTE: it could be argued that this is a vulnerability in the ns_name_ntop function in resolv/ns_name.c in glibc and the proper fix should be in glibc; if so, then this should not be treated as a vulnerability in mtr.
	</description>
 </metadata>
<!-- d3ea2fd56121612d9aca367275808b73 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035500" comment="mtr-gtk less than 0.72-94.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035501" comment="mtr less than 0.72-94.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2360</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2360" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2360" source="CVE"/>
	<description>
	Integer overflow in the AllocateGlyph function in the Render extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to execute arbitrary code via unspecified request fields that are used to calculate a heap buffer size, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 75a32e4e4e2b032f558b96eb5c932d65 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035107" comment="xgl less than git_070104-77.6"/>
	</criteria>
	<!-- a6b6f56aefad64e254c5f20d2ba9d296 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034161" comment="xorg-x11-Xvnc less than 7.1-91.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034162" comment="xorg-x11-server-extra less than 7.2-143.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034163" comment="xorg-x11-server-sdk less than 7.2-143.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034164" comment="xorg-x11-server less than 7.2-143.13"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2361</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2361" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2361" source="CVE"/>
	<description>
	Integer overflow in the ProcRenderCreateCursor function in the Render extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to cause a denial of service (daemon crash) via unspecified request fields that are used to calculate a glyph buffer size, which triggers a dereference of unmapped memory.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 75a32e4e4e2b032f558b96eb5c932d65 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035107" comment="xgl less than git_070104-77.6"/>
	</criteria>
	<!-- a6b6f56aefad64e254c5f20d2ba9d296 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034161" comment="xorg-x11-Xvnc less than 7.1-91.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034162" comment="xorg-x11-server-extra less than 7.2-143.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034163" comment="xorg-x11-server-sdk less than 7.2-143.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034164" comment="xorg-x11-server less than 7.2-143.13"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2362</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2362" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2362" source="CVE"/>
	<description>
	Multiple integer overflows in the Render extension in the X server 1.4 in X.Org X11R7.3 allow context-dependent attackers to execute arbitrary code via a (1) SProcRenderCreateLinearGradient, (2) SProcRenderCreateRadialGradient, or (3) SProcRenderCreateConicalGradient request with an invalid field specifying the number of bytes to swap in the request data, which triggers heap memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 75a32e4e4e2b032f558b96eb5c932d65 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035107" comment="xgl less than git_070104-77.6"/>
	</criteria>
	<!-- a6b6f56aefad64e254c5f20d2ba9d296 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034161" comment="xorg-x11-Xvnc less than 7.1-91.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034162" comment="xorg-x11-server-extra less than 7.2-143.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034163" comment="xorg-x11-server-sdk less than 7.2-143.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034164" comment="xorg-x11-server less than 7.2-143.13"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2363</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2363" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2363" source="CVE"/>
	<description>
	The PartsBatch class in Pan 0.132 and earlier does not properly manage the data structures for Parts batches, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted .nzb file that triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 911614bfb4e458702f38aca7dab1c574 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035502" comment="pan less than 0.132-33.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2364</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2364" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2364" source="CVE"/>
	<description>
	The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a large number of interim responses.
	</description>
 </metadata>
<!-- 72e4d08034ac6d9ff736034c10e3a54e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035503" comment="apache2-devel less than 2.2.4-70.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035504" comment="apache2-doc less than 2.2.4-70.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035505" comment="apache2-example-pages less than 2.2.4-70.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035506" comment="apache2-prefork less than 2.2.4-70.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035507" comment="apache2-utils less than 2.2.4-70.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035508" comment="apache2-worker less than 2.2.4-70.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035509" comment="apache2 less than 2.2.4-70.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2370</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2370" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2370" source="CVE"/>
	<description>
	Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when a RequestDispatcher is used, performs path normalization before removing the query string from the URI, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a .. (dot dot) in a request parameter.
	</description>
 </metadata>
<!-- 32b7b80406da89486b8b8399787167dd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035086" comment="tomcat55-admin-webapps less than 5.5.23-113.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035087" comment="tomcat55-common-lib less than 5.5.23-113.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035088" comment="tomcat55-jasper-javadoc less than 5.5.23-113.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035089" comment="tomcat55-jasper less than 5.5.23-113.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035090" comment="tomcat55-jsp-2_0-api-javadoc less than 5.5.23-113.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035091" comment="tomcat55-jsp-2_0-api less than 5.5.23-113.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035092" comment="tomcat55-server-lib less than 5.5.23-113.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035093" comment="tomcat55-servlet-2_4-api-javadoc less than 5.5.23-113.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035094" comment="tomcat55-servlet-2_4-api less than 5.5.23-113.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035095" comment="tomcat55-webapps less than 5.5.23-113.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035096" comment="tomcat55 less than 5.5.23-113.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2371</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2371" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2371" source="CVE"/>
	<description>
	Heap-based buffer overflow in pcre_compile.c in the Perl-Compatible Regular Expression (PCRE) library 7.7 allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a regular expression that begins with an option and contains multiple branches.
	</description>
 </metadata>
<!-- 0043a7d041d83e41c8e86dce3826eb59 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035510" comment="pcre-32bit less than 7.2-14.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035511" comment="pcre-64bit less than 7.2-14.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035512" comment="pcre-devel less than 7.2-14.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035513" comment="pcre less than 7.2-14.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2374</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2374" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2374" source="CVE"/>
	<description>
	src/sdp.c in bluez-libs 3.30 in BlueZ, and other bluez-libs before 3.34 and bluez-utils before 3.34 versions, does not validate string length fields in SDP packets, which allows remote SDP servers to cause a denial of service or possibly have unspecified other impact via a crafted length field that triggers excessive memory allocation or a buffer over-read.
	</description>
 </metadata>
<!-- 6dc784ab0d16da7d3d1e152e4331e82a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035514" comment="bluez-cups less than 3.18-13.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035515" comment="bluez-libs less than 3.18-5.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035516" comment="bluez-test less than 3.18-13.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035517" comment="bluez-utils less than 3.18-13.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2379</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2379" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2379" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in SquirrelMail before 1.4.17 allows remote attackers to inject arbitrary web script or HTML via a crafted hyperlink in an HTML part of an e-mail message.
	</description>
 </metadata>
<!-- f2adc3d61b9aa9d5cdfdbd406f1153e2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035518" comment="squirrelmail less than 1.4.10a-45.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2380</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2380" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2380" source="CVE"/>
	<description>
	SQL injection vulnerability in authpgsqllib.c in Courier-Authlib before 0.62.0, when a non-Latin locale Postgres database is used, allows remote attackers to execute arbitrary SQL commands via query parameters containing apostrophes.
	</description>
 </metadata>
<!-- e2377105f5b568fc97c36d1bfcee9bef -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035519" comment="courier-authlib-devel less than 0.59.3-44.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035520" comment="courier-authlib-ldap less than 0.59.3-44.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035521" comment="courier-authlib-mysql less than 0.59.3-44.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035522" comment="courier-authlib-pgsql less than 0.59.3-44.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035523" comment="courier-authlib-pipe less than 0.59.3-44.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035524" comment="courier-authlib-userdb less than 0.59.3-44.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035525" comment="courier-authlib less than 0.59.3-44.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2382</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2382" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2382" source="CVE"/>
	<description>
	The protocol_client_msg function in vnc.c in the VNC server in (1) Qemu 0.9.1 and earlier and (2) KVM kvm-79 and earlier allows remote attackers to cause a denial of service (infinite loop) via a certain message.
	</description>
 </metadata>
<!-- 0e2b33e755c079848c85abff921e8caa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034945" comment="qemu less than 0.10.1-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2383</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2383" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2383" source="CVE"/>
	<description>
	CRLF injection vulnerability in xterm allows user-assisted attackers to execute arbitrary commands via LF (aka \n) characters surrounding a command name within a Device Control Request Status String (DECRQSS) escape sequence in a text file, a related issue to CVE-2003-0063 and CVE-2003-0071.
	</description>
 </metadata>
<!-- 8afc868e710da562541aa3e8ae475577 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035526" comment="xterm less than 229-17.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2426</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2426" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2426" source="CVE"/>
	<description>
	Multiple stack-based buffer overflows in Imlib 2 (aka imlib2) 1.4.0 allow user-assisted remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via (1) a PNM image with a crafted header, related to the load function in src/modules/loaders/loader_pnm.c; or (2) a crafted XPM image, related to the load function in src/modules/loader_xpm.c.
	</description>
 </metadata>
<!-- bcdc9d540e9f21e297939e86656e5f92 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035527" comment="imlib2-devel less than 1.3.0-66.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035528" comment="imlib2-filters less than 1.3.0-66.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035529" comment="imlib2-loaders less than 1.3.0-66.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035530" comment="imlib2 less than 1.3.0-66.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2549</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2549" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2549" source="CVE"/>
	<description>
	Adobe Acrobat Reader 8.1.2 and earlier, and before 7.1.1, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a malformed PDF document, as demonstrated by 2008-HI2.pdf.
	</description>
 </metadata>
<!-- bca1a43d8becbd129b2df6ecff93ceb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035531" comment="acroread less than 8.1.3-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2641</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2641" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 7.0.9 and earlier, and 8.0 through 8.1.2, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors, related to an "input validation issue in a JavaScript method."
	</description>
 </metadata>
<!-- fc394fbd892e7ea66e7ae5ab3fa96958 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035532" comment="acroread less than 8.1.2_SU1-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2662</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2662" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2662" source="CVE"/>
	<description>
	Multiple integer overflows in the rb_str_buf_append function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2 allow context-dependent attackers to execute arbitrary code or cause a denial of service via unknown vectors that trigger memory corruption, a different issue than CVE-2008-2663, CVE-2008-2664, and CVE-2008-2725.  NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. This CVE description should be regarded as authoritative, although it is likely to change.
	</description>
 </metadata>
<!-- 8e2d9589bcc85d88502a19667437e254 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035061" comment="ruby-devel less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035062" comment="ruby-doc-html less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035063" comment="ruby-doc-ri less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035064" comment="ruby-examples less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035065" comment="ruby-test-suite less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035066" comment="ruby-tk less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035067" comment="ruby less than 1.8.6.p36-20.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2663</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2663" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2663" source="CVE"/>
	<description>
	Multiple integer overflows in the rb_ary_store function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, and 1.8.7 before 1.8.7-p22 allow context-dependent attackers to execute arbitrary code or cause a denial of service via unknown vectors, a different issue than CVE-2008-2662, CVE-2008-2664, and CVE-2008-2725. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.
	</description>
 </metadata>
<!-- 8e2d9589bcc85d88502a19667437e254 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035061" comment="ruby-devel less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035062" comment="ruby-doc-html less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035063" comment="ruby-doc-ri less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035064" comment="ruby-examples less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035065" comment="ruby-test-suite less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035066" comment="ruby-tk less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035067" comment="ruby less than 1.8.6.p36-20.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2664</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2664" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2664" source="CVE"/>
	<description>
	The rb_str_format function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2 allows context-dependent attackers to trigger memory corruption via unspecified vectors related to alloca, a different issue than CVE-2008-2662, CVE-2008-2663, and CVE-2008-2725.  NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.
	</description>
 </metadata>
<!-- 8e2d9589bcc85d88502a19667437e254 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035061" comment="ruby-devel less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035062" comment="ruby-doc-html less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035063" comment="ruby-doc-ri less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035064" comment="ruby-examples less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035065" comment="ruby-test-suite less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035066" comment="ruby-tk less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035067" comment="ruby less than 1.8.6.p36-20.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2667</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2667" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2667" source="CVE"/>
	<description>
	SQL injection vulnerability in the Courier Authentication Library (aka courier-authlib) before 0.60.6 on SUSE openSUSE 10.3 and 11.0, and other platforms, when MySQL and a non-Latin character set are used, allows remote attackers to execute arbitrary SQL commands via the username and unspecified other vectors.
	</description>
 </metadata>
<!-- 196f8e1910eb925736af21c11e102d7a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035533" comment="courier-authlib-devel less than 0.59.3-44.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035534" comment="courier-authlib-ldap less than 0.59.3-44.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035535" comment="courier-authlib-mysql less than 0.59.3-44.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035536" comment="courier-authlib-pgsql less than 0.59.3-44.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035537" comment="courier-authlib-pipe less than 0.59.3-44.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035538" comment="courier-authlib-userdb less than 0.59.3-44.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035539" comment="courier-authlib less than 0.59.3-44.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2696</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2696" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2696" source="CVE"/>
	<description>
	Exiv2 0.16 allows user-assisted remote attackers to cause a denial of service (divide-by-zero and application crash) via a zero value in Nikon lens information in the metadata of an image, related to "pretty printing" and the RationalValue::toLong function.
	</description>
 </metadata>
<!-- 7c05331922f17fa43108a675e0a1239c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035540" comment="libexiv2-devel less than 0.15-8.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035541" comment="libexiv2 less than 0.15-8.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2712</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2712" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2712" source="CVE"/>
	<description>
	Vim 7.1.314, 6.4, and other versions allows user-assisted remote attackers to execute arbitrary commands via Vim scripts that do not properly sanitize inputs before invoking the execute or system functions, as demonstrated using (1) filetype.vim, (3) xpm.vim, (4) gzip_vim, and (5) netrw.  NOTE: the originally reported version was 7.1.314, but the researcher actually found this set of issues in 7.1.298.  NOTE: the zipplugin issue (originally vector 2 in this identifier) has been subsumed by CVE-2008-3075.
	</description>
 </metadata>
<!-- 4811f82775ba2e73f4c7806cd79ad5c0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035542" comment="gvim less than 7.2-9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035543" comment="vim-base less than 7.2-9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035544" comment="vim-data less than 7.2-9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035545" comment="vim-enhanced less than 7.2-9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2713</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2713" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2713" source="CVE"/>
	<description>
	libclamav/petite.c in ClamAV before 0.93.1 allows remote attackers to cause a denial of service via a crafted Petite file that triggers an out-of-bounds read.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5983180f90658c6cd1b47d490db4b831 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035546" comment="clamav-db less than 0.93.3-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033814" comment="clamav less than 0.93.3-0.1"/>
		</criteria>
	</criteria>
	<!-- 7547892da5d37d7eb5534a402f4a9f77 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035547" comment="clamav-db less than 0.93.1-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033813" comment="clamav less than 0.93.1-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2714</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2714" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2714" source="CVE"/>
	<description>
	Opera before 9.26 allows remote attackers to misrepresent web page addresses using "certain characters" that "cause the page address text to be misplaced."
	</description>
 </metadata>
<!-- 07c5022cd9963bda975dcc2222992a28 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035548" comment="opera less than 9.50-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2715</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2715" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2715" source="CVE"/>
	<description>
	Unspecified vulnerability in Opera before 9.5 allows remote attackers to read cross-domain images via HTML CANVAS elements that use the images as patterns.
	</description>
 </metadata>
<!-- 07c5022cd9963bda975dcc2222992a28 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035548" comment="opera less than 9.50-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2716</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2716" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2716" source="CVE"/>
	<description>
	Unspecified vulnerability in Opera before 9.5 allows remote attackers to spoof the contents of trusted frames on the same parent page by modifying the location, which can facilitate phishing attacks.
	</description>
 </metadata>
<!-- 07c5022cd9963bda975dcc2222992a28 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035548" comment="opera less than 9.50-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2725</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2725" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2725" source="CVE"/>
	<description>
	Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, and 1.8.7 before 1.8.7-p22; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger memory corruption via unspecified vectors, aka the "REALLOC_N" variant, a different issue than CVE-2008-2662, CVE-2008-2663, and CVE-2008-2664.  NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.
	</description>
 </metadata>
<!-- 8e2d9589bcc85d88502a19667437e254 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035061" comment="ruby-devel less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035062" comment="ruby-doc-html less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035063" comment="ruby-doc-ri less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035064" comment="ruby-examples less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035065" comment="ruby-test-suite less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035066" comment="ruby-tk less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035067" comment="ruby less than 1.8.6.p36-20.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2726</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2726" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2726" source="CVE"/>
	<description>
	Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger memory corruption, aka the "beg + rlen" issue.  NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.
	</description>
 </metadata>
<!-- 8e2d9589bcc85d88502a19667437e254 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035061" comment="ruby-devel less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035062" comment="ruby-doc-html less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035063" comment="ruby-doc-ri less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035064" comment="ruby-examples less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035065" comment="ruby-test-suite less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035066" comment="ruby-tk less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035067" comment="ruby less than 1.8.6.p36-20.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2727</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2727" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2727" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2008-2725.  Reason: This candidate is a duplicate of CVE-2008-2725.  Notes: All CVE users should reference CVE-2008-2725 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
<!-- 8e2d9589bcc85d88502a19667437e254 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035061" comment="ruby-devel less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035062" comment="ruby-doc-html less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035063" comment="ruby-doc-ri less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035064" comment="ruby-examples less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035065" comment="ruby-test-suite less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035066" comment="ruby-tk less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035067" comment="ruby less than 1.8.6.p36-20.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2728</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2728" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2728" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2008-2726.  Reason: This candidate is a duplicate of CVE-2008-2726.  Notes: All CVE users should reference CVE-2008-2726 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
<!-- 8e2d9589bcc85d88502a19667437e254 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035061" comment="ruby-devel less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035062" comment="ruby-doc-html less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035063" comment="ruby-doc-ri less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035064" comment="ruby-examples less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035065" comment="ruby-test-suite less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035066" comment="ruby-tk less than 1.8.6.p36-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035067" comment="ruby less than 1.8.6.p36-20.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2785</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2785" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2785" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.16 and 3.x before 3.0.1, Thunderbird before 2.0.0.16, and SeaMonkey before 1.1.11 use an incorrect integer data type as a CSS object reference counter in the CSSValue array (aka nsCSSValue:Array) data structure, which allows remote attackers to execute arbitrary code via a large number of references to a common CSS object, leading to a counter overflow and a free of in-use memory, aka ZDI-CAN-349.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 157ef14746abeaecbcb665f51bb72f14 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035549" comment="MozillaThunderbird-translations less than 2.0.0.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035550" comment="MozillaThunderbird less than 2.0.0.16-0.1"/>
		</criteria>
	</criteria>
	<!-- 6a9fbe7e71158bafe0f7569b24d2f568 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035551" comment="MozillaFirefox-translations less than 2.0.0.16-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035552" comment="MozillaFirefox less than 2.0.0.16-0.1"/>
		</criteria>
	</criteria>
	<!-- d05ce9e43b6c852145ebe9dba03f33be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035553" comment="seamonkey-dom-inspector less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035554" comment="seamonkey-irc less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035555" comment="seamonkey-mail less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035556" comment="seamonkey-spellchecker less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035557" comment="seamonkey-venkman less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035558" comment="seamonkey less than 1.1.11-3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2798</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2798" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2798" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via unknown vectors related to the layout engine.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- d05ce9e43b6c852145ebe9dba03f33be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035553" comment="seamonkey-dom-inspector less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035554" comment="seamonkey-irc less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035555" comment="seamonkey-mail less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035556" comment="seamonkey-spellchecker less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035557" comment="seamonkey-venkman less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035558" comment="seamonkey less than 1.1.11-3.1"/>
		</criteria>
	</criteria>
	<!-- ed59239a4dc7dd05e83c6c9a0cb1b85b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035559" comment="MozillaFirefox-translations less than 2.0.0.15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035560" comment="MozillaFirefox less than 2.0.0.15-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2799</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2799" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via unknown vectors related to the JavaScript engine.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- d05ce9e43b6c852145ebe9dba03f33be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035553" comment="seamonkey-dom-inspector less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035554" comment="seamonkey-irc less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035555" comment="seamonkey-mail less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035556" comment="seamonkey-spellchecker less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035557" comment="seamonkey-venkman less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035558" comment="seamonkey less than 1.1.11-3.1"/>
		</criteria>
	</criteria>
	<!-- ed59239a4dc7dd05e83c6c9a0cb1b85b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035559" comment="MozillaFirefox-translations less than 2.0.0.15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035560" comment="MozillaFirefox less than 2.0.0.15-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2800</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2800" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 allow remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via vectors involving (1) an event handler attached to an outer window, (2) a SCRIPT element in an unloaded document, or (3) the onreadystatechange handler in conjunction with an XMLHttpRequest.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- d05ce9e43b6c852145ebe9dba03f33be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035553" comment="seamonkey-dom-inspector less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035554" comment="seamonkey-irc less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035555" comment="seamonkey-mail less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035556" comment="seamonkey-spellchecker less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035557" comment="seamonkey-venkman less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035558" comment="seamonkey less than 1.1.11-3.1"/>
		</criteria>
	</criteria>
	<!-- ed59239a4dc7dd05e83c6c9a0cb1b85b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035559" comment="MozillaFirefox-translations less than 2.0.0.15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035560" comment="MozillaFirefox less than 2.0.0.15-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2801</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2801" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2801" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly implement JAR signing, which allows remote attackers to execute arbitrary code via (1) injection of JavaScript into documents within a JAR archive or (2) a JAR archive that uses relative URLs to JavaScript files.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- d05ce9e43b6c852145ebe9dba03f33be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035553" comment="seamonkey-dom-inspector less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035554" comment="seamonkey-irc less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035555" comment="seamonkey-mail less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035556" comment="seamonkey-spellchecker less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035557" comment="seamonkey-venkman less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035558" comment="seamonkey less than 1.1.11-3.1"/>
		</criteria>
	</criteria>
	<!-- ed59239a4dc7dd05e83c6c9a0cb1b85b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035559" comment="MozillaFirefox-translations less than 2.0.0.15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035560" comment="MozillaFirefox less than 2.0.0.15-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2802</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2802" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2802" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 allow remote attackers to execute arbitrary code via an XUL document that includes a script from a chrome: URI that points to a fastload file, related to this file's "privilege level."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- d05ce9e43b6c852145ebe9dba03f33be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035553" comment="seamonkey-dom-inspector less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035554" comment="seamonkey-irc less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035555" comment="seamonkey-mail less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035556" comment="seamonkey-spellchecker less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035557" comment="seamonkey-venkman less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035558" comment="seamonkey less than 1.1.11-3.1"/>
		</criteria>
	</criteria>
	<!-- ed59239a4dc7dd05e83c6c9a0cb1b85b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035559" comment="MozillaFirefox-translations less than 2.0.0.15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035560" comment="MozillaFirefox less than 2.0.0.15-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2803</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2803" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2803" source="CVE"/>
	<description>
	The mozIJSSubScriptLoader.LoadScript function in Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 does not apply XPCNativeWrappers to scripts loaded from (1) file: URIs, (2) data: URIs, or (3) certain non-canonical chrome: URIs, which allows remote attackers to execute arbitrary code via vectors involving third-party add-ons.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- d05ce9e43b6c852145ebe9dba03f33be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035553" comment="seamonkey-dom-inspector less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035554" comment="seamonkey-irc less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035555" comment="seamonkey-mail less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035556" comment="seamonkey-spellchecker less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035557" comment="seamonkey-venkman less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035558" comment="seamonkey less than 1.1.11-3.1"/>
		</criteria>
	</criteria>
	<!-- ed59239a4dc7dd05e83c6c9a0cb1b85b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035559" comment="MozillaFirefox-translations less than 2.0.0.15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035560" comment="MozillaFirefox less than 2.0.0.15-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2805</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2805" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 allow remote attackers to force the upload of arbitrary local files from a client computer via vectors involving originalTarget and DOM Range.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- d05ce9e43b6c852145ebe9dba03f33be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035553" comment="seamonkey-dom-inspector less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035554" comment="seamonkey-irc less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035555" comment="seamonkey-mail less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035556" comment="seamonkey-spellchecker less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035557" comment="seamonkey-venkman less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035558" comment="seamonkey less than 1.1.11-3.1"/>
		</criteria>
	</criteria>
	<!-- ed59239a4dc7dd05e83c6c9a0cb1b85b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035559" comment="MozillaFirefox-translations less than 2.0.0.15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035560" comment="MozillaFirefox less than 2.0.0.15-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2806</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2806" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 on Mac OS X allow remote attackers to bypass the Same Origin Policy and create arbitrary socket connections via a crafted Java applet, related to the Java Embedding Plugin (JEP) and Java LiveConnect.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- d05ce9e43b6c852145ebe9dba03f33be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035553" comment="seamonkey-dom-inspector less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035554" comment="seamonkey-irc less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035555" comment="seamonkey-mail less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035556" comment="seamonkey-spellchecker less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035557" comment="seamonkey-venkman less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035558" comment="seamonkey less than 1.1.11-3.1"/>
		</criteria>
	</criteria>
	<!-- ed59239a4dc7dd05e83c6c9a0cb1b85b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035559" comment="MozillaFirefox-translations less than 2.0.0.15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035560" comment="MozillaFirefox less than 2.0.0.15-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2807</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2807" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2807" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly handle an invalid .properties file for an add-on, which allows remote attackers to read uninitialized memory, as demonstrated by use of ISO 8859 encoding instead of UTF-8 encoding in a French .properties file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- d05ce9e43b6c852145ebe9dba03f33be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035553" comment="seamonkey-dom-inspector less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035554" comment="seamonkey-irc less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035555" comment="seamonkey-mail less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035556" comment="seamonkey-spellchecker less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035557" comment="seamonkey-venkman less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035558" comment="seamonkey less than 1.1.11-3.1"/>
		</criteria>
	</criteria>
	<!-- ed59239a4dc7dd05e83c6c9a0cb1b85b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035559" comment="MozillaFirefox-translations less than 2.0.0.15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035560" comment="MozillaFirefox less than 2.0.0.15-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2808</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2808" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2808" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly escape HTML in file:// URLs in directory listings, which allows remote attackers to conduct cross-site scripting (XSS) attacks or have unspecified other impact via a crafted filename.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- d05ce9e43b6c852145ebe9dba03f33be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035553" comment="seamonkey-dom-inspector less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035554" comment="seamonkey-irc less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035555" comment="seamonkey-mail less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035556" comment="seamonkey-spellchecker less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035557" comment="seamonkey-venkman less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035558" comment="seamonkey less than 1.1.11-3.1"/>
		</criteria>
	</criteria>
	<!-- ed59239a4dc7dd05e83c6c9a0cb1b85b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035559" comment="MozillaFirefox-translations less than 2.0.0.15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035560" comment="MozillaFirefox less than 2.0.0.15-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2809</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2809" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2809" source="CVE"/>
	<description>
	Mozilla 1.9 M8 and earlier, Mozilla Firefox 2 before 2.0.0.15, SeaMonkey 1.1.5 and other versions before 1.1.10, Netscape 9.0, and other Mozilla-based web browsers, when a user accepts an SSL server certificate on the basis of the CN domain name in the DN field, regard the certificate as also accepted for all domain names in subjectAltName:dNSName fields, which makes it easier for remote attackers to trick a user into accepting an invalid certificate for a spoofed web site.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- d05ce9e43b6c852145ebe9dba03f33be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035553" comment="seamonkey-dom-inspector less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035554" comment="seamonkey-irc less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035555" comment="seamonkey-mail less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035556" comment="seamonkey-spellchecker less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035557" comment="seamonkey-venkman less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035558" comment="seamonkey less than 1.1.11-3.1"/>
		</criteria>
	</criteria>
	<!-- ed59239a4dc7dd05e83c6c9a0cb1b85b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035559" comment="MozillaFirefox-translations less than 2.0.0.15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035560" comment="MozillaFirefox less than 2.0.0.15-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2810</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2810" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2810" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly identify the context of Windows shortcut files, which allows user-assisted remote attackers to bypass the Same Origin Policy via a crafted web site for which the user has previously saved a shortcut.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- d05ce9e43b6c852145ebe9dba03f33be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035553" comment="seamonkey-dom-inspector less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035554" comment="seamonkey-irc less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035555" comment="seamonkey-mail less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035556" comment="seamonkey-spellchecker less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035557" comment="seamonkey-venkman less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035558" comment="seamonkey less than 1.1.11-3.1"/>
		</criteria>
	</criteria>
	<!-- ed59239a4dc7dd05e83c6c9a0cb1b85b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035559" comment="MozillaFirefox-translations less than 2.0.0.15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035560" comment="MozillaFirefox less than 2.0.0.15-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2811</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2811" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2811" source="CVE"/>
	<description>
	The block reflow implementation in Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via an image whose display requires more pixels than nscoord_MAX, related to nsBlockFrame::DrainOverflowLines.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- d05ce9e43b6c852145ebe9dba03f33be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035553" comment="seamonkey-dom-inspector less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035554" comment="seamonkey-irc less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035555" comment="seamonkey-mail less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035556" comment="seamonkey-spellchecker less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035557" comment="seamonkey-venkman less than 1.1.11-3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035558" comment="seamonkey less than 1.1.11-3.1"/>
		</criteria>
	</criteria>
	<!-- ed59239a4dc7dd05e83c6c9a0cb1b85b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035559" comment="MozillaFirefox-translations less than 2.0.0.15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035560" comment="MozillaFirefox less than 2.0.0.15-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2812</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2812" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2812" source="CVE"/>
	<description>
	The Linux kernel before 2.6.25.10 does not properly perform tty operations, which allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving NULL pointer dereference of function pointers in (1) hamradio/6pack.c, (2) hamradio/mkiss.c, (3) irda/irtty-sir.c, (4) ppp_async.c, (5) ppp_synctty.c, (6) slip.c, (7) wan/x25_asy.c, and (8) wireless/strip.c in drivers/net/.
	</description>
 </metadata>
<!-- 3837c2df513f0088f0fdd19fc0db5adc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034714" comment="kernel-bigsmp less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034715" comment="kernel-debug less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034716" comment="kernel-default less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034717" comment="kernel-kdump less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034718" comment="kernel-ppc64 less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034719" comment="kernel-source less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034720" comment="kernel-syms less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034721" comment="kernel-xen less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034722" comment="kernel-xenpae less than 2.6.22.19-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2826</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2826" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2826" source="CVE"/>
	<description>
	Integer overflow in the sctp_getsockopt_local_addrs_old function in net/sctp/socket.c in the Stream Control Transmission Protocol (sctp) functionality in the Linux kernel before 2.6.25.9 allows local users to cause a denial of service (resource consumption and system outage) via vectors involving a large addr_num field in an sctp_getaddrs_old data structure.
	</description>
 </metadata>
<!-- 3837c2df513f0088f0fdd19fc0db5adc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034714" comment="kernel-bigsmp less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034715" comment="kernel-debug less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034716" comment="kernel-default less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034717" comment="kernel-kdump less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034718" comment="kernel-ppc64 less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034719" comment="kernel-source less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034720" comment="kernel-syms less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034721" comment="kernel-xen less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034722" comment="kernel-xenpae less than 2.6.22.19-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2829</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2829" source="CVE"/>
	<description>
	php_imap.c in PHP 5.2.5, 5.2.6, 4.x, and other versions, uses obsolete API calls that allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long IMAP request, which triggers an "rfc822.c legacy routine buffer overflow" error message, related to the rfc822_write_address function.
	</description>
 </metadata>
<!-- 4a539502f8a7c8f5be6334b98e82d558 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035561" comment="apache2-mod_php5 less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035562" comment="php5-bcmath less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035563" comment="php5-bz2 less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035564" comment="php5-calendar less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035565" comment="php5-ctype less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035566" comment="php5-curl less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035567" comment="php5-dba less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035568" comment="php5-dbase less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035569" comment="php5-devel less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035570" comment="php5-dom less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035571" comment="php5-exif less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035572" comment="php5-fastcgi less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035573" comment="php5-ftp less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035574" comment="php5-gd less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035575" comment="php5-gettext less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035576" comment="php5-gmp less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035577" comment="php5-hash less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035578" comment="php5-iconv less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035579" comment="php5-imap less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035580" comment="php5-json less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035581" comment="php5-ldap less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035582" comment="php5-mbstring less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035583" comment="php5-mcrypt less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035584" comment="php5-mhash less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035585" comment="php5-mysql less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035586" comment="php5-ncurses less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035587" comment="php5-odbc less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035588" comment="php5-openssl less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035589" comment="php5-pcntl less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035590" comment="php5-pdo less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035591" comment="php5-pear less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035592" comment="php5-pgsql less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035593" comment="php5-posix less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035594" comment="php5-pspell less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035595" comment="php5-readline less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035596" comment="php5-shmop less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035597" comment="php5-snmp less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035598" comment="php5-soap less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035599" comment="php5-sockets less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035600" comment="php5-sqlite less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035601" comment="php5-suhosin less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035602" comment="php5-sysvmsg less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035603" comment="php5-sysvsem less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035604" comment="php5-sysvshm less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035605" comment="php5-tidy less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035606" comment="php5-tokenizer less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035607" comment="php5-wddx less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035608" comment="php5-xmlreader less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035609" comment="php5-xmlrpc less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035610" comment="php5-xmlwriter less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035611" comment="php5-xsl less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035612" comment="php5-zip less than 5.2.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035613" comment="php5-zlib less than 5.2.6-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2927</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2927" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2927" source="CVE"/>
	<description>
	Multiple integer overflows in the msn_slplink_process_msg functions in the MSN protocol handler in (1) libpurple/protocols/msn/slplink.c and (2) libpurple/protocols/msnp9/slplink.c in Pidgin before 2.4.3 and Adium before 1.3 allow remote attackers to execute arbitrary code via a malformed SLP message with a crafted offset value, a different vulnerability than CVE-2008-2955.
	</description>
 </metadata>
<!-- ea9754c57ea8497ff369046cb5102727 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035614" comment="finch-devel less than 2.3.1-26.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035615" comment="finch less than 2.3.1-26.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035616" comment="libpurple-devel less than 2.3.1-26.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035617" comment="libpurple-meanwhile less than 2.3.1-26.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035618" comment="libpurple-mono less than 2.3.1-26.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035619" comment="libpurple less than 2.3.1-26.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035620" comment="pidgin-devel less than 2.3.1-26.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035621" comment="pidgin less than 2.3.1-26.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2933</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2933" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2933" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.16, and 3.x before 3.0.1, interprets '|' (pipe) characters in a command-line URI as requests to open multiple tabs, which allows remote attackers to access chrome:i URIs, or read arbitrary local files via manipulations involving a series of URIs that is not entirely handled by a vector application, as exploited in conjunction with CVE-2008-2540.  NOTE: this issue exists because of an insufficient fix for CVE-2005-2267.
	</description>
 </metadata>
<!-- 6a9fbe7e71158bafe0f7569b24d2f568 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035551" comment="MozillaFirefox-translations less than 2.0.0.16-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035552" comment="MozillaFirefox less than 2.0.0.16-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2935</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2935" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2935" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in the rc4 (1) encryption (aka exsltCryptoRc4EncryptFunction) and (2) decryption (aka exsltCryptoRc4DecryptFunction) functions in crypto.c in libexslt in libxslt 1.1.8 through 1.1.24 allow context-dependent attackers to execute arbitrary code via an XML file containing a long string as "an argument in the XSL input."
	</description>
 </metadata>
<!-- f321531b834ba0b2d81c4bcefc93ea78 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035622" comment="libxslt-32bit less than 1.1.20-41.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035623" comment="libxslt-64bit less than 1.1.20-41.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035624" comment="libxslt-devel-32bit less than 1.1.20-41.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035625" comment="libxslt-devel-64bit less than 1.1.20-41.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035626" comment="libxslt-devel less than 1.1.20-41.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035627" comment="libxslt less than 1.1.20-41.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2936</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2936" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2936" source="CVE"/>
	<description>
	Postfix before 2.3.15, 2.4 before 2.4.8, 2.5 before 2.5.4, and 2.6 before 2.6-20080814, when the operating system supports hard links to symlinks, allows local users to append e-mail messages to a file to which a root-owned symlink points, by creating a hard link to this symlink and then sending a message.  NOTE: this can be leveraged to gain privileges if there is a symlink to an init script.
	</description>
 </metadata>
<!-- dc6c4ede98a83e45868508bd87a1f74d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035628" comment="postfix-devel less than 2.4.5-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035629" comment="postfix-mysql less than 2.4.5-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035630" comment="postfix-postgresql less than 2.4.5-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035631" comment="postfix less than 2.4.5-20.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2937</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2937" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2937" source="CVE"/>
	<description>
	Postfix 2.5 before 2.5.4 and 2.6 before 2.6-20080814 delivers to a mailbox file even when this file is not owned by the recipient, which allows local users to read e-mail messages by creating a mailbox file corresponding to another user's account name.
	</description>
 </metadata>
<!-- dc6c4ede98a83e45868508bd87a1f74d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035628" comment="postfix-devel less than 2.4.5-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035629" comment="postfix-mysql less than 2.4.5-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035630" comment="postfix-postgresql less than 2.4.5-20.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035631" comment="postfix less than 2.4.5-20.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2938</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2938" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2938" source="CVE"/>
	<description>
	Directory traversal vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when allowLinking and UTF-8 are enabled, allows remote attackers to read arbitrary files via encoded directory traversal sequences in the URI, a different vulnerability than CVE-2008-2370.  NOTE: versions earlier than 6.0.18 were reported affected, but the vendor advisory lists 6.0.16 as the last affected version.
	</description>
 </metadata>
<!-- 32b7b80406da89486b8b8399787167dd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035086" comment="tomcat55-admin-webapps less than 5.5.23-113.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035087" comment="tomcat55-common-lib less than 5.5.23-113.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035088" comment="tomcat55-jasper-javadoc less than 5.5.23-113.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035089" comment="tomcat55-jasper less than 5.5.23-113.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035090" comment="tomcat55-jsp-2_0-api-javadoc less than 5.5.23-113.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035091" comment="tomcat55-jsp-2_0-api less than 5.5.23-113.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035092" comment="tomcat55-server-lib less than 5.5.23-113.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035093" comment="tomcat55-servlet-2_4-api-javadoc less than 5.5.23-113.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035094" comment="tomcat55-servlet-2_4-api less than 5.5.23-113.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035095" comment="tomcat55-webapps less than 5.5.23-113.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035096" comment="tomcat55 less than 5.5.23-113.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2939</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2939" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2939" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the mod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c in the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions, allows remote attackers to inject arbitrary web script or HTML via a wildcard in the last directory component in the pathname in an FTP URI.
	</description>
 </metadata>
<!-- 4a87d325376f89ec79eb900ebffe9dcd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034679" comment="apache2-devel less than 2.2.4-70.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034680" comment="apache2-doc less than 2.2.4-70.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034681" comment="apache2-example-pages less than 2.2.4-70.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034682" comment="apache2-prefork less than 2.2.4-70.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034683" comment="apache2-utils less than 2.2.4-70.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034684" comment="apache2-worker less than 2.2.4-70.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034685" comment="apache2 less than 2.2.4-70.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2940</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2940" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2940" source="CVE"/>
	<description>
	The alert-mailing implementation in HP Linux Imaging and Printing (HPLIP) 1.6.7 allows local users to gain privileges and send e-mail messages from the root account via vectors related to the setalerts message, and lack of validation of the device URI associated with an event message.
	</description>
 </metadata>
<!-- 379fb01a5ff2a8fe58652bf3590e3a88 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035632" comment="hplip-hpijs less than 2.7.7-37.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035633" comment="hplip less than 2.7.7-37.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2941</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2941" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2941" source="CVE"/>
	<description>
	The hpssd message parser in hpssd.py in HP Linux Imaging and Printing (HPLIP) 1.6.7 allows local users to cause a denial of service (process stop) via a crafted packet, as demonstrated by sending "msg=0" to TCP port 2207.
	</description>
 </metadata>
<!-- 379fb01a5ff2a8fe58652bf3590e3a88 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035632" comment="hplip-hpijs less than 2.7.7-37.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035633" comment="hplip less than 2.7.7-37.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2952</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2952" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2952" source="CVE"/>
	<description>
	liblber/io.c in OpenLDAP 2.2.4 to 2.4.10 allows remote attackers to cause a denial of service (program termination) via crafted ASN.1 BER datagrams that trigger an assertion error.
	</description>
 </metadata>
<!-- 7d3149685991447ffcd14b12a0ce97e3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035634" comment="openldap2-back-meta less than 2.3.37-7.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035635" comment="openldap2-back-perl less than 2.3.37-7.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035636" comment="openldap2-client-32bit less than 2.3.37-20.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035637" comment="openldap2-client-64bit less than 2.3.37-20.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035638" comment="openldap2-client less than 2.3.37-20.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035639" comment="openldap2-devel-32bit less than 2.3.37-20.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035640" comment="openldap2-devel-64bit less than 2.3.37-20.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035641" comment="openldap2-devel less than 2.3.37-20.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035642" comment="openldap2 less than 2.3.37-7.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2955</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2955" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2955" source="CVE"/>
	<description>
	Pidgin 2.4.1 allows remote attackers to cause a denial of service (crash) via a long filename that contains certain characters, as demonstrated using an MSN message that triggers the crash in the msn_slplink_process_msg function.
	</description>
 </metadata>
<!-- ea9754c57ea8497ff369046cb5102727 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035614" comment="finch-devel less than 2.3.1-26.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035615" comment="finch less than 2.3.1-26.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035616" comment="libpurple-devel less than 2.3.1-26.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035617" comment="libpurple-meanwhile less than 2.3.1-26.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035618" comment="libpurple-mono less than 2.3.1-26.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035619" comment="libpurple less than 2.3.1-26.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035620" comment="pidgin-devel less than 2.3.1-26.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035621" comment="pidgin less than 2.3.1-26.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2960</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2960" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in phpMyAdmin before 2.11.7, when register_globals is enabled and .htaccess support is disabled, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving scripts in libraries/.
	</description>
 </metadata>
<!-- 73adad68b37fe8bb88a7a57d6f7234c4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035069" comment="phpMyAdmin less than 2.11.9.4-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2992</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-2992" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2992" source="CVE"/>
	<description>
	Stack-based buffer overflow in Adobe Acrobat and Reader 8.1.2 and earlier allows remote attackers to execute arbitrary code via a PDF file that calls the util.printf JavaScript function with a crafted format string argument, a related issue to CVE-2008-1104.
	</description>
 </metadata>
<!-- bca1a43d8becbd129b2df6ecff93ceb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035531" comment="acroread less than 8.1.3-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3067</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3067" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3067" source="CVE"/>
	<description>
	sudo in SUSE openSUSE 10.3 does not clear the stdin buffer when password entry times out, which might allow local users to obtain a password by reading stdin from the parent process after a sudo child process exits.
	</description>
 </metadata>
<!-- 340fe66c80db03fe0485b934fa98a5c6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035643" comment="sudo less than 1.6.9p2-23.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3074</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3074" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3074" source="CVE"/>
	<description>
	The shellescape function in Vim 7.0 through 7.2, including 7.2a.10, allows user-assisted attackers to execute arbitrary code via the "!" (exclamation point) shell metacharacter in (1) the filename of a tar archive and possibly (2) the filename of the first file in a tar archive, which is not properly handled by the VIM TAR plugin (tar.vim) v.10 through v.22, as demonstrated by the shellescape, tarplugin.v2, tarplugin, and tarplugin.updated test cases.  NOTE: this issue reportedly exists because of an incomplete fix for CVE-2008-2712. NOTE: this issue has the same root cause as CVE-2008-3075.  NOTE: due to the complexity of the associated disclosures and the incomplete information related to them, there may be inaccuracies in this CVE description and in external mappings to this identifier.
	</description>
 </metadata>
<!-- 4811f82775ba2e73f4c7806cd79ad5c0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035542" comment="gvim less than 7.2-9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035543" comment="vim-base less than 7.2-9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035544" comment="vim-data less than 7.2-9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035545" comment="vim-enhanced less than 7.2-9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3075</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3075" source="CVE"/>
	<description>
	The shellescape function in Vim 7.0 through 7.2, including 7.2a.10, allows user-assisted attackers to execute arbitrary code via the "!" (exclamation point) shell metacharacter in (1) the filename of a ZIP archive and possibly (2) the filename of the first file in a ZIP archive, which is not properly handled by zip.vim in the VIM ZIP plugin (zipPlugin.vim) v.11 through v.21, as demonstrated by the zipplugin and zipplugin.v2 test cases.  NOTE: this issue reportedly exists because of an incomplete fix for CVE-2008-2712.  NOTE: this issue has the same root cause as CVE-2008-3074.  NOTE: due to the complexity of the associated disclosures and the incomplete information related to them, there may be inaccuracies in this CVE description and in external mappings to this identifier.
	</description>
 </metadata>
<!-- 4811f82775ba2e73f4c7806cd79ad5c0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035542" comment="gvim less than 7.2-9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035543" comment="vim-base less than 7.2-9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035544" comment="vim-data less than 7.2-9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035545" comment="vim-enhanced less than 7.2-9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3076</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3076" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3076" source="CVE"/>
	<description>
	The Netrw plugin 125 in netrw.vim in Vim 7.2a.10 allows user-assisted attackers to execute arbitrary code via shell metacharacters in filenames used by the execute and system functions within the (1) mz and (2) mc commands, as demonstrated by the netrw.v2 and netrw.v3 test cases.  NOTE: this issue reportedly exists because of an incomplete fix for CVE-2008-2712.
	</description>
 </metadata>
<!-- 4811f82775ba2e73f4c7806cd79ad5c0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035542" comment="gvim less than 7.2-9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035543" comment="vim-base less than 7.2-9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035544" comment="vim-data less than 7.2-9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035545" comment="vim-enhanced less than 7.2-9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3078</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3078" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3078" source="CVE"/>
	<description>
	Opera before 9.51 does not properly manage memory within functions supporting the CANVAS element, which allows remote attackers to read uninitialized memory contents by using JavaScript to read a canvas image.
	</description>
 </metadata>
<!-- b67a888ed8bb4a6235e5e9f0b8d5903b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035644" comment="opera less than 9.51-7.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3103</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3103" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3103" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Management Extensions (JMX) management agent in Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 6 and earlier and JDK and JRE 5.0 Update 15 and earlier, when local monitoring is enabled, allows remote attackers to "perform unauthorized operations" via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 310064634aaa1eb786789b6e26d97495 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035645" comment="java-1_6_0-sun-alsa less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035646" comment="java-1_6_0-sun-demo less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035647" comment="java-1_6_0-sun-devel less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035648" comment="java-1_6_0-sun-jdbc less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035649" comment="java-1_6_0-sun-plugin less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035650" comment="java-1_6_0-sun less than 1.6.0.u7-1.1"/>
		</criteria>
	</criteria>
	<!-- 619e2632e70e459017e1f83140ed9d5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035651" comment="java-1_5_0-sun-alsa less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035652" comment="java-1_5_0-sun-demo less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035653" comment="java-1_5_0-sun-devel less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035654" comment="java-1_5_0-sun-jdbc less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035655" comment="java-1_5_0-sun-plugin less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035656" comment="java-1_5_0-sun-src less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035657" comment="java-1_5_0-sun less than 1.5.0_update16-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3104</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3104" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3104" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, SDK and JRE 1.4.x before 1.4.2_18, and SDK and JRE 1.3.x before 1.3.1_23 allow remote attackers to violate the security model for an applet's outbound connections by connecting to localhost services running on the machine that loaded the applet.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 310064634aaa1eb786789b6e26d97495 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035645" comment="java-1_6_0-sun-alsa less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035646" comment="java-1_6_0-sun-demo less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035647" comment="java-1_6_0-sun-devel less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035648" comment="java-1_6_0-sun-jdbc less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035649" comment="java-1_6_0-sun-plugin less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035650" comment="java-1_6_0-sun less than 1.6.0.u7-1.1"/>
		</criteria>
	</criteria>
	<!-- 619e2632e70e459017e1f83140ed9d5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035651" comment="java-1_5_0-sun-alsa less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035652" comment="java-1_5_0-sun-demo less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035653" comment="java-1_5_0-sun-devel less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035654" comment="java-1_5_0-sun-jdbc less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035655" comment="java-1_5_0-sun-plugin less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035656" comment="java-1_5_0-sun-src less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035657" comment="java-1_5_0-sun less than 1.5.0_update16-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3105</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3105" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3105" source="CVE"/>
	<description>
	Unspecified vulnerability in the JAX-WS client and service in Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 6 and earlier allows remote attackers to access URLs or cause a denial of service via unknown vectors involving "processing of XML data" by a trusted application.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 310064634aaa1eb786789b6e26d97495 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035645" comment="java-1_6_0-sun-alsa less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035646" comment="java-1_6_0-sun-demo less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035647" comment="java-1_6_0-sun-devel less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035648" comment="java-1_6_0-sun-jdbc less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035649" comment="java-1_6_0-sun-plugin less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035650" comment="java-1_6_0-sun less than 1.6.0.u7-1.1"/>
		</criteria>
	</criteria>
	<!-- 619e2632e70e459017e1f83140ed9d5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035651" comment="java-1_5_0-sun-alsa less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035652" comment="java-1_5_0-sun-demo less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035653" comment="java-1_5_0-sun-devel less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035654" comment="java-1_5_0-sun-jdbc less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035655" comment="java-1_5_0-sun-plugin less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035656" comment="java-1_5_0-sun-src less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035657" comment="java-1_5_0-sun less than 1.5.0_update16-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3106</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3106" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3106" source="CVE"/>
	<description>
	Unspecified vulnerability in Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 6 and earlier and JDK and JRE 5.0 Update 15 and earlier allows remote attackers to access URLs via unknown vectors involving processing of XML data by an untrusted (1) application or (2) applet, a different vulnerability than CVE-2008-3105.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 310064634aaa1eb786789b6e26d97495 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035645" comment="java-1_6_0-sun-alsa less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035646" comment="java-1_6_0-sun-demo less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035647" comment="java-1_6_0-sun-devel less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035648" comment="java-1_6_0-sun-jdbc less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035649" comment="java-1_6_0-sun-plugin less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035650" comment="java-1_6_0-sun less than 1.6.0.u7-1.1"/>
		</criteria>
	</criteria>
	<!-- 619e2632e70e459017e1f83140ed9d5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035651" comment="java-1_5_0-sun-alsa less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035652" comment="java-1_5_0-sun-demo less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035653" comment="java-1_5_0-sun-devel less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035654" comment="java-1_5_0-sun-jdbc less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035655" comment="java-1_5_0-sun-plugin less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035656" comment="java-1_5_0-sun-src less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035657" comment="java-1_5_0-sun less than 1.5.0_update16-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3107</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3107" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3107" source="CVE"/>
	<description>
	Unspecified vulnerability in the Virtual Machine in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allows context-dependent attackers to gain privileges via an untrusted (1) application or (2) applet, as demonstrated by an application or applet that grants itself privileges to (a) read local files, (b) write to local files, or (c) execute local programs.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 310064634aaa1eb786789b6e26d97495 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035645" comment="java-1_6_0-sun-alsa less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035646" comment="java-1_6_0-sun-demo less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035647" comment="java-1_6_0-sun-devel less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035648" comment="java-1_6_0-sun-jdbc less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035649" comment="java-1_6_0-sun-plugin less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035650" comment="java-1_6_0-sun less than 1.6.0.u7-1.1"/>
		</criteria>
	</criteria>
	<!-- 619e2632e70e459017e1f83140ed9d5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035651" comment="java-1_5_0-sun-alsa less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035652" comment="java-1_5_0-sun-demo less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035653" comment="java-1_5_0-sun-devel less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035654" comment="java-1_5_0-sun-jdbc less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035655" comment="java-1_5_0-sun-plugin less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035656" comment="java-1_5_0-sun-src less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035657" comment="java-1_5_0-sun less than 1.5.0_update16-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3108</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3108" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3108" source="CVE"/>
	<description>
	Buffer overflow in Sun Java Runtime Environment (JRE) in JDK and JRE 5.0 before Update 10, SDK and JRE 1.4.x before 1.4.2_18, and SDK and JRE 1.3.x before 1.3.1_23 allows context-dependent attackers to gain privileges via unspecified vectors related to font processing.
	</description>
 </metadata>
<!-- 619e2632e70e459017e1f83140ed9d5b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035651" comment="java-1_5_0-sun-alsa less than 1.5.0_update16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035652" comment="java-1_5_0-sun-demo less than 1.5.0_update16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035653" comment="java-1_5_0-sun-devel less than 1.5.0_update16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035654" comment="java-1_5_0-sun-jdbc less than 1.5.0_update16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035655" comment="java-1_5_0-sun-plugin less than 1.5.0_update16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035656" comment="java-1_5_0-sun-src less than 1.5.0_update16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035657" comment="java-1_5_0-sun less than 1.5.0_update16-1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3109</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3109" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3109" source="CVE"/>
	<description>
	Unspecified vulnerability in scripting language support in Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 6 and earlier allows context-dependent attackers to gain privileges via an untrusted (1) application or (2) applet, as demonstrated by an application or applet that grants itself privileges to (a) read local files, (b) write to local files, or (c) execute local programs.
	</description>
 </metadata>
<!-- 310064634aaa1eb786789b6e26d97495 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035645" comment="java-1_6_0-sun-alsa less than 1.6.0.u7-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035646" comment="java-1_6_0-sun-demo less than 1.6.0.u7-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035647" comment="java-1_6_0-sun-devel less than 1.6.0.u7-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035648" comment="java-1_6_0-sun-jdbc less than 1.6.0.u7-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035649" comment="java-1_6_0-sun-plugin less than 1.6.0.u7-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035650" comment="java-1_6_0-sun less than 1.6.0.u7-1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3110</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3110" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3110" source="CVE"/>
	<description>
	Unspecified vulnerability in scripting language support in Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 6 and earlier allows remote attackers to obtain sensitive information by using an applet to read information from another applet.
	</description>
 </metadata>
<!-- 310064634aaa1eb786789b6e26d97495 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035645" comment="java-1_6_0-sun-alsa less than 1.6.0.u7-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035646" comment="java-1_6_0-sun-demo less than 1.6.0.u7-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035647" comment="java-1_6_0-sun-devel less than 1.6.0.u7-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035648" comment="java-1_6_0-sun-jdbc less than 1.6.0.u7-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035649" comment="java-1_6_0-sun-plugin less than 1.6.0.u7-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035650" comment="java-1_6_0-sun less than 1.6.0.u7-1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3111</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3111" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3111" source="CVE"/>
	<description>
	Multiple buffer overflows in Sun Java Web Start in JDK and JRE 6 before Update 4, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allow context-dependent attackers to gain privileges via an untrusted application, as demonstrated by (a) an application that grants itself privileges to (1) read local files, (2) write to local files, or (3) execute local programs; and as demonstrated by (b) a long value associated with a java-vm-args attribute in a j2se tag in a JNLP file, which triggers a stack-based buffer overflow in the GetVMArgsOption function; aka CR 6557220.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 310064634aaa1eb786789b6e26d97495 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035645" comment="java-1_6_0-sun-alsa less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035646" comment="java-1_6_0-sun-demo less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035647" comment="java-1_6_0-sun-devel less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035648" comment="java-1_6_0-sun-jdbc less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035649" comment="java-1_6_0-sun-plugin less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035650" comment="java-1_6_0-sun less than 1.6.0.u7-1.1"/>
		</criteria>
	</criteria>
	<!-- 619e2632e70e459017e1f83140ed9d5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035651" comment="java-1_5_0-sun-alsa less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035652" comment="java-1_5_0-sun-demo less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035653" comment="java-1_5_0-sun-devel less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035654" comment="java-1_5_0-sun-jdbc less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035655" comment="java-1_5_0-sun-plugin less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035656" comment="java-1_5_0-sun-src less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035657" comment="java-1_5_0-sun less than 1.5.0_update16-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3112</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3112" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3112" source="CVE"/>
	<description>
	Directory traversal vulnerability in Sun Java Web Start in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allows remote attackers to create arbitrary files via the writeManifest method in the CacheEntry class, aka CR 6703909.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 310064634aaa1eb786789b6e26d97495 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035645" comment="java-1_6_0-sun-alsa less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035646" comment="java-1_6_0-sun-demo less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035647" comment="java-1_6_0-sun-devel less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035648" comment="java-1_6_0-sun-jdbc less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035649" comment="java-1_6_0-sun-plugin less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035650" comment="java-1_6_0-sun less than 1.6.0.u7-1.1"/>
		</criteria>
	</criteria>
	<!-- 619e2632e70e459017e1f83140ed9d5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035651" comment="java-1_5_0-sun-alsa less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035652" comment="java-1_5_0-sun-demo less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035653" comment="java-1_5_0-sun-devel less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035654" comment="java-1_5_0-sun-jdbc less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035655" comment="java-1_5_0-sun-plugin less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035656" comment="java-1_5_0-sun-src less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035657" comment="java-1_5_0-sun less than 1.5.0_update16-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3113</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3113" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3113" source="CVE"/>
	<description>
	Unspecified vulnerability in Sun Java Web Start in JDK and JRE 5.0 before Update 16 and SDK and JRE 1.4.x before 1.4.2_18 allows remote attackers to create or delete arbitrary files via an untrusted application, aka CR 6704077.
	</description>
 </metadata>
<!-- 619e2632e70e459017e1f83140ed9d5b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035651" comment="java-1_5_0-sun-alsa less than 1.5.0_update16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035652" comment="java-1_5_0-sun-demo less than 1.5.0_update16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035653" comment="java-1_5_0-sun-devel less than 1.5.0_update16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035654" comment="java-1_5_0-sun-jdbc less than 1.5.0_update16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035655" comment="java-1_5_0-sun-plugin less than 1.5.0_update16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035656" comment="java-1_5_0-sun-src less than 1.5.0_update16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035657" comment="java-1_5_0-sun less than 1.5.0_update16-1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3114</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3114" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3114" source="CVE"/>
	<description>
	Unspecified vulnerability in Sun Java Web Start in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allows context-dependent attackers to obtain sensitive information (the cache location) via an untrusted application, aka CR 6704074.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 310064634aaa1eb786789b6e26d97495 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035645" comment="java-1_6_0-sun-alsa less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035646" comment="java-1_6_0-sun-demo less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035647" comment="java-1_6_0-sun-devel less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035648" comment="java-1_6_0-sun-jdbc less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035649" comment="java-1_6_0-sun-plugin less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035650" comment="java-1_6_0-sun less than 1.6.0.u7-1.1"/>
		</criteria>
	</criteria>
	<!-- 619e2632e70e459017e1f83140ed9d5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035651" comment="java-1_5_0-sun-alsa less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035652" comment="java-1_5_0-sun-demo less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035653" comment="java-1_5_0-sun-devel less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035654" comment="java-1_5_0-sun-jdbc less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035655" comment="java-1_5_0-sun-plugin less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035656" comment="java-1_5_0-sun-src less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035657" comment="java-1_5_0-sun less than 1.5.0_update16-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3115</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3115" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3115" source="CVE"/>
	<description>
	Secure Static Versioning in Sun Java JDK and JRE 6 Update 6 and earlier, and 5.0 Update 6 through 15, does not properly prevent execution of applets on older JRE releases, which might allow remote attackers to exploit vulnerabilities in these older releases.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 310064634aaa1eb786789b6e26d97495 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035645" comment="java-1_6_0-sun-alsa less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035646" comment="java-1_6_0-sun-demo less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035647" comment="java-1_6_0-sun-devel less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035648" comment="java-1_6_0-sun-jdbc less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035649" comment="java-1_6_0-sun-plugin less than 1.6.0.u7-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035650" comment="java-1_6_0-sun less than 1.6.0.u7-1.1"/>
		</criteria>
	</criteria>
	<!-- 619e2632e70e459017e1f83140ed9d5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035651" comment="java-1_5_0-sun-alsa less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035652" comment="java-1_5_0-sun-demo less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035653" comment="java-1_5_0-sun-devel less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035654" comment="java-1_5_0-sun-jdbc less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035655" comment="java-1_5_0-sun-plugin less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035656" comment="java-1_5_0-sun-src less than 1.5.0_update16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035657" comment="java-1_5_0-sun less than 1.5.0_update16-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3134</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3134" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3134" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in GraphicsMagick before 1.2.4 allow remote attackers to cause a denial of service (crash, infinite loop, or memory consumption) via (a) unspecified vectors in the (1) AVI, (2) AVS, (3) DCM, (4) EPT, (5) FITS, (6) MTV, (7) PALM, (8) RLA, and (9) TGA decoder readers; and (b) the GetImageCharacteristics function in magick/image.c, as reachable from a crafted (10) PNG, (11) JPEG, (12) BMP, or (13) TIFF file.
	</description>
 </metadata>
<!-- b5bb7b0615d4f2adfb73a3788a1c6be6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035658" comment="GraphicsMagick-devel less than 1.1.8-20.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035659" comment="GraphicsMagick less than 1.1.8-20.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035660" comment="libGraphicsMagick++-devel less than 1.1.8-20.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035661" comment="libGraphicsMagick++1 less than 1.1.8-20.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035662" comment="libGraphicsMagick1 less than 1.1.8-20.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035663" comment="libGraphicsMagickWand0 less than 1.1.8-20.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035664" comment="perl-GraphicsMagick less than 1.1.8-20.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3137</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3137" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3137" source="CVE"/>
	<description>
	The GSM SMS dissector in Wireshark (formerly Ethereal) 0.99.2 through 1.0.0 allows remote attackers to cause a denial of service (application crash) via unknown vectors.
	</description>
 </metadata>
<!-- 5ca9a416ac4ec30747e7cba00b549045 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035665" comment="wireshark-devel less than 0.99.6-31.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035666" comment="wireshark less than 0.99.6-31.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3138</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3138" source="CVE"/>
	<description>
	The (1) PANA and (2) KISMET dissectors in Wireshark (formerly Ethereal) 0.99.3 through 1.0.0 allow remote attackers to cause a denial of service (application stop) via unknown vectors.
	</description>
 </metadata>
<!-- 5ca9a416ac4ec30747e7cba00b549045 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035665" comment="wireshark-devel less than 0.99.6-31.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035666" comment="wireshark less than 0.99.6-31.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3139</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3139" source="CVE"/>
	<description>
	The RTMPT dissector in Wireshark (formerly Ethereal) 0.99.8 through 1.0.0 allows remote attackers to cause a denial of service (crash) via unknown vectors.  NOTE: this might be due to a use-after-free error.
	</description>
 </metadata>
<!-- 5ca9a416ac4ec30747e7cba00b549045 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035665" comment="wireshark-devel less than 0.99.6-31.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035666" comment="wireshark less than 0.99.6-31.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3140</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3140" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3140" source="CVE"/>
	<description>
	The syslog dissector in Wireshark (formerly Ethereal) 1.0.0 allows remote attackers to cause a denial of service (application crash) via unknown vectors, possibly related to an "incomplete SS7 MSU syslog encapsulated packet."
	</description>
 </metadata>
<!-- 5ca9a416ac4ec30747e7cba00b549045 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035665" comment="wireshark-devel less than 0.99.6-31.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035666" comment="wireshark less than 0.99.6-31.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3141</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3141" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3141" source="CVE"/>
	<description>
	Unspecified vulnerability in the RMI dissector in Wireshark (formerly Ethereal) 0.9.5 through 1.0.0 allows remote attackers to read system memory via unspecified vectors.
	</description>
 </metadata>
<!-- 5ca9a416ac4ec30747e7cba00b549045 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035665" comment="wireshark-devel less than 0.99.6-31.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035666" comment="wireshark less than 0.99.6-31.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3142</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3142" source="CVE"/>
	<description>
	Multiple buffer overflows in Python 2.5.2 and earlier on 32bit platforms allow context-dependent attackers to cause a denial of service (crash) or have unspecified other impact via a long string that leads to incorrect memory allocation during Unicode string processing, related to the unicode_resize function and the PyMem_RESIZE macro.
	</description>
 </metadata>
<!-- c8b656554bbd35c8bfbd98a7d349cf23 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035309" comment="python-32bit less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035310" comment="python-64bit less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035311" comment="python-curses less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035312" comment="python-demo less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035313" comment="python-devel less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035314" comment="python-gdbm less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035315" comment="python-idle less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035316" comment="python-tk less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035317" comment="python-xml less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035318" comment="python less than 2.5.1-39.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3143</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3143" source="CVE"/>
	<description>
	Multiple integer overflows in Python before 2.5.2 might allow context-dependent attackers to have an unknown impact via vectors related to (1) Include/pymem.h; (2) _csv.c, (3) _struct.c, (4) arraymodule.c, (5) audioop.c, (6) binascii.c, (7) cPickle.c, (8) cStringIO.c, (9) cjkcodecs/multibytecodec.c, (10) datetimemodule.c, (11) md5.c, (12) rgbimgmodule.c, and (13) stropmodule.c in Modules/; (14) bufferobject.c, (15) listobject.c, and (16) obmalloc.c in Objects/; (17) Parser/node.c; and (18) asdl.c, (19) ast.c, (20) bltinmodule.c, and (21) compile.c in Python/, as addressed by "checks for integer overflows, contributed by Google."
	</description>
 </metadata>
<!-- c8b656554bbd35c8bfbd98a7d349cf23 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035309" comment="python-32bit less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035310" comment="python-64bit less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035311" comment="python-curses less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035312" comment="python-demo less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035313" comment="python-devel less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035314" comment="python-gdbm less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035315" comment="python-idle less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035316" comment="python-tk less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035317" comment="python-xml less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035318" comment="python less than 2.5.1-39.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3144</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3144" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3144" source="CVE"/>
	<description>
	Multiple integer overflows in the PyOS_vsnprintf function in Python/mysnprintf.c in Python 2.5.2 and earlier allow context-dependent attackers to cause a denial of service (memory corruption) or have unspecified other impact via crafted input to string formatting operations.  NOTE: the handling of certain integer values is also affected by related integer underflows and an off-by-one error.
	</description>
 </metadata>
<!-- c8b656554bbd35c8bfbd98a7d349cf23 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035309" comment="python-32bit less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035310" comment="python-64bit less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035311" comment="python-curses less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035312" comment="python-demo less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035313" comment="python-devel less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035314" comment="python-gdbm less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035315" comment="python-idle less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035316" comment="python-tk less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035317" comment="python-xml less than 2.5.1-39.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035318" comment="python less than 2.5.1-39.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3145</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3145" source="CVE"/>
	<description>
	The fragment_add_work function in epan/reassemble.c in Wireshark 0.8.19 through 1.0.1 allows remote attackers to cause a denial of service (crash) via a series of fragmented packets with non-sequential fragmentation offset values, which lead to a buffer over-read.
	</description>
 </metadata>
<!-- 5ca9a416ac4ec30747e7cba00b549045 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035665" comment="wireshark-devel less than 0.99.6-31.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035666" comment="wireshark less than 0.99.6-31.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3146</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3146" source="CVE"/>
	<description>
	Multiple buffer overflows in packet_ncp2222.inc in Wireshark (formerly Ethereal) 0.9.7 through 1.0.2 allow attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted NCP packet that causes an invalid pointer to be used.
	</description>
 </metadata>
<!-- 5ca9a416ac4ec30747e7cba00b549045 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035665" comment="wireshark-devel less than 0.99.6-31.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035666" comment="wireshark less than 0.99.6-31.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3187</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3187" source="CVE"/>
	<description>
	zypp-refresh-patches in zypper in SUSE openSUSE 10.2, 10.3, and 11.0 does not ask the user before accepting repository keys, which allows remote repositories to cause a denial of service (package data corruption) via a spoofed key.
	</description>
 </metadata>
<!-- 5a3677363366d65dd4029e4651c9c090 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035667" comment="libzypp-devel less than 3.27.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035668" comment="libzypp less than 3.27.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035669" comment="zypper less than 0.8.26-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3197</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3197" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3197" source="CVE"/>
	<description>
	Cross-site request forgery (CSRF) vulnerability in phpMyAdmin before 2.11.7.1 allows remote attackers to perform unauthorized actions via a link or IMG tag to (1) the db parameter in the "Creating a Database" functionality (db_create.php), and (2) the convcharset and collation_connection parameters related to an unspecified program that modifies the connection character set.
	</description>
 </metadata>
<!-- 73adad68b37fe8bb88a7a57d6f7234c4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035069" comment="phpMyAdmin less than 2.11.9.4-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3231</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3231" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3231" source="CVE"/>
	<description>
	xine-lib before 1.1.15 allows remote attackers to cause a denial of service (crash) via a crafted OGG file, as demonstrated by playing lol-ffplay.ogg with xine.
	</description>
 </metadata>
<!-- 9e1a1d630bb1286b77d0fc2d6b00aa8c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035670" comment="xine-devel less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035671" comment="xine-extra less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035672" comment="xine-lib-32bit less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035673" comment="xine-lib-64bit less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035674" comment="xine-lib less than 1.1.8-14.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3272</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3272" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3272" source="CVE"/>
	<description>
	The snd_seq_oss_synth_make_info function in sound/core/seq/oss/seq_oss_synth.c in the sound subsystem in the Linux kernel before 2.6.27-rc2 does not verify that the device number is within the range defined by max_synthdev before returning certain data to the caller, which allows local users to obtain sensitive information.
	</description>
 </metadata>
<!-- 3837c2df513f0088f0fdd19fc0db5adc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034714" comment="kernel-bigsmp less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034715" comment="kernel-debug less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034716" comment="kernel-default less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034717" comment="kernel-kdump less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034718" comment="kernel-ppc64 less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034719" comment="kernel-source less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034720" comment="kernel-syms less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034721" comment="kernel-xen less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034722" comment="kernel-xenpae less than 2.6.22.19-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3276</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3276" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3276" source="CVE"/>
	<description>
	Integer overflow in the dccp_setsockopt_change function in net/dccp/proto.c in the Datagram Congestion Control Protocol (DCCP) subsystem in the Linux kernel 2.6.17-rc1 through 2.6.26.2 allows remote attackers to cause a denial of service (panic) via a crafted integer value, related to Change L and Change R options without at least one byte in the dccpsf_val field.
	</description>
 </metadata>
<!-- 3837c2df513f0088f0fdd19fc0db5adc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034714" comment="kernel-bigsmp less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034715" comment="kernel-debug less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034716" comment="kernel-default less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034717" comment="kernel-kdump less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034718" comment="kernel-ppc64 less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034719" comment="kernel-source less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034720" comment="kernel-syms less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034721" comment="kernel-xen less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034722" comment="kernel-xenpae less than 2.6.22.19-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3281</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3281" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3281" source="CVE"/>
	<description>
	libxml2 2.6.32 and earlier does not properly detect recursion during entity expansion in an attribute value, which allows context-dependent attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document.
	</description>
 </metadata>
<!-- cb85bf797f7a59a3d3dd88dcfdc9e054 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035675" comment="libxml2-32bit less than 2.6.30-4.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035676" comment="libxml2-64bit less than 2.6.30-4.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035677" comment="libxml2-devel-32bit less than 2.6.30-4.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035678" comment="libxml2-devel-64bit less than 2.6.30-4.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035679" comment="libxml2-devel less than 2.6.30-4.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035680" comment="libxml2 less than 2.6.30-4.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3326</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3326" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3326" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in blog/edit.php in Moodle 1.6.x before 1.6.7 and 1.7.x before 1.7.5 allows remote attackers to inject arbitrary web script or HTML via the etitle parameter (blog entry title).
	</description>
 </metadata>
<!-- b54e6e067ac98275e4a197cc7d5750ce -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035681" comment="moodle-af less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035682" comment="moodle-ar less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035683" comment="moodle-be less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035684" comment="moodle-bg less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035685" comment="moodle-bs less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035686" comment="moodle-ca less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035687" comment="moodle-cs less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035688" comment="moodle-da less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035689" comment="moodle-de less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035690" comment="moodle-de_du less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035691" comment="moodle-el less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035692" comment="moodle-es less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035693" comment="moodle-et less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035694" comment="moodle-eu less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035695" comment="moodle-fa less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035696" comment="moodle-fi less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035697" comment="moodle-fr less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035698" comment="moodle-ga less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035699" comment="moodle-gl less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035700" comment="moodle-he less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035701" comment="moodle-hi less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035702" comment="moodle-hr less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035703" comment="moodle-hu less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035704" comment="moodle-id less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035705" comment="moodle-is less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035706" comment="moodle-it less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035707" comment="moodle-ja less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035708" comment="moodle-ka less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035709" comment="moodle-km less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035710" comment="moodle-kn less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035711" comment="moodle-ko less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035712" comment="moodle-lt less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035713" comment="moodle-lv less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035714" comment="moodle-mi_tn less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035715" comment="moodle-ms less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035716" comment="moodle-nl less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035717" comment="moodle-nn less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035718" comment="moodle-no less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035719" comment="moodle-pl less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035720" comment="moodle-pt less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035721" comment="moodle-ro less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035722" comment="moodle-ru less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035723" comment="moodle-sk less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035724" comment="moodle-sl less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035725" comment="moodle-so less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035726" comment="moodle-sq less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035727" comment="moodle-sr less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035728" comment="moodle-sv less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035729" comment="moodle-th less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035730" comment="moodle-tl less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035731" comment="moodle-tr less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035732" comment="moodle-uk less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035733" comment="moodle-vi less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035734" comment="moodle-zh_cn less than 1.8.2-17.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035735" comment="moodle less than 1.8.2-17.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3330</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3330" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3330" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in services/obrowser/index.php in Horde 3.2 and Turba 2.2 allows remote attackers to inject arbitrary web script or HTML via the contact name.
	</description>
 </metadata>
<!-- 053dcf38e8e9d6fdeeb7f45d6ec75497 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035099" comment="horde less than 3.1.4-55.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3337</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3337" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3337" source="CVE"/>
	<description>
	PowerDNS Authoritative Server before 2.9.21.1 drops malformed queries, which might make it easier for remote attackers to poison DNS caches of other products running on other servers, a different issue than CVE-2008-1447 and CVE-2008-3217.
	</description>
 </metadata>
<!-- 638eccb4311efca843f9620e49df0369 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035736" comment="pdns-backend-ldap less than 2.9.21-57.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035737" comment="pdns-backend-mysql less than 2.9.21-57.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035738" comment="pdns-backend-postgresql less than 2.9.21-57.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035739" comment="pdns-backend-sqlite2 less than 2.9.21-57.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035740" comment="pdns-backend-sqlite3 less than 2.9.21-57.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035741" comment="pdns less than 2.9.21-57.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3422</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3422" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in the ASP.net class libraries in Mono 2.0 and earlier allow remote attackers to inject arbitrary web script or HTML via crafted attributes related to (1) HtmlControl.cs (PreProcessRelativeReference), (2) HtmlForm.cs (RenderAttributes), (3) HtmlInputButton (RenderAttributes), (4) HtmlInputRadioButton (RenderAttributes), and (5) HtmlSelect (RenderChildren).
	</description>
 </metadata>
<!-- 0172c8227ed27c753945cd3cbb221756 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035742" comment="bytefx-data-mysql less than 1.2.5-16.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035743" comment="ibm-data-db2 less than 1.2.5-16.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035744" comment="mono-complete less than 1.2.5-16.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035745" comment="mono-core-32bit less than 1.2.5-16.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035746" comment="mono-core less than 1.2.5-16.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035747" comment="mono-data-firebird less than 1.2.5-16.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035748" comment="mono-data-oracle less than 1.2.5-16.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035749" comment="mono-data-postgresql less than 1.2.5-16.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035750" comment="mono-data-sqlite less than 1.2.5-16.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035751" comment="mono-data-sybase less than 1.2.5-16.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035752" comment="mono-data less than 1.2.5-16.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035753" comment="mono-devel less than 1.2.5-16.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035754" comment="mono-extras less than 1.2.5-16.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035755" comment="mono-jscript less than 1.2.5-16.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035756" comment="mono-locale-extras less than 1.2.5-16.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035757" comment="mono-nunit less than 1.2.5-16.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035758" comment="mono-web less than 1.2.5-16.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035759" comment="mono-winforms less than 1.2.5-16.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3443</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3443" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3443" source="CVE"/>
	<description>
	The regular expression engine (regex.c) in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows remote attackers to cause a denial of service (infinite loop and crash) via multiple long requests to a Ruby socket, related to memory allocation failure, and as demonstrated against Webrick.
	</description>
 </metadata>
<!-- c147c81633c8cf23c7022e50919e2209 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053195" comment="ruby-devel less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053196" comment="ruby-doc-html less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053197" comment="ruby-doc-ri less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053198" comment="ruby-examples less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053199" comment="ruby-test-suite less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053200" comment="ruby-tk less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053201" comment="ruby less than 1.8.6.p369-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3456</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3456" source="CVE"/>
	<description>
	phpMyAdmin before 2.11.8 does not sufficiently prevent its pages from using frames that point to pages in other domains, which makes it easier for remote attackers to conduct spoofing or phishing activities via a cross-site framing attack.
	</description>
 </metadata>
<!-- 210bef7353b9649fc050be76231b51bf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035068" comment="phpMyAdmin less than 2.11.9-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3457</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3457" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3457" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in setup.php in phpMyAdmin before 2.11.8 allows user-assisted remote attackers to inject arbitrary web script or HTML via crafted setup arguments.  NOTE: this issue can only be exploited in limited scenarios in which the attacker must be able to modify config/config.inc.php.
	</description>
 </metadata>
<!-- 210bef7353b9649fc050be76231b51bf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035068" comment="phpMyAdmin less than 2.11.9-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3496</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3496" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3496" source="CVE"/>
	<description>
	Buffer overflow in format descriptor parsing in the uvc_parse_format function in drivers/media/video/uvc/uvc_driver.c in uvcvideo in the video4linux (V4L) implementation in the Linux kernel before 2.6.26.1 has unknown impact and attack vectors.
	</description>
 </metadata>
<!-- cd7559ee4dbc8e406b32f846f2ab8e42 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035760" comment="uvcvideo-kmp-bigsmp less than r117_2.6.22.18_0.2-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035761" comment="uvcvideo-kmp-debug less than r117_2.6.22.18_0.2-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035762" comment="uvcvideo-kmp-default less than r117_2.6.22.18_0.2-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035763" comment="uvcvideo-kmp-ppc64 less than r117_2.6.22.18_0.2-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035764" comment="uvcvideo-kmp-xen less than r117_2.6.22.18_0.2-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035765" comment="uvcvideo-kmp-xenpae less than r117_2.6.22.18_0.2-1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3520</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3520" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3520" source="CVE"/>
	<description>
	Multiple integer overflows in JasPer 1.900.1 might allow context-dependent attackers to have an unknown impact via a crafted image file, related to integer multiplication for memory allocation.
	</description>
 </metadata>
<!-- 1d512d5e7c85248991f695fbaab5b60b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035766" comment="jasper less than 1.900.1-44.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035767" comment="libjasper-32bit less than 1.900.1-44.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035768" comment="libjasper-64bit less than 1.900.1-44.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035769" comment="libjasper-devel less than 1.900.1-44.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035770" comment="libjasper less than 1.900.1-44.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3521</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3521" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3521" source="CVE"/>
	<description>
	Race condition in the jas_stream_tmpfile function in libjasper/base/jas_stream.c in JasPer 1.900.1 allows local users to cause a denial of service (program exit) by creating the appropriate tmp.XXXXXXXXXX temporary file, which causes Jasper to exit.  NOTE: this was originally reported as a symlink issue, but this was incorrect.  NOTE: some vendors dispute the severity of this issue, but it satisfies CVE's requirements for inclusion.
	</description>
 </metadata>
<!-- 1d512d5e7c85248991f695fbaab5b60b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035766" comment="jasper less than 1.900.1-44.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035767" comment="libjasper-32bit less than 1.900.1-44.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035768" comment="libjasper-64bit less than 1.900.1-44.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035769" comment="libjasper-devel less than 1.900.1-44.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035770" comment="libjasper less than 1.900.1-44.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3522</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3522" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3522" source="CVE"/>
	<description>
	Buffer overflow in the jas_stream_printf function in libjasper/base/jas_stream.c in JasPer 1.900.1 might allow context-dependent attackers to have an unknown impact via vectors related to the mif_hdr_put function and use of vsprintf.
	</description>
 </metadata>
<!-- 1d512d5e7c85248991f695fbaab5b60b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035766" comment="jasper less than 1.900.1-44.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035767" comment="libjasper-32bit less than 1.900.1-44.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035768" comment="libjasper-64bit less than 1.900.1-44.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035769" comment="libjasper-devel less than 1.900.1-44.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035770" comment="libjasper less than 1.900.1-44.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3525</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3525" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3525" source="CVE"/>
	<description>
	The sbni_ioctl function in drivers/net/wan/sbni.c in the wan subsystem in the Linux kernel 2.6.26.3 does not check for the CAP_NET_ADMIN capability before processing a (1) SIOCDEVRESINSTATS, (2) SIOCDEVSHWSTATE, (3) SIOCDEVENSLAVE, or (4) SIOCDEVEMANSIPATE ioctl request, which allows local users to bypass intended capability restrictions.
	</description>
 </metadata>
<!-- 3837c2df513f0088f0fdd19fc0db5adc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034714" comment="kernel-bigsmp less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034715" comment="kernel-debug less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034716" comment="kernel-default less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034717" comment="kernel-kdump less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034718" comment="kernel-ppc64 less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034719" comment="kernel-source less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034720" comment="kernel-syms less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034721" comment="kernel-xen less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034722" comment="kernel-xenpae less than 2.6.22.19-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3528</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3528" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3528" source="CVE"/>
	<description>
	The error-reporting functionality in (1) fs/ext2/dir.c, (2) fs/ext3/dir.c, and possibly (3) fs/ext4/dir.c in the Linux kernel 2.6.26.5 does not limit the number of printk console messages that report directory corruption, which allows physically proximate attackers to cause a denial of service (temporary system hang) by mounting a filesystem that has corrupted dir-&gt;i_size and dir-&gt;i_blocks values and performing (a) read or (b) write operations.  NOTE: there are limited scenarios in which this crosses privilege boundaries.
	</description>
 </metadata>
<!-- 3837c2df513f0088f0fdd19fc0db5adc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034714" comment="kernel-bigsmp less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034715" comment="kernel-debug less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034716" comment="kernel-default less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034717" comment="kernel-kdump less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034718" comment="kernel-ppc64 less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034719" comment="kernel-source less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034720" comment="kernel-syms less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034721" comment="kernel-xen less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034722" comment="kernel-xenpae less than 2.6.22.19-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3529</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3529" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3529" source="CVE"/>
	<description>
	Heap-based buffer overflow in the xmlParseAttValueComplex function in parser.c in libxml2 before 2.7.0 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a long XML entity name.
	</description>
 </metadata>
<!-- cb85bf797f7a59a3d3dd88dcfdc9e054 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035675" comment="libxml2-32bit less than 2.6.30-4.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035676" comment="libxml2-64bit less than 2.6.30-4.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035677" comment="libxml2-devel-32bit less than 2.6.30-4.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035678" comment="libxml2-devel-64bit less than 2.6.30-4.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035679" comment="libxml2-devel less than 2.6.30-4.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035680" comment="libxml2 less than 2.6.30-4.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3532</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3532" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3532" source="CVE"/>
	<description>
	The NSS plugin in libpurple in Pidgin 2.4.3 does not verify SSL certificates, which makes it easier for remote attackers to trick a user into accepting an invalid server certificate for a spoofed service.
	</description>
 </metadata>
<!-- ea9754c57ea8497ff369046cb5102727 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035614" comment="finch-devel less than 2.3.1-26.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035615" comment="finch less than 2.3.1-26.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035616" comment="libpurple-devel less than 2.3.1-26.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035617" comment="libpurple-meanwhile less than 2.3.1-26.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035618" comment="libpurple-mono less than 2.3.1-26.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035619" comment="libpurple less than 2.3.1-26.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035620" comment="pidgin-devel less than 2.3.1-26.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035621" comment="pidgin less than 2.3.1-26.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3546</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3546" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3546" source="CVE"/>
	<description>
	Stack-based buffer overflow in the (1) diff_addremove and (2) diff_change functions in GIT before 1.5.6.4 might allow local users to execute arbitrary code via a PATH whose length is larger than the system's PATH_MAX when running GIT utilities such as git-diff or git-grep.
	</description>
 </metadata>
<!-- df940324c4d021a37ad8504b3e520515 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035771" comment="git-arch less than 1.5.2.4-24.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035772" comment="git-core less than 1.5.2.4-24.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035773" comment="git-cvs less than 1.5.2.4-24.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035774" comment="git-email less than 1.5.2.4-24.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035775" comment="git-svn less than 1.5.2.4-24.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035776" comment="git less than 1.5.2.4-24.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035777" comment="gitk less than 1.5.2.4-24.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3639</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3639" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3639" source="CVE"/>
	<description>
	Heap-based buffer overflow in the read_rle16 function in imagetops in CUPS before 1.3.9 allows remote attackers to execute arbitrary code via an SGI image with malformed Run Length Encoded (RLE) data containing a small image and a large row count.
	</description>
 </metadata>
<!-- 3586142cf9caac3aeae282ce5f562d43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035778" comment="cups-client less than 1.2.12-22.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035779" comment="cups-devel less than 1.2.12-22.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035780" comment="cups-libs-32bit less than 1.2.12-22.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035781" comment="cups-libs-64bit less than 1.2.12-22.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035782" comment="cups-libs less than 1.2.12-22.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035783" comment="cups less than 1.2.12-22.17"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3640</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3640" source="CVE"/>
	<description>
	Integer overflow in the WriteProlog function in texttops in CUPS before 1.3.9 allows remote attackers to execute arbitrary code via a crafted PostScript file that triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 3586142cf9caac3aeae282ce5f562d43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035778" comment="cups-client less than 1.2.12-22.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035779" comment="cups-devel less than 1.2.12-22.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035780" comment="cups-libs-32bit less than 1.2.12-22.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035781" comment="cups-libs-64bit less than 1.2.12-22.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035782" comment="cups-libs less than 1.2.12-22.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035783" comment="cups less than 1.2.12-22.17"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3641</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3641" source="CVE"/>
	<description>
	The Hewlett-Packard Graphics Language (HPGL) filter in CUPS before 1.3.9 allows remote attackers to execute arbitrary code via crafted pen width and pen color opcodes that overwrite arbitrary memory.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3586142cf9caac3aeae282ce5f562d43 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035778" comment="cups-client less than 1.2.12-22.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035779" comment="cups-devel less than 1.2.12-22.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035780" comment="cups-libs-32bit less than 1.2.12-22.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035781" comment="cups-libs-64bit less than 1.2.12-22.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035782" comment="cups-libs less than 1.2.12-22.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035783" comment="cups less than 1.2.12-22.17"/>
		</criteria>
	</criteria>
	<!-- 525d0ad33e6d135b050b10cbc390c0b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035784" comment="cups-client less than 1.2.12-22.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035785" comment="cups-devel less than 1.2.12-22.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035786" comment="cups-libs-32bit less than 1.2.12-22.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035787" comment="cups-libs-64bit less than 1.2.12-22.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035788" comment="cups-libs less than 1.2.12-22.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035789" comment="cups less than 1.2.12-22.19"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3651</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3651" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3651" source="CVE"/>
	<description>
	Memory leak in racoon/proposal.c in the racoon daemon in ipsec-tools before 0.7.1 allows remote authenticated users to cause a denial of service (memory consumption) via invalid proposals.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 072d138024e34743f78d1cac3ef2407d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035790" comment="novell-ipsec-tools-devel less than 0.6.3-114.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035791" comment="novell-ipsec-tools less than 0.6.3-114.4"/>
		</criteria>
	</criteria>
	<!-- daac38ca0c5c3691baed09fffe2f0476 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035792" comment="ipsec-tools less than 0.6.5-104.3"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3652</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3652" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3652" source="CVE"/>
	<description>
	src/racoon/handler.c in racoon in ipsec-tools does not remove an "orphaned ph1" (phase 1) handle when it has been initiated remotely, which allows remote attackers to cause a denial of service (resource consumption).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 072d138024e34743f78d1cac3ef2407d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035790" comment="novell-ipsec-tools-devel less than 0.6.3-114.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035791" comment="novell-ipsec-tools less than 0.6.3-114.4"/>
		</criteria>
	</criteria>
	<!-- daac38ca0c5c3691baed09fffe2f0476 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035792" comment="ipsec-tools less than 0.6.5-104.3"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3655</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3655" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3655" source="CVE"/>
	<description>
	Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.
	</description>
 </metadata>
<!-- c147c81633c8cf23c7022e50919e2209 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053195" comment="ruby-devel less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053196" comment="ruby-doc-html less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053197" comment="ruby-doc-ri less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053198" comment="ruby-examples less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053199" comment="ruby-test-suite less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053200" comment="ruby-tk less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053201" comment="ruby less than 1.8.6.p369-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3656</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3656" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3656" source="CVE"/>
	<description>
	Algorithmic complexity vulnerability in the WEBrick::HTTPUtils.split_header_value function in WEBrick::HTTP::DefaultFileHandler in WEBrick in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted HTTP request that is processed by a backtracking regular expression.
	</description>
 </metadata>
<!-- c147c81633c8cf23c7022e50919e2209 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053195" comment="ruby-devel less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053196" comment="ruby-doc-html less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053197" comment="ruby-doc-ri less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053198" comment="ruby-examples less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053199" comment="ruby-test-suite less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053200" comment="ruby-tk less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053201" comment="ruby less than 1.8.6.p369-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3657</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3657" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3657" source="CVE"/>
	<description>
	The dl module in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not check "taintness" of inputs, which allows context-dependent attackers to bypass safe levels and execute dangerous functions by accessing a library using DL.dlopen.
	</description>
 </metadata>
<!-- c147c81633c8cf23c7022e50919e2209 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053195" comment="ruby-devel less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053196" comment="ruby-doc-html less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053197" comment="ruby-doc-ri less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053198" comment="ruby-examples less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053199" comment="ruby-test-suite less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053200" comment="ruby-tk less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053201" comment="ruby less than 1.8.6.p369-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3658</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3658" source="CVE"/>
	<description>
	Buffer overflow in the imageloadfont function in ext/gd/gd.c in PHP 4.4.x before 4.4.9 and PHP 5.2 before 5.2.6-r6 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
<!-- 7d59d98c96517376a88d8fdea1148b73 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035793" comment="apache2-mod_php5 less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035794" comment="php5-bcmath less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035795" comment="php5-bz2 less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035796" comment="php5-calendar less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035797" comment="php5-ctype less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035798" comment="php5-curl less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035799" comment="php5-dba less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035800" comment="php5-dbase less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035801" comment="php5-devel less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035802" comment="php5-dom less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035803" comment="php5-exif less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035804" comment="php5-fastcgi less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035805" comment="php5-ftp less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035806" comment="php5-gd less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035807" comment="php5-gettext less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035808" comment="php5-gmp less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035809" comment="php5-hash less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035810" comment="php5-iconv less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035811" comment="php5-imap less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035812" comment="php5-json less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035813" comment="php5-ldap less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035814" comment="php5-mbstring less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035815" comment="php5-mcrypt less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035816" comment="php5-mhash less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035817" comment="php5-mysql less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035818" comment="php5-ncurses less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035819" comment="php5-odbc less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035820" comment="php5-openssl less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035821" comment="php5-pcntl less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035822" comment="php5-pdo less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035823" comment="php5-pear less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035824" comment="php5-pgsql less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035825" comment="php5-posix less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035826" comment="php5-pspell less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035827" comment="php5-readline less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035828" comment="php5-shmop less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035829" comment="php5-snmp less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035830" comment="php5-soap less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035831" comment="php5-sockets less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035832" comment="php5-sqlite less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035833" comment="php5-suhosin less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035834" comment="php5-sysvmsg less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035835" comment="php5-sysvsem less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035836" comment="php5-sysvshm less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035837" comment="php5-tidy less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035838" comment="php5-tokenizer less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035839" comment="php5-wddx less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035840" comment="php5-xmlreader less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035841" comment="php5-xmlrpc less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035842" comment="php5-xmlwriter less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035843" comment="php5-xsl less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035844" comment="php5-zip less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035845" comment="php5-zlib less than 5.2.6-0.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3659</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3659" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3659" source="CVE"/>
	<description>
	Buffer overflow in the memnstr function in PHP 4.4.x before 4.4.9 and PHP 5.6 through 5.2.6 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via the delimiter argument to the explode function.  NOTE: the scope of this issue is limited since most applications would not use an attacker-controlled delimiter, but local attacks against safe_mode are feasible.
	</description>
 </metadata>
<!-- 7d59d98c96517376a88d8fdea1148b73 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035793" comment="apache2-mod_php5 less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035794" comment="php5-bcmath less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035795" comment="php5-bz2 less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035796" comment="php5-calendar less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035797" comment="php5-ctype less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035798" comment="php5-curl less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035799" comment="php5-dba less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035800" comment="php5-dbase less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035801" comment="php5-devel less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035802" comment="php5-dom less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035803" comment="php5-exif less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035804" comment="php5-fastcgi less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035805" comment="php5-ftp less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035806" comment="php5-gd less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035807" comment="php5-gettext less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035808" comment="php5-gmp less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035809" comment="php5-hash less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035810" comment="php5-iconv less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035811" comment="php5-imap less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035812" comment="php5-json less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035813" comment="php5-ldap less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035814" comment="php5-mbstring less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035815" comment="php5-mcrypt less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035816" comment="php5-mhash less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035817" comment="php5-mysql less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035818" comment="php5-ncurses less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035819" comment="php5-odbc less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035820" comment="php5-openssl less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035821" comment="php5-pcntl less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035822" comment="php5-pdo less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035823" comment="php5-pear less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035824" comment="php5-pgsql less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035825" comment="php5-posix less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035826" comment="php5-pspell less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035827" comment="php5-readline less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035828" comment="php5-shmop less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035829" comment="php5-snmp less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035830" comment="php5-soap less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035831" comment="php5-sockets less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035832" comment="php5-sqlite less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035833" comment="php5-suhosin less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035834" comment="php5-sysvmsg less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035835" comment="php5-sysvsem less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035836" comment="php5-sysvshm less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035837" comment="php5-tidy less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035838" comment="php5-tokenizer less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035839" comment="php5-wddx less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035840" comment="php5-xmlreader less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035841" comment="php5-xmlrpc less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035842" comment="php5-xmlwriter less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035843" comment="php5-xsl less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035844" comment="php5-zip less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035845" comment="php5-zlib less than 5.2.6-0.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3660</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3660" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3660" source="CVE"/>
	<description>
	PHP 4.4.x before 4.4.9, and 5.x through 5.2.6, when used as a FastCGI module, allows remote attackers to cause a denial of service (crash) via a request with multiple dots preceding the extension, as demonstrated using foo..php.
	</description>
 </metadata>
<!-- 7d59d98c96517376a88d8fdea1148b73 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035793" comment="apache2-mod_php5 less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035794" comment="php5-bcmath less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035795" comment="php5-bz2 less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035796" comment="php5-calendar less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035797" comment="php5-ctype less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035798" comment="php5-curl less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035799" comment="php5-dba less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035800" comment="php5-dbase less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035801" comment="php5-devel less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035802" comment="php5-dom less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035803" comment="php5-exif less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035804" comment="php5-fastcgi less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035805" comment="php5-ftp less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035806" comment="php5-gd less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035807" comment="php5-gettext less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035808" comment="php5-gmp less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035809" comment="php5-hash less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035810" comment="php5-iconv less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035811" comment="php5-imap less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035812" comment="php5-json less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035813" comment="php5-ldap less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035814" comment="php5-mbstring less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035815" comment="php5-mcrypt less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035816" comment="php5-mhash less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035817" comment="php5-mysql less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035818" comment="php5-ncurses less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035819" comment="php5-odbc less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035820" comment="php5-openssl less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035821" comment="php5-pcntl less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035822" comment="php5-pdo less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035823" comment="php5-pear less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035824" comment="php5-pgsql less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035825" comment="php5-posix less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035826" comment="php5-pspell less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035827" comment="php5-readline less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035828" comment="php5-shmop less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035829" comment="php5-snmp less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035830" comment="php5-soap less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035831" comment="php5-sockets less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035832" comment="php5-sqlite less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035833" comment="php5-suhosin less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035834" comment="php5-sysvmsg less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035835" comment="php5-sysvsem less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035836" comment="php5-sysvshm less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035837" comment="php5-tidy less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035838" comment="php5-tokenizer less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035839" comment="php5-wddx less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035840" comment="php5-xmlreader less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035841" comment="php5-xmlrpc less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035842" comment="php5-xmlwriter less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035843" comment="php5-xsl less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035844" comment="php5-zip less than 5.2.6-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035845" comment="php5-zlib less than 5.2.6-0.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3663</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3663" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3663" source="CVE"/>
	<description>
	Squirrelmail 1.4.15 does not set the secure flag for the session cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 216b58596b159eb38a9ff8ee0ccc682c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035846" comment="squirrelmail less than 1.4.17-0.1"/>
	</criteria>
	<!-- 546854dc802924f689bc5b363da224bb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035847" comment="squirrelmail less than 1.4.10a-45.2"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3790</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3790" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3790" source="CVE"/>
	<description>
	The REXML module in Ruby 1.8.6 through 1.8.6-p287, 1.8.7 through 1.8.7-p72, and 1.9 allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML document with recursively nested entities, aka an "XML entity explosion."
	</description>
 </metadata>
<!-- c147c81633c8cf23c7022e50919e2209 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053195" comment="ruby-devel less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053196" comment="ruby-doc-html less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053197" comment="ruby-doc-ri less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053198" comment="ruby-examples less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053199" comment="ruby-test-suite less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053200" comment="ruby-tk less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053201" comment="ruby less than 1.8.6.p369-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3824</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3824" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3824" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in (1) Text_Filter/Filter/xss.php in Horde 3.1.x before 3.1.9 and 3.2.x before 3.2.2 and (2) externalinput.php in Popoon r22196 and earlier allows remote attackers to inject arbitrary web script or HTML by using / (slash) characters as replacements for spaces in an HTML e-mail message.
	</description>
 </metadata>
<!-- 053dcf38e8e9d6fdeeb7f45d6ec75497 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035099" comment="horde less than 3.1.4-55.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3825</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3825" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3825" source="CVE"/>
	<description>
	pam_krb5 2.2.14 in Red Hat Enterprise Linux (RHEL) 5 and earlier, when the existing_ticket option is enabled, uses incorrect privileges when reading a Kerberos credential cache, which allows local users to gain privileges by setting the KRB5CCNAME environment variable to an arbitrary cache filename and running the (1) su or (2) sudo program. NOTE: there may be a related vector involving sshd that has limited relevance.
	</description>
 </metadata>
<!-- 3a9f497f4320c2dc6a5e5b07d0f5129d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035848" comment="pam_krb5-32bit less than 2.2.17-14.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035849" comment="pam_krb5-64bit less than 2.2.17-14.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035850" comment="pam_krb5 less than 2.2.17-14.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3834</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3834" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3834" source="CVE"/>
	<description>
	The dbus_signature_validate function in the D-bus library (libdbus) before 1.2.4 allows remote attackers to cause a denial of service (application abort) via a message containing a malformed signature, which triggers a failed assertion error.
	</description>
 </metadata>
<!-- e7efef6764ce287b13bc6e9e31c2e424 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035851" comment="dbus-1-32bit less than 1.0.2-59.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035852" comment="dbus-1-64bit less than 1.0.2-59.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035853" comment="dbus-1-devel-doc less than 1.0.2-59.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035854" comment="dbus-1-devel less than 1.0.2-59.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035855" comment="dbus-1-x11 less than 1.0.2-67.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035856" comment="dbus-1 less than 1.0.2-59.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3835</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3835" source="CVE"/>
	<description>
	The nsXMLDocument::OnChannelRedirect function in Mozilla Firefox before 2.0.0.17, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 48fcbb624a95b290275340017ad12e5c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034736" comment="MozillaThunderbird-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034737" comment="MozillaThunderbird less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- 6393a99a5913d7d11ba39976c6a96737 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034738" comment="seamonkey-dom-inspector less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034739" comment="seamonkey-irc less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034740" comment="seamonkey-mail less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034741" comment="seamonkey-spellchecker less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034742" comment="seamonkey-venkman less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034743" comment="seamonkey less than 1.1.12-0.1"/>
		</criteria>
	</criteria>
	<!-- aeadca331cd96b3eb60572e397c8360a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034744" comment="MozillaFirefox-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034745" comment="MozillaFirefox less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- cf6f6a3d88cd2e0c3aaf5f3d91439ad8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034746" comment="mozilla-xulrunner181-32bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034747" comment="mozilla-xulrunner181-64bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034748" comment="mozilla-xulrunner181-devel less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034749" comment="mozilla-xulrunner181-l10n less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034750" comment="mozilla-xulrunner181 less than 1.8.1.17-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3836</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3836" source="CVE"/>
	<description>
	feedWriter in Mozilla Firefox before 2.0.0.17 allows remote attackers to execute scripts with chrome privileges via vectors related to feed preview and the (1) elem.doCommand, (2) elem.dispatchEvent, (3) _setTitleText, (4) _setTitleImage, and (5) _initSubscriptionUI functions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- aeadca331cd96b3eb60572e397c8360a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034744" comment="MozillaFirefox-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034745" comment="MozillaFirefox less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- cf6f6a3d88cd2e0c3aaf5f3d91439ad8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034746" comment="mozilla-xulrunner181-32bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034747" comment="mozilla-xulrunner181-64bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034748" comment="mozilla-xulrunner181-devel less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034749" comment="mozilla-xulrunner181-l10n less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034750" comment="mozilla-xulrunner181 less than 1.8.1.17-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3837</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3837" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, and SeaMonkey before 1.1.12, allow user-assisted remote attackers to move a window during a mouse click, and possibly force a file download or unspecified other drag-and-drop action, via a crafted onmousedown action that calls window.moveBy, a variant of CVE-2003-0823.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6393a99a5913d7d11ba39976c6a96737 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034738" comment="seamonkey-dom-inspector less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034739" comment="seamonkey-irc less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034740" comment="seamonkey-mail less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034741" comment="seamonkey-spellchecker less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034742" comment="seamonkey-venkman less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034743" comment="seamonkey less than 1.1.12-0.1"/>
		</criteria>
	</criteria>
	<!-- aeadca331cd96b3eb60572e397c8360a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034744" comment="MozillaFirefox-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034745" comment="MozillaFirefox less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- cf6f6a3d88cd2e0c3aaf5f3d91439ad8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034746" comment="mozilla-xulrunner181-32bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034747" comment="mozilla-xulrunner181-64bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034748" comment="mozilla-xulrunner181-devel less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034749" comment="mozilla-xulrunner181-l10n less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034750" comment="mozilla-xulrunner181 less than 1.8.1.17-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3863</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3863" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3863" source="CVE"/>
	<description>
	Stack-based buffer overflow in the read_special_escape function in src/psgen.c in GNU Enscript 1.6.1 and 1.6.4 beta, when the -e (aka special escapes processing) option is enabled, allows user-assisted remote attackers to execute arbitrary code via a crafted ASCII file, related to the setfilename command.
	</description>
 </metadata>
<!-- 0c345c662d265ac43f250d57f85774a5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035857" comment="enscript less than 1.6.4-83.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3873</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3873" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3873" source="CVE"/>
	<description>
	The System.setClipboard method in ActionScript in Adobe Flash Player 9.0.124.0 and earlier allows remote attackers to populate the clipboard with a URL that is difficult to delete and does not require user interaction to populate the clipboard, as exploited in the wild in August 2008.
	</description>
 </metadata>
<!-- 7728fa8aa49a8cf7a4da694adb474f85 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031401" comment="flash-player less than 9.0.151.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3889</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3889" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3889" source="CVE"/>
	<description>
	Postfix 2.4 before 2.4.9, 2.5 before 2.5.5, and 2.6 before 2.6-20080902, when used with the Linux 2.6 kernel, leaks epoll file descriptors during execution of "non-Postfix" commands, which allows local users to cause a denial of service (application slowdown or exit) via a crafted command, as demonstrated by a command in a .forward file.
	</description>
 </metadata>
<!-- 87e6028c90a8a210753a5a29c29740ab -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035858" comment="postfix-devel less than 2.4.5-20.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035859" comment="postfix-mysql less than 2.4.5-20.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035860" comment="postfix-postgresql less than 2.4.5-20.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035861" comment="postfix less than 2.4.5-20.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3905</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3905" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3905" source="CVE"/>
	<description>
	resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
	</description>
 </metadata>
<!-- c147c81633c8cf23c7022e50919e2209 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053195" comment="ruby-devel less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053196" comment="ruby-doc-html less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053197" comment="ruby-doc-ri less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053198" comment="ruby-examples less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053199" comment="ruby-test-suite less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053200" comment="ruby-tk less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053201" comment="ruby less than 1.8.6.p369-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3912</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3912" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3912" source="CVE"/>
	<description>
	libclamav in ClamAV before 0.94 allows attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors related to an out-of-memory condition.
	</description>
 </metadata>
<!-- 52c9d8c4668a4786035121ed839b40aa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035178" comment="clamav-db less than 0.94-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033770" comment="clamav less than 0.94-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3913</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3913" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3913" source="CVE"/>
	<description>
	Multiple memory leaks in freshclam/manager.c in ClamAV before 0.94 might allow attackers to cause a denial of service (memory consumption) via unspecified vectors related to "error handling logic".
	</description>
 </metadata>
<!-- 52c9d8c4668a4786035121ed839b40aa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035178" comment="clamav-db less than 0.94-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033770" comment="clamav less than 0.94-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3914</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3914" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3914" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in ClamAV before 0.94 have unknown impact and attack vectors related to file descriptor leaks on the "error path" in (1) libclamav/others.c and (2) libclamav/sis.c.
	</description>
 </metadata>
<!-- 52c9d8c4668a4786035121ed839b40aa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035178" comment="clamav-db less than 0.94-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033770" comment="clamav less than 0.94-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3933</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3933" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3933" source="CVE"/>
	<description>
	Wireshark (formerly Ethereal) 0.10.14 through 1.0.2 allows attackers to cause a denial of service (crash) via a packet with crafted zlib-compressed data that triggers an invalid read in the tvb_uncompress function.
	</description>
 </metadata>
<!-- ca7dc4523ffbb7981257a4aa0529accb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035862" comment="wireshark-devel less than 0.99.6-31.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035863" comment="wireshark less than 0.99.6-31.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3934</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3934" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3934" source="CVE"/>
	<description>
	Unspecified vulnerability in Wireshark (formerly Ethereal) 0.99.6 through 1.0.2 allows attackers to cause a denial of service (crash) via a crafted Tektronix .rf5 file.
	</description>
 </metadata>
<!-- ca7dc4523ffbb7981257a4aa0529accb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035862" comment="wireshark-devel less than 0.99.6-31.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035863" comment="wireshark less than 0.99.6-31.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3949</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3949" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3949" source="CVE"/>
	<description>
	emacs/lisp/progmodes/python.el in Emacs 22.1 and 22.2 imports Python script from the current working directory during editing of a Python file, which allows local users to execute arbitrary code via a Trojan horse Python file.
	</description>
 </metadata>
<!-- 079effb353d9569d5320db0e80e80d60 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035864" comment="emacs-el less than 22.1-40.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035865" comment="emacs-info less than 22.1-40.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035866" comment="emacs-nox less than 22.1-40.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035867" comment="emacs-x11 less than 22.1-40.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035868" comment="emacs less than 22.1-40.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3963</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3963" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3963" source="CVE"/>
	<description>
	MySQL 5.0 before 5.0.66, 5.1 before 5.1.26, and 6.0 before 6.0.6 does not properly handle a b'' (b single-quote single-quote) token, aka an empty bit-string literal, which allows remote attackers to cause a denial of service (daemon crash) by using this token in a SQL statement.
	</description>
 </metadata>
<!-- ba564db3d02ca91d5d750d80c4b88a47 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035869" comment="libmysqlclient-devel less than 5.0.45-22.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035870" comment="libmysqlclient15-32bit less than 5.0.45-22.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035871" comment="libmysqlclient15-64bit less than 5.0.45-22.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035872" comment="libmysqlclient15 less than 5.0.45-22.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035873" comment="libmysqlclient_r15-32bit less than 5.0.45-22.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035874" comment="libmysqlclient_r15-64bit less than 5.0.45-22.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035875" comment="libmysqlclient_r15 less than 5.0.45-22.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035876" comment="mysql-Max less than 5.0.45-22.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035877" comment="mysql-bench less than 5.0.45-22.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035878" comment="mysql-client less than 5.0.45-22.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035879" comment="mysql-debug less than 5.0.45-22.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035880" comment="mysql-tools less than 5.0.45-22.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035881" comment="mysql less than 5.0.45-22.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3970</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3970" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3970" source="CVE"/>
	<description>
	pam_mount 0.10 through 0.45, when luserconf is enabled, does not verify mountpoint and source ownership before mounting a user-defined volume, which allows local users to bypass intended access restrictions via a local mount.
	</description>
 </metadata>
<!-- 356fafd865d9a87cec63f644d32481f2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035882" comment="pam_mount-32bit less than 0.18-84.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035883" comment="pam_mount-64bit less than 0.18-84.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035884" comment="pam_mount less than 0.18-84.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3972</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-3972" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3972" source="CVE"/>
	<description>
	pkcs15-tool in OpenSC before 0.11.6 does not apply security updates to a smart card unless the card's label matches the "OpenSC" string, which might allow physically proximate attackers to exploit vulnerabilities that the card owner expected were patched, as demonstrated by exploitation of CVE-2008-2235.
	</description>
 </metadata>
<!-- c600d2f5bbb047710b6e84397c4fe84e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035422" comment="libopensc2-32bit less than 0.11.3-21.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035423" comment="libopensc2-64bit less than 0.11.3-21.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035424" comment="libopensc2 less than 0.11.3-21.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035425" comment="opensc-32bit less than 0.11.3-21.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035426" comment="opensc-64bit less than 0.11.3-21.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035427" comment="opensc-devel less than 0.11.3-21.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035428" comment="opensc less than 0.11.3-21.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4058</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4058" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4058" source="CVE"/>
	<description>
	The XPConnect component in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to "pollute XPCNativeWrappers" and execute arbitrary code with chrome privileges via vectors related to (1) chrome XBL and (2) chrome JS.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 48fcbb624a95b290275340017ad12e5c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034736" comment="MozillaThunderbird-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034737" comment="MozillaThunderbird less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- 6393a99a5913d7d11ba39976c6a96737 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034738" comment="seamonkey-dom-inspector less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034739" comment="seamonkey-irc less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034740" comment="seamonkey-mail less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034741" comment="seamonkey-spellchecker less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034742" comment="seamonkey-venkman less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034743" comment="seamonkey less than 1.1.12-0.1"/>
		</criteria>
	</criteria>
	<!-- aeadca331cd96b3eb60572e397c8360a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034744" comment="MozillaFirefox-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034745" comment="MozillaFirefox less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- cf6f6a3d88cd2e0c3aaf5f3d91439ad8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034746" comment="mozilla-xulrunner181-32bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034747" comment="mozilla-xulrunner181-64bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034748" comment="mozilla-xulrunner181-devel less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034749" comment="mozilla-xulrunner181-l10n less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034750" comment="mozilla-xulrunner181 less than 1.8.1.17-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4059</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4059" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4059" source="CVE"/>
	<description>
	The XPConnect component in Mozilla Firefox before 2.0.0.17 allows remote attackers to "pollute XPCNativeWrappers" and execute arbitrary code with chrome privileges via vectors related to a SCRIPT element.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 48fcbb624a95b290275340017ad12e5c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034736" comment="MozillaThunderbird-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034737" comment="MozillaThunderbird less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- 6393a99a5913d7d11ba39976c6a96737 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034738" comment="seamonkey-dom-inspector less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034739" comment="seamonkey-irc less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034740" comment="seamonkey-mail less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034741" comment="seamonkey-spellchecker less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034742" comment="seamonkey-venkman less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034743" comment="seamonkey less than 1.1.12-0.1"/>
		</criteria>
	</criteria>
	<!-- aeadca331cd96b3eb60572e397c8360a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034744" comment="MozillaFirefox-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034745" comment="MozillaFirefox less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- cf6f6a3d88cd2e0c3aaf5f3d91439ad8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034746" comment="mozilla-xulrunner181-32bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034747" comment="mozilla-xulrunner181-64bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034748" comment="mozilla-xulrunner181-devel less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034749" comment="mozilla-xulrunner181-l10n less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034750" comment="mozilla-xulrunner181 less than 1.8.1.17-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4060</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4060" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4060" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allow remote attackers to create documents that lack script-handling objects, and execute arbitrary code with chrome privileges, via vectors related to (1) the document.loadBindingDocument function and (2) XSLT.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 48fcbb624a95b290275340017ad12e5c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034736" comment="MozillaThunderbird-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034737" comment="MozillaThunderbird less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- 6393a99a5913d7d11ba39976c6a96737 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034738" comment="seamonkey-dom-inspector less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034739" comment="seamonkey-irc less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034740" comment="seamonkey-mail less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034741" comment="seamonkey-spellchecker less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034742" comment="seamonkey-venkman less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034743" comment="seamonkey less than 1.1.12-0.1"/>
		</criteria>
	</criteria>
	<!-- aeadca331cd96b3eb60572e397c8360a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034744" comment="MozillaFirefox-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034745" comment="MozillaFirefox less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- cf6f6a3d88cd2e0c3aaf5f3d91439ad8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034746" comment="mozilla-xulrunner181-32bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034747" comment="mozilla-xulrunner181-64bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034748" comment="mozilla-xulrunner181-devel less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034749" comment="mozilla-xulrunner181-l10n less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034750" comment="mozilla-xulrunner181 less than 1.8.1.17-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4061</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4061" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4061" source="CVE"/>
	<description>
	Integer overflow in the MathML component in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via an mtd element with a large integer value in the rowspan attribute, related to the layout engine.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 48fcbb624a95b290275340017ad12e5c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034736" comment="MozillaThunderbird-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034737" comment="MozillaThunderbird less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- 6393a99a5913d7d11ba39976c6a96737 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034738" comment="seamonkey-dom-inspector less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034739" comment="seamonkey-irc less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034740" comment="seamonkey-mail less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034741" comment="seamonkey-spellchecker less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034742" comment="seamonkey-venkman less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034743" comment="seamonkey less than 1.1.12-0.1"/>
		</criteria>
	</criteria>
	<!-- aeadca331cd96b3eb60572e397c8360a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034744" comment="MozillaFirefox-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034745" comment="MozillaFirefox less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- cf6f6a3d88cd2e0c3aaf5f3d91439ad8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034746" comment="mozilla-xulrunner181-32bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034747" comment="mozilla-xulrunner181-64bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034748" comment="mozilla-xulrunner181-devel less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034749" comment="mozilla-xulrunner181-l10n less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034750" comment="mozilla-xulrunner181 less than 1.8.1.17-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4062</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4062" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the JavaScript engine and (1) misinterpretation of the characteristics of Namespace and QName in jsxml.c, (2) misuse of signed integers in the nsEscapeCount function in nsEscape.cpp, and (3) interaction of JavaScript garbage collection with certain use of an NPObject in the nsNPObjWrapper::GetNewOrUsed function in nsJSNPRuntime.cpp.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 48fcbb624a95b290275340017ad12e5c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034736" comment="MozillaThunderbird-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034737" comment="MozillaThunderbird less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- 6393a99a5913d7d11ba39976c6a96737 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034738" comment="seamonkey-dom-inspector less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034739" comment="seamonkey-irc less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034740" comment="seamonkey-mail less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034741" comment="seamonkey-spellchecker less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034742" comment="seamonkey-venkman less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034743" comment="seamonkey less than 1.1.12-0.1"/>
		</criteria>
	</criteria>
	<!-- aeadca331cd96b3eb60572e397c8360a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034744" comment="MozillaFirefox-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034745" comment="MozillaFirefox less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- cf6f6a3d88cd2e0c3aaf5f3d91439ad8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034746" comment="mozilla-xulrunner181-32bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034747" comment="mozilla-xulrunner181-64bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034748" comment="mozilla-xulrunner181-devel less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034749" comment="mozilla-xulrunner181-l10n less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034750" comment="mozilla-xulrunner181 less than 1.8.1.17-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4063</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4063" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Mozilla Firefox 3.x before 3.0.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the layout engine and (1) a zero value of the "this" variable in the nsContentList::Item function; (2) interaction of the indic IME extension, a Hindi language selection, and the "g" character; and (3) interaction of the nsFrameList::SortByContentOrder function with a certain insufficient protection of inline frames.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 48fcbb624a95b290275340017ad12e5c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034736" comment="MozillaThunderbird-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034737" comment="MozillaThunderbird less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- 6393a99a5913d7d11ba39976c6a96737 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034738" comment="seamonkey-dom-inspector less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034739" comment="seamonkey-irc less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034740" comment="seamonkey-mail less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034741" comment="seamonkey-spellchecker less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034742" comment="seamonkey-venkman less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034743" comment="seamonkey less than 1.1.12-0.1"/>
		</criteria>
	</criteria>
	<!-- aeadca331cd96b3eb60572e397c8360a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034744" comment="MozillaFirefox-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034745" comment="MozillaFirefox less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- cf6f6a3d88cd2e0c3aaf5f3d91439ad8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034746" comment="mozilla-xulrunner181-32bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034747" comment="mozilla-xulrunner181-64bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034748" comment="mozilla-xulrunner181-devel less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034749" comment="mozilla-xulrunner181-l10n less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034750" comment="mozilla-xulrunner181 less than 1.8.1.17-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4064</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4064" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4064" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Mozilla Firefox 3.x before 3.0.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to graphics rendering and (1) handling of a long alert messagebox in the cairo_surface_set_device_offset function, (2) integer overflows when handling animated PNG data in the info_callback function in nsPNGDecoder.cpp, and (3) an integer overflow when handling SVG data in the nsSVGFEGaussianBlurElement::SetupPredivide function in nsSVGFilters.cpp.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 48fcbb624a95b290275340017ad12e5c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034736" comment="MozillaThunderbird-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034737" comment="MozillaThunderbird less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- 6393a99a5913d7d11ba39976c6a96737 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034738" comment="seamonkey-dom-inspector less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034739" comment="seamonkey-irc less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034740" comment="seamonkey-mail less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034741" comment="seamonkey-spellchecker less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034742" comment="seamonkey-venkman less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034743" comment="seamonkey less than 1.1.12-0.1"/>
		</criteria>
	</criteria>
	<!-- aeadca331cd96b3eb60572e397c8360a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034744" comment="MozillaFirefox-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034745" comment="MozillaFirefox less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- cf6f6a3d88cd2e0c3aaf5f3d91439ad8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034746" comment="mozilla-xulrunner181-32bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034747" comment="mozilla-xulrunner181-64bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034748" comment="mozilla-xulrunner181-devel less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034749" comment="mozilla-xulrunner181-l10n less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034750" comment="mozilla-xulrunner181 less than 1.8.1.17-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4065</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4065" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4065" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allow remote attackers to bypass cross-site scripting (XSS) protection mechanisms and conduct XSS attacks via byte order mark (BOM) characters that are removed from JavaScript code before execution, aka "Stripped BOM characters bug."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 48fcbb624a95b290275340017ad12e5c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034736" comment="MozillaThunderbird-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034737" comment="MozillaThunderbird less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- 6393a99a5913d7d11ba39976c6a96737 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034738" comment="seamonkey-dom-inspector less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034739" comment="seamonkey-irc less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034740" comment="seamonkey-mail less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034741" comment="seamonkey-spellchecker less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034742" comment="seamonkey-venkman less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034743" comment="seamonkey less than 1.1.12-0.1"/>
		</criteria>
	</criteria>
	<!-- aeadca331cd96b3eb60572e397c8360a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034744" comment="MozillaFirefox-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034745" comment="MozillaFirefox less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- cf6f6a3d88cd2e0c3aaf5f3d91439ad8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034746" comment="mozilla-xulrunner181-32bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034747" comment="mozilla-xulrunner181-64bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034748" comment="mozilla-xulrunner181-devel less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034749" comment="mozilla-xulrunner181-l10n less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034750" comment="mozilla-xulrunner181 less than 1.8.1.17-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4066</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4066" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4066" source="CVE"/>
	<description>
	Mozilla Firefox 2.0.0.14, and other versions before 2.0.0.17, allows remote attackers to bypass cross-site scripting (XSS) protection mechanisms and conduct XSS attacks via HTML-escaped low surrogate characters that are ignored by the HTML parser, as demonstrated by a "jav&amp;#56325ascript" sequence, aka "HTML escaped low surrogates bug."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 48fcbb624a95b290275340017ad12e5c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034736" comment="MozillaThunderbird-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034737" comment="MozillaThunderbird less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- 6393a99a5913d7d11ba39976c6a96737 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034738" comment="seamonkey-dom-inspector less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034739" comment="seamonkey-irc less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034740" comment="seamonkey-mail less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034741" comment="seamonkey-spellchecker less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034742" comment="seamonkey-venkman less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034743" comment="seamonkey less than 1.1.12-0.1"/>
		</criteria>
	</criteria>
	<!-- aeadca331cd96b3eb60572e397c8360a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034744" comment="MozillaFirefox-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034745" comment="MozillaFirefox less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- cf6f6a3d88cd2e0c3aaf5f3d91439ad8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034746" comment="mozilla-xulrunner181-32bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034747" comment="mozilla-xulrunner181-64bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034748" comment="mozilla-xulrunner181-devel less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034749" comment="mozilla-xulrunner181-l10n less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034750" comment="mozilla-xulrunner181 less than 1.8.1.17-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4067</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4067" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4067" source="CVE"/>
	<description>
	Directory traversal vulnerability in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 on Linux allows remote attackers to read arbitrary files via a .. (dot dot) and URL-encoded / (slash) characters in a resource: URI.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 48fcbb624a95b290275340017ad12e5c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034736" comment="MozillaThunderbird-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034737" comment="MozillaThunderbird less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- 6393a99a5913d7d11ba39976c6a96737 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034738" comment="seamonkey-dom-inspector less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034739" comment="seamonkey-irc less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034740" comment="seamonkey-mail less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034741" comment="seamonkey-spellchecker less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034742" comment="seamonkey-venkman less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034743" comment="seamonkey less than 1.1.12-0.1"/>
		</criteria>
	</criteria>
	<!-- aeadca331cd96b3eb60572e397c8360a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034744" comment="MozillaFirefox-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034745" comment="MozillaFirefox less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- cf6f6a3d88cd2e0c3aaf5f3d91439ad8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034746" comment="mozilla-xulrunner181-32bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034747" comment="mozilla-xulrunner181-64bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034748" comment="mozilla-xulrunner181-devel less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034749" comment="mozilla-xulrunner181-l10n less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034750" comment="mozilla-xulrunner181 less than 1.8.1.17-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4068</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4068" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4068" source="CVE"/>
	<description>
	Directory traversal vulnerability in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to bypass "restrictions imposed on local HTML files," and obtain sensitive information and prompt users to write this information into a file, via directory traversal sequences in a resource: URI.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 48fcbb624a95b290275340017ad12e5c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034736" comment="MozillaThunderbird-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034737" comment="MozillaThunderbird less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- 6393a99a5913d7d11ba39976c6a96737 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034738" comment="seamonkey-dom-inspector less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034739" comment="seamonkey-irc less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034740" comment="seamonkey-mail less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034741" comment="seamonkey-spellchecker less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034742" comment="seamonkey-venkman less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034743" comment="seamonkey less than 1.1.12-0.1"/>
		</criteria>
	</criteria>
	<!-- aeadca331cd96b3eb60572e397c8360a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034744" comment="MozillaFirefox-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034745" comment="MozillaFirefox less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- cf6f6a3d88cd2e0c3aaf5f3d91439ad8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034746" comment="mozilla-xulrunner181-32bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034747" comment="mozilla-xulrunner181-64bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034748" comment="mozilla-xulrunner181-devel less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034749" comment="mozilla-xulrunner181-l10n less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034750" comment="mozilla-xulrunner181 less than 1.8.1.17-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4069</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4069" source="CVE"/>
	<description>
	The XBM decoder in Mozilla Firefox before 2.0.0.17 and SeaMonkey before 1.1.12 allows remote attackers to read uninitialized memory, and possibly obtain sensitive information in opportunistic circumstances, via a crafted XBM image file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6393a99a5913d7d11ba39976c6a96737 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034738" comment="seamonkey-dom-inspector less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034739" comment="seamonkey-irc less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034740" comment="seamonkey-mail less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034741" comment="seamonkey-spellchecker less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034742" comment="seamonkey-venkman less than 1.1.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034743" comment="seamonkey less than 1.1.12-0.1"/>
		</criteria>
	</criteria>
	<!-- aeadca331cd96b3eb60572e397c8360a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034744" comment="MozillaFirefox-translations less than 2.0.0.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034745" comment="MozillaFirefox less than 2.0.0.17-0.1"/>
		</criteria>
	</criteria>
	<!-- cf6f6a3d88cd2e0c3aaf5f3d91439ad8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034746" comment="mozilla-xulrunner181-32bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034747" comment="mozilla-xulrunner181-64bit less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034748" comment="mozilla-xulrunner181-devel less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034749" comment="mozilla-xulrunner181-l10n less than 1.8.1.17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034750" comment="mozilla-xulrunner181 less than 1.8.1.17-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4070</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4070" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4070" source="CVE"/>
	<description>
	Heap-based buffer overflow in Mozilla Thunderbird before 2.0.0.17 and SeaMonkey before 1.1.12 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long header in a news article, related to "canceling [a] newsgroup message" and "cancelled newsgroup messages."
	</description>
 </metadata>
<!-- 48fcbb624a95b290275340017ad12e5c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034736" comment="MozillaThunderbird-translations less than 2.0.0.17-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034737" comment="MozillaThunderbird less than 2.0.0.17-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4094</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4094" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4094" source="CVE"/>
	<description>
	Multiple SQL injection vulnerabilities in Ruby on Rails before 2.1.1 allow remote attackers to execute arbitrary SQL commands via the (1) :limit and (2) :offset parameters, related to ActiveRecord, ActiveSupport, ActiveResource, ActionPack, and ActionMailer.
	</description>
 </metadata>
<!-- 4d2b352f81aa03a1a9dfc717b9da0c0a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035885" comment="rubygem-activerecord less than 1.15.3-20.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4096</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4096" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4096" source="CVE"/>
	<description>
	libraries/database_interface.lib.php in phpMyAdmin before 2.11.9.1 allows remote authenticated users to execute arbitrary code via a request to server_databases.php with a sort_by parameter containing PHP sequences, which are processed by create_function.
	</description>
 </metadata>
<!-- 73adad68b37fe8bb88a7a57d6f7234c4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035069" comment="phpMyAdmin less than 2.11.9.4-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4097</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4097" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4097" source="CVE"/>
	<description>
	MySQL 5.0.51a allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are associated with symlinks within pathnames for subdirectories of the MySQL home data directory, which are followed when tables are created in the future. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-2079.
	</description>
 </metadata>
<!-- ba564db3d02ca91d5d750d80c4b88a47 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035869" comment="libmysqlclient-devel less than 5.0.45-22.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035870" comment="libmysqlclient15-32bit less than 5.0.45-22.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035871" comment="libmysqlclient15-64bit less than 5.0.45-22.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035872" comment="libmysqlclient15 less than 5.0.45-22.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035873" comment="libmysqlclient_r15-32bit less than 5.0.45-22.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035874" comment="libmysqlclient_r15-64bit less than 5.0.45-22.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035875" comment="libmysqlclient_r15 less than 5.0.45-22.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035876" comment="mysql-Max less than 5.0.45-22.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035877" comment="mysql-bench less than 5.0.45-22.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035878" comment="mysql-client less than 5.0.45-22.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035879" comment="mysql-debug less than 5.0.45-22.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035880" comment="mysql-tools less than 5.0.45-22.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035881" comment="mysql less than 5.0.45-22.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4098</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4098" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4098" source="CVE"/>
	<description>
	MySQL before 5.0.67 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL home data directory. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4097.
	</description>
 </metadata>
<!-- ba564db3d02ca91d5d750d80c4b88a47 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035869" comment="libmysqlclient-devel less than 5.0.45-22.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035870" comment="libmysqlclient15-32bit less than 5.0.45-22.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035871" comment="libmysqlclient15-64bit less than 5.0.45-22.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035872" comment="libmysqlclient15 less than 5.0.45-22.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035873" comment="libmysqlclient_r15-32bit less than 5.0.45-22.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035874" comment="libmysqlclient_r15-64bit less than 5.0.45-22.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035875" comment="libmysqlclient_r15 less than 5.0.45-22.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035876" comment="mysql-Max less than 5.0.45-22.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035877" comment="mysql-bench less than 5.0.45-22.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035878" comment="mysql-client less than 5.0.45-22.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035879" comment="mysql-debug less than 5.0.45-22.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035880" comment="mysql-tools less than 5.0.45-22.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035881" comment="mysql less than 5.0.45-22.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4182</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4182" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in imp/test.php in Horde Turba Contact Manager H3 2.2.1 and other versions before 2.3.1, and possibly other Horde Project products, allows remote attackers to inject arbitrary web script or HTML via the User field in an IMAP session.
	</description>
 </metadata>
<!-- 17720f32e7411a0c200b3521299dfb29 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035886" comment="imp less than 4.1.4-22.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4225</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4225" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4225" source="CVE"/>
	<description>
	Integer overflow in the xmlBufferResize function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (infinite loop) via a large XML document.
	</description>
 </metadata>
<!-- a0c8660fc6823cc21b28e7d1652e5f1e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035887" comment="libxml2-32bit less than 2.6.30-4.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035888" comment="libxml2-64bit less than 2.6.30-4.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035889" comment="libxml2-devel-32bit less than 2.6.30-4.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035890" comment="libxml2-devel-64bit less than 2.6.30-4.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035891" comment="libxml2-devel less than 2.6.30-4.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035892" comment="libxml2 less than 2.6.30-4.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4226</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4226" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4226" source="CVE"/>
	<description>
	Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a large XML document.
	</description>
 </metadata>
<!-- 52e6b675302eb9e8aaa2c32fb904e24b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035893" comment="libxml2-32bit less than 2.6.30-4.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035894" comment="libxml2-64bit less than 2.6.30-4.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035895" comment="libxml2-devel-32bit less than 2.6.30-4.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035896" comment="libxml2-devel-64bit less than 2.6.30-4.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035897" comment="libxml2-devel less than 2.6.30-4.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035898" comment="libxml2 less than 2.6.30-4.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4298</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4298" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4298" source="CVE"/>
	<description>
	Memory leak in the http_request_parse function in request.c in lighttpd before 1.4.20 allows remote attackers to cause a denial of service (memory consumption) via a large number of requests with duplicate request headers.
	</description>
 </metadata>
<!-- 77b95e94207378a6e05ed4ba981f1ed6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035899" comment="lighttpd-mod_cml less than 1.4.18-1.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035900" comment="lighttpd-mod_magnet less than 1.4.18-1.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035901" comment="lighttpd-mod_mysql_vhost less than 1.4.18-1.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035902" comment="lighttpd-mod_rrdtool less than 1.4.18-1.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035903" comment="lighttpd-mod_trigger_b4_dl less than 1.4.18-1.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035904" comment="lighttpd-mod_webdav less than 1.4.18-1.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035905" comment="lighttpd less than 1.4.18-1.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4309</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4309" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4309" source="CVE"/>
	<description>
	Integer overflow in the netsnmp_create_subtree_cache function in agent/snmp_agent.c in net-snmp 5.4 before 5.4.2.1, 5.3 before 5.3.2.3, and 5.2 before 5.2.5.1 allows remote attackers to cause a denial of service (crash) via a crafted SNMP GETBULK request, which triggers a heap-based buffer overflow,  related to the number of responses or repeats.
	</description>
 </metadata>
<!-- fcc3110c158c9897a8a198784ef30794 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035906" comment="libsnmp15 less than 5.4.1-19.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035907" comment="net-snmp-32bit less than 5.4.1-19.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035908" comment="net-snmp-64bit less than 5.4.1-19.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035909" comment="net-snmp-devel-64bit less than 5.4.1-19.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035910" comment="net-snmp-devel less than 5.4.1-19.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035911" comment="net-snmp less than 5.4.1-19.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035912" comment="perl-SNMP less than 5.4.1-19.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035913" comment="snmp-mibs less than 5.4.1-19.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4311</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4311" source="CVE"/>
	<description>
	The default configuration of system.conf in D-Bus (aka DBus) before 1.2.6 omits the send_type attribute in certain rules, which allows local users to bypass intended access restrictions by (1) sending messages, related to send_requested_reply; and possibly (2) receiving messages, related to receive_requested_reply.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 31a699b72502d6dd8b61c8a78d22e6b4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035914" comment="bluez-cups less than 3.18-13.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035915" comment="bluez-test less than 3.18-13.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035916" comment="bluez-utils less than 3.18-13.7"/>
		</criteria>
	</criteria>
	<!-- 8ea81c8defa53ca2e4c48fd8ccc062b8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035917" comment="dbus-1-32bit less than 1.0.2-59.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035918" comment="dbus-1-64bit less than 1.0.2-59.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035919" comment="dbus-1-devel-doc less than 1.0.2-59.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035920" comment="dbus-1-devel less than 1.0.2-59.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035921" comment="dbus-1-glib-32bit less than 0.74-25.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035922" comment="dbus-1-glib-64bit less than 0.74-25.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035923" comment="dbus-1-glib-devel less than 0.74-25.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035924" comment="dbus-1-glib-doc less than 0.74-25.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035925" comment="dbus-1-glib less than 0.74-25.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035926" comment="dbus-1-mono less than 0.63-90.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035927" comment="dbus-1-python-devel less than 0.82.0-28.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035928" comment="dbus-1-python less than 0.82.0-28.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035929" comment="dbus-1-qt3-32bit less than 0.62-110.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035930" comment="dbus-1-qt3-64bit less than 0.62-110.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035931" comment="dbus-1-qt3-devel less than 0.62-110.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035932" comment="dbus-1-qt3 less than 0.62-110.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035933" comment="dbus-1-x11 less than 1.0.2-67.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035934" comment="dbus-1 less than 1.0.2-59.8"/>
		</criteria>
	</criteria>
	<!-- b4227725b056244b8496471cf2f0da5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035935" comment="hal-32bit less than 0.5.9_git20070831-13.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035936" comment="hal-64bit less than 0.5.9_git20070831-13.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035937" comment="hal-devel less than 0.5.9_git20070831-13.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035938" comment="hal less than 0.5.9_git20070831-13.7"/>
		</criteria>
	</criteria>
	<!-- d35e880f603323c2e88c39316ca128bb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035939" comment="bluez-cups less than 3.18-13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035940" comment="bluez-test less than 3.18-13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035941" comment="bluez-utils less than 3.18-13.4"/>
		</criteria>
	</criteria>
	<!-- d922e608db08915538b864da9adf473d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035942" comment="hal-32bit less than 0.5.9_git20070831-13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035943" comment="hal-64bit less than 0.5.9_git20070831-13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035944" comment="hal-devel less than 0.5.9_git20070831-13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035945" comment="hal less than 0.5.9_git20070831-13.5"/>
		</criteria>
	</criteria>
	<!-- e60dc4cbf096c3d038921a26d1ced5da -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035946" comment="powersave-devel less than 0.15.17-10.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035947" comment="powersave-libs-32bit less than 0.15.17-10.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035948" comment="powersave-libs-64bit less than 0.15.17-10.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035949" comment="powersave-libs less than 0.15.17-10.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035950" comment="powersave less than 0.15.17-10.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4316</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4316" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4316" source="CVE"/>
	<description>
	Multiple integer overflows in glib/gbase64.c in GLib before 2.20 allow context-dependent attackers to execute arbitrary code via a long string that is converted either (1) from or (2) to a base64 representation.
	</description>
 </metadata>
<!-- e0e3299170caa507a0306e46453bdbe0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035951" comment="glib2-32bit less than 2.14.1-4.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035952" comment="glib2-64bit less than 2.14.1-4.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035953" comment="glib2-devel-64bit less than 2.14.1-4.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035954" comment="glib2-devel less than 2.14.1-4.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035955" comment="glib2-doc less than 2.14.1-4.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035956" comment="glib2-lang less than 2.14.1-4.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035957" comment="glib2 less than 2.14.1-4.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4326</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4326" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4326" source="CVE"/>
	<description>
	The PMA_escapeJsString function in libraries/js_escape.lib.php in phpMyAdmin before 2.11.9.2, when Internet Explorer is used, allows remote attackers to bypass cross-site scripting (XSS) protection mechanisms and conduct XSS attacks via a NUL byte inside a "&lt;/script" sequence.
	</description>
 </metadata>
<!-- 73adad68b37fe8bb88a7a57d6f7234c4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035069" comment="phpMyAdmin less than 2.11.9.4-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4359</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4359" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4359" source="CVE"/>
	<description>
	lighttpd before 1.4.20 compares URIs to patterns in the (1) url.redirect and (2) url.rewrite configuration settings before performing URL decoding, which might allow remote attackers to bypass intended access restrictions, and obtain sensitive information or possibly modify data.
	</description>
 </metadata>
<!-- 77b95e94207378a6e05ed4ba981f1ed6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035899" comment="lighttpd-mod_cml less than 1.4.18-1.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035900" comment="lighttpd-mod_magnet less than 1.4.18-1.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035901" comment="lighttpd-mod_mysql_vhost less than 1.4.18-1.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035902" comment="lighttpd-mod_rrdtool less than 1.4.18-1.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035903" comment="lighttpd-mod_trigger_b4_dl less than 1.4.18-1.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035904" comment="lighttpd-mod_webdav less than 1.4.18-1.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035905" comment="lighttpd less than 1.4.18-1.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4360</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4360" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4360" source="CVE"/>
	<description>
	mod_userdir in lighttpd before 1.4.20, when a case-insensitive operating system or filesystem is used, performs case-sensitive comparisons on filename components in configuration options, which might allow remote attackers to bypass intended access restrictions, as demonstrated by a request for a .PHP file when there is a configuration rule for .php files.
	</description>
 </metadata>
<!-- 77b95e94207378a6e05ed4ba981f1ed6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035899" comment="lighttpd-mod_cml less than 1.4.18-1.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035900" comment="lighttpd-mod_magnet less than 1.4.18-1.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035901" comment="lighttpd-mod_mysql_vhost less than 1.4.18-1.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035902" comment="lighttpd-mod_rrdtool less than 1.4.18-1.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035903" comment="lighttpd-mod_trigger_b4_dl less than 1.4.18-1.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035904" comment="lighttpd-mod_webdav less than 1.4.18-1.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035905" comment="lighttpd less than 1.4.18-1.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4395</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4395" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4395" source="CVE"/>
	<description>
	Multiple buffer overflows in the ndiswrapper module 1.53 for the Linux kernel 2.6 allow remote attackers to execute arbitrary code by sending packets over a local wireless network that specify long ESSIDs.
	</description>
 </metadata>
<!-- f5dafb8f522893b0ffe6076901a0552e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035958" comment="ndiswrapper-kmp-bigsmp less than 1.47_2.6.22.19_0.1-32.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035959" comment="ndiswrapper-kmp-default less than 1.47_2.6.22.19_0.1-32.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035960" comment="ndiswrapper-kmp-xen less than 1.47_2.6.22.19_0.1-32.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035961" comment="ndiswrapper-kmp-xenpae less than 1.47_2.6.22.19_0.1-32.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035962" comment="ndiswrapper less than 1.47-32.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4401</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4401" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4401" source="CVE"/>
	<description>
	ActionScript in Adobe Flash Player 9.0.124.0 and earlier does not require user interaction in conjunction with (1) the FileReference.browse operation in the FileReference upload API or (2) the FileReference.download operation in the FileReference download API, which allows remote attackers to create a browse dialog box, and possibly have unspecified other impact, via an SWF file.
	</description>
 </metadata>
<!-- 7728fa8aa49a8cf7a4da694adb474f85 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031401" comment="flash-player less than 9.0.151.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4456</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4456" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in the command-line client in MySQL 5.0.26 through 5.0.45, and other versions including versions later than 5.0.45, when the --html option is enabled, allows attackers to inject arbitrary web script or HTML by placing it in a database cell, which might be accessed by this client when composing an HTML document.  NOTE: as of 20081031, the issue has not been fixed in MySQL 5.0.67.
	</description>
 </metadata>
<!-- 00f6af27c9453ea91d6031df5dac835c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054299" comment="libmysqlclient-devel less than 5.0.45-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054300" comment="libmysqlclient15-32bit less than 5.0.45-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054301" comment="libmysqlclient15-64bit less than 5.0.45-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054302" comment="libmysqlclient15 less than 5.0.45-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054303" comment="libmysqlclient_r15-32bit less than 5.0.45-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054304" comment="libmysqlclient_r15-64bit less than 5.0.45-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054305" comment="libmysqlclient_r15 less than 5.0.45-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054306" comment="mysql-Max less than 5.0.45-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054307" comment="mysql-bench less than 5.0.45-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054308" comment="mysql-client less than 5.0.45-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054309" comment="mysql-debug less than 5.0.45-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054310" comment="mysql-tools less than 5.0.45-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054311" comment="mysql less than 5.0.45-22.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4474</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4474" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4474" source="CVE"/>
	<description>
	freeradius-dialupadmin in freeradius 2.0.4 allows local users to overwrite arbitrary files via a symlink attack on temporary files in (1) backup_radacct, (2) clean_radacct, (3) monthly_tot_stats, (4) tot_stats, and (5) truncate_radacct.
	</description>
 </metadata>
<!-- 58a93e9c55869053248358502aeee0cb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035963" comment="freeradius-devel less than 1.1.6-47.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035964" comment="freeradius-dialupadmin less than 1.1.6-47.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035965" comment="freeradius less than 1.1.6-47.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4503</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4503" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4503" source="CVE"/>
	<description>
	The Settings Manager in Adobe Flash Player 9.0.124.0 and earlier allows remote attackers to cause victims to unknowingly click on a link or dialog via access control dialogs disguised as normal graphical elements, as demonstrated by hijacking the camera or microphone, and related to "clickjacking."
	</description>
 </metadata>
<!-- 7728fa8aa49a8cf7a4da694adb474f85 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031401" comment="flash-player less than 9.0.151.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4539</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4539" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4539" source="CVE"/>
	<description>
	Heap-based buffer overflow in the Cirrus VGA implementation in (1) KVM before kvm-82 and (2) QEMU on Debian GNU/Linux and Ubuntu might allow local users to gain privileges by using the VNC console for a connection, aka the LGD-54XX "bitblt" heap overflow.  NOTE: this issue exists because of an incorrect fix for CVE-2007-1320.
	</description>
 </metadata>
<!-- 0e2b33e755c079848c85abff921e8caa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034945" comment="qemu less than 0.10.1-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4546</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4546" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4546" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows remote web servers to cause a denial of service (NULL pointer dereference and browser crash) by returning a different response when an HTTP request is sent a second time, as demonstrated by two responses that provide SWF files with different SWF version numbers.
	</description>
 </metadata>
<!-- 7728fa8aa49a8cf7a4da694adb474f85 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031401" comment="flash-player less than 9.0.151.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4554</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4554" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4554" source="CVE"/>
	<description>
	The do_splice_from function in fs/splice.c in the Linux kernel before 2.6.27 does not reject file descriptors that have the O_APPEND flag set, which allows local users to bypass append mode and make arbitrary changes to other locations in the file.
	</description>
 </metadata>
<!-- b36aaab84a5618e58a83fd28deda41c5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035966" comment="kernel-bigsmp less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035967" comment="kernel-debug less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035968" comment="kernel-default less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035969" comment="kernel-kdump less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035970" comment="kernel-ppc64 less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035971" comment="kernel-source less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035972" comment="kernel-syms less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035973" comment="kernel-xen less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035974" comment="kernel-xenpae less than 2.6.22.19-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4555</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4555" source="CVE"/>
	<description>
	Stack-based buffer overflow in the push_subg function in parser.y (lib/graph/parser.c) in Graphviz 2.20.2, and possibly earlier versions, allows user-assisted remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a DOT file with a large number of Agraph_t elements.
	</description>
 </metadata>
<!-- 2640a22b504713df35bbd8426673a4ca -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035975" comment="graphviz-devel less than 2.12-50.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035976" comment="graphviz-doc less than 2.12-50.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035977" comment="graphviz-gd less than 2.12-50.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035978" comment="graphviz-guile less than 2.12-50.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035979" comment="graphviz-java less than 2.12-50.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035980" comment="graphviz-lua less than 2.12-50.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035981" comment="graphviz-ocaml less than 2.12-50.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035982" comment="graphviz-perl less than 2.12-50.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035983" comment="graphviz-php less than 2.12-50.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035984" comment="graphviz-python less than 2.12-50.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035985" comment="graphviz-ruby less than 2.12-50.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035986" comment="graphviz-sharp less than 2.12-50.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035987" comment="graphviz-tcl less than 2.12-50.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035988" comment="graphviz less than 2.12-50.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4575</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4575" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4575" source="CVE"/>
	<description>
	Buffer overflow in the DoCommand function in jhead before 2.84 might allow context-dependent attackers to cause a denial of service (crash) via (1) a long -cmd argument and (2) unspecified vectors related to "a bunch of potential string overflows."
	</description>
 </metadata>
<!-- 60a7eebd98be5aca456464d144eb5065 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035989" comment="jhead less than 2.7-11.3"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4576</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4576" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4576" source="CVE"/>
	<description>
	sctp in Linux kernel before 2.6.25.18 allows remote attackers to cause a denial of service (OOPS) via an INIT-ACK that states the peer does not support AUTH, which causes the sctp_process_init function to clean up active transports and triggers the OOPS when the T1-Init timer expires.
	</description>
 </metadata>
<!-- 3837c2df513f0088f0fdd19fc0db5adc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034714" comment="kernel-bigsmp less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034715" comment="kernel-debug less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034716" comment="kernel-default less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034717" comment="kernel-kdump less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034718" comment="kernel-ppc64 less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034719" comment="kernel-source less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034720" comment="kernel-syms less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034721" comment="kernel-xen less than 2.6.22.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034722" comment="kernel-xenpae less than 2.6.22.19-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4577</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4577" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4577" source="CVE"/>
	<description>
	The ACL plugin in Dovecot before 1.1.4 treats negative access rights as if they are positive access rights, which allows attackers to bypass intended access restrictions.
	</description>
 </metadata>
<!-- 2fca0e23149c47d5207ae32a9efe699e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035990" comment="dovecot-devel less than 1.0.5-6.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035991" comment="dovecot less than 1.0.5-6.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4639</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4639" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4639" source="CVE"/>
	<description>
	jhead.c in Matthias Wandel jhead 2.84 and earlier allows local users to overwrite arbitrary files via a symlink attack on a temporary file.
	</description>
 </metadata>
<!-- 60a7eebd98be5aca456464d144eb5065 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035989" comment="jhead less than 2.7-11.3"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4640</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4640" source="CVE"/>
	<description>
	The DoCommand function in jhead.c in Matthias Wandel jhead 2.84 and earlier allows local users to delete arbitrary files via vectors involving a modified input filename in which (1) a final "z" character is replaced by a "t" character or (2) a final "t" character is replaced by a "z" character.
	</description>
 </metadata>
<!-- 60a7eebd98be5aca456464d144eb5065 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035989" comment="jhead less than 2.7-11.3"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4641</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4641" source="CVE"/>
	<description>
	The DoCommand function in jhead.c in Matthias Wandel jhead 2.84 and earlier allows attackers to execute arbitrary commands via shell metacharacters in unspecified input.
	</description>
 </metadata>
<!-- 60a7eebd98be5aca456464d144eb5065 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035989" comment="jhead less than 2.7-11.3"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4677</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4677" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4677" source="CVE"/>
	<description>
	autoload/netrw.vim (aka the Netrw Plugin) 109, 131, and other versions before 133k for Vim 7.1.266, other 7.1 versions, and 7.2 stores credentials for an FTP session, and sends those credentials when attempting to establish subsequent FTP sessions to servers on different hosts, which allows remote FTP servers to obtain sensitive information in opportunistic circumstances by logging usernames and passwords.  NOTE: the upstream vendor disputes a vector involving different ports on the same host, stating "I'm assuming that they're using the same id and password on that unchanged hostname, deliberately."
	</description>
 </metadata>
<!-- 4811f82775ba2e73f4c7806cd79ad5c0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035542" comment="gvim less than 7.2-9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035543" comment="vim-base less than 7.2-9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035544" comment="vim-data less than 7.2-9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035545" comment="vim-enhanced less than 7.2-9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4680</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4680" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4680" source="CVE"/>
	<description>
	packet-usb.c in the USB dissector in Wireshark 0.99.7 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via a malformed USB Request Block (URB).
	</description>
 </metadata>
<!-- ca7dc4523ffbb7981257a4aa0529accb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035862" comment="wireshark-devel less than 0.99.6-31.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035863" comment="wireshark less than 0.99.6-31.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4681</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4681" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4681" source="CVE"/>
	<description>
	Unspecified vulnerability in the Bluetooth RFCOMM dissector in Wireshark 0.99.7 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via unknown packets.
	</description>
 </metadata>
<!-- ca7dc4523ffbb7981257a4aa0529accb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035862" comment="wireshark-devel less than 0.99.6-31.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035863" comment="wireshark less than 0.99.6-31.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4683</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4683" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4683" source="CVE"/>
	<description>
	The dissect_btacl function in packet-bthci_acl.c in the Bluetooth ACL dissector in Wireshark 0.99.2 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via a packet with an invalid length, related to an erroneous tvb_memcpy call.
	</description>
 </metadata>
<!-- ca7dc4523ffbb7981257a4aa0529accb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035862" comment="wireshark-devel less than 0.99.6-31.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035863" comment="wireshark less than 0.99.6-31.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4684</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4684" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4684" source="CVE"/>
	<description>
	packet-frame in Wireshark 0.99.2 through 1.0.3 does not properly handle exceptions thrown by post dissectors, which allows remote attackers to cause a denial of service (application crash) via a certain series of packets, as demonstrated by enabling the (1) PRP or (2) MATE post dissector.
	</description>
 </metadata>
<!-- ca7dc4523ffbb7981257a4aa0529accb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035862" comment="wireshark-devel less than 0.99.6-31.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035863" comment="wireshark less than 0.99.6-31.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4685</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4685" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4685" source="CVE"/>
	<description>
	Use-after-free vulnerability in the dissect_q931_cause_ie function in packet-q931.c in the Q.931 dissector in Wireshark 0.10.3 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via certain packets that trigger an exception.
	</description>
 </metadata>
<!-- ca7dc4523ffbb7981257a4aa0529accb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035862" comment="wireshark-devel less than 0.99.6-31.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035863" comment="wireshark less than 0.99.6-31.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4690</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4690" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4690" source="CVE"/>
	<description>
	lynx 2.8.6dev.15 and earlier, when advanced mode is enabled and lynx is configured as a URL handler, allows remote attackers to execute arbitrary commands via a crafted lynxcgi: URL, a related issue to CVE-2005-2929.  NOTE: this might only be a vulnerability in limited deployments that have defined a lynxcgi: handler.
	</description>
 </metadata>
<!-- e318098af5c9ad5e5d2891944e05ac09 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035992" comment="lynx less than 2.8.6-48.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4694</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4694" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4694" source="CVE"/>
	<description>
	Unspecified vulnerability in Opera before 9.60 allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via a redirect that specifies a crafted URL.
	</description>
 </metadata>
<!-- 091987756a0486cee873ae3cd55a9aa0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035993" comment="opera less than 9.60-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4695</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4695" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4695" source="CVE"/>
	<description>
	Opera before 9.60 allows remote attackers to obtain sensitive information and have unspecified other impact by predicting the cache pathname of a cached Java applet and then launching this applet from the cache, leading to applet execution within the local-machine context.
	</description>
 </metadata>
<!-- 091987756a0486cee873ae3cd55a9aa0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035993" comment="opera less than 9.60-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4696</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4696" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4696" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Opera.dll in Opera before 9.61 allows remote attackers to inject arbitrary web script or HTML via the anchor identifier (aka the "optional fragment"), which is not properly escaped before storage in the History Search database (aka md.dat).
	</description>
 </metadata>
<!-- 512ffce35c64301e871a11d8e561a8cd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035994" comment="opera less than 9.61-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4697</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4697" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4697" source="CVE"/>
	<description>
	The Fast Forward feature in Opera before 9.61, when a page is located in a frame, executes a javascript: URL in the context of the outermost page instead of the page that contains this URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks.
	</description>
 </metadata>
<!-- 512ffce35c64301e871a11d8e561a8cd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035994" comment="opera less than 9.61-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4698</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4698" source="CVE"/>
	<description>
	Opera before 9.61 does not properly block scripts during preview of a news feed, which allows remote attackers to create arbitrary new feed subscriptions and read the contents of arbitrary feeds.
	</description>
 </metadata>
<!-- 512ffce35c64301e871a11d8e561a8cd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035994" comment="opera less than 9.61-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4776</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4776" source="CVE"/>
	<description>
	libgadu before 1.8.2 allows remote servers to cause a denial of service (crash) via a contact description with a large length, which triggers a buffer over-read.
	</description>
 </metadata>
<!-- e9d98d519ed4f1bd7ea0a52731c85651 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035995" comment="libgadu-devel less than 1.7.1-29.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035996" comment="libgadu less than 1.7.1-29.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4794</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4794" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4794" source="CVE"/>
	<description>
	Opera before 9.62 allows remote attackers to execute arbitrary commands via the History Search results page, a different vulnerability than CVE-2008-4696.
	</description>
 </metadata>
<!-- 991fc6e57c972ef152b927a22dd8b657 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035997" comment="opera less than 9.62-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4795</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4795" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4795" source="CVE"/>
	<description>
	The links panel in Opera before 9.62 processes Javascript within the context of the "outermost page" of a frame, which allows remote attackers to inject arbitrary web script or HTML via cross-site scripting (XSS) attacks.
	</description>
 </metadata>
<!-- 991fc6e57c972ef152b927a22dd8b657 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035997" comment="opera less than 9.62-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4812</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4812" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4812" source="CVE"/>
	<description>
	Array index error in Adobe Reader and Acrobat, and the Explorer extension (aka AcroRd32Info), 8.1.2, 8.1.1, and earlier allows remote attackers to execute arbitrary code via a crafted PDF document that triggers an out-of-bounds write, related to parsing of Type 1 fonts.
	</description>
 </metadata>
<!-- bca1a43d8becbd129b2df6ecff93ceb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035531" comment="acroread less than 8.1.3-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4813</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4813" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4813" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 8.1.2 and earlier, and before 7.1.1, allow remote attackers to execute arbitrary code via a crafted PDF document that (1) performs unspecified actions on a Collab object that trigger memory corruption, related to a GetCosObj method; or (2) contains a malformed PDF object that triggers memory corruption during parsing.
	</description>
 </metadata>
<!-- bca1a43d8becbd129b2df6ecff93ceb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035531" comment="acroread less than 8.1.3-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4814</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4814" source="CVE"/>
	<description>
	Unspecified vulnerability in a JavaScript method in Adobe Reader and Acrobat 8.1.2 and earlier, and before 7.1.1, allows remote attackers to execute arbitrary code via unknown vectors, related to an "input validation issue."
	</description>
 </metadata>
<!-- bca1a43d8becbd129b2df6ecff93ceb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035531" comment="acroread less than 8.1.3-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4815</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4815" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4815" source="CVE"/>
	<description>
	Untrusted search path vulnerability in Adobe Reader and Acrobat 8.1.2 and earlier on Unix and Linux allows attackers to gain privileges via a Trojan Horse program in an unspecified directory that is associated with an insecure RPATH.
	</description>
 </metadata>
<!-- bca1a43d8becbd129b2df6ecff93ceb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035531" comment="acroread less than 8.1.3-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4816</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4816" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4816" source="CVE"/>
	<description>
	Unspecified vulnerability in the Download Manager in Adobe Reader 8.1.2 and earlier on Windows allows remote attackers to change Internet Security options on a client machine via unknown vectors.
	</description>
 </metadata>
<!-- bca1a43d8becbd129b2df6ecff93ceb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035531" comment="acroread less than 8.1.3-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4817</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4817" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4817" source="CVE"/>
	<description>
	The Download Manager in Adobe Acrobat Professional and Reader 8.1.2 and earlier allows remote attackers to execute arbitrary code via a crafted PDF document that calls an AcroJS function with a long string argument, triggering heap corruption.
	</description>
 </metadata>
<!-- bca1a43d8becbd129b2df6ecff93ceb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035531" comment="acroread less than 8.1.3-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4824</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4824" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4824" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Adobe Flash Player 10.x before 10.0.12.36 and 9.x before 9.0.151.0 allow remote attackers to execute arbitrary code via unknown vectors related to "input validation errors."
	</description>
 </metadata>
<!-- 7728fa8aa49a8cf7a4da694adb474f85 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031401" comment="flash-player less than 9.0.151.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4864</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4864" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4864" source="CVE"/>
	<description>
	Multiple integer overflows in imageop.c in the imageop module in Python 1.5.2 through 2.5.1 allow context-dependent attackers to break out of the Python VM and execute arbitrary code via large integer values in certain arguments to the crop function, leading to a buffer overflow, a different vulnerability than CVE-2007-4965 and CVE-2008-1679.
	</description>
 </metadata>
<!-- 587871960037d31833c3a2d6bf986309 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035998" comment="python-32bit less than 2.5.1-39.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035999" comment="python-64bit less than 2.5.1-39.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036000" comment="python-curses less than 2.5.1-39.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036001" comment="python-demo less than 2.5.1-39.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036002" comment="python-devel less than 2.5.1-39.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036003" comment="python-gdbm less than 2.5.1-39.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036004" comment="python-idle less than 2.5.1-39.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036005" comment="python-tk less than 2.5.1-39.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036006" comment="python-xml less than 2.5.1-39.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036007" comment="python less than 2.5.1-39.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4865</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4865" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4865" source="CVE"/>
	<description>
	Untrusted search path vulnerability in valgrind before 3.4.0 allows local users to execute arbitrary programs via a Trojan horse .valgrindrc file in the current working directory, as demonstrated using a malicious --db-command options.  NOTE: the severity of this issue has been disputed, but CVE is including this issue because execution of a program from an untrusted directory is a common scenario.
	</description>
 </metadata>
<!-- d0bf9bf48ad271e4748f45908fc273cb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036008" comment="valgrind-devel less than 3.2.3-57.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036009" comment="valgrind less than 3.2.3-57.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4933</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4933" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4933" source="CVE"/>
	<description>
	Buffer overflow in the hfsplus_find_cat function in fs/hfsplus/catalog.c in the Linux kernel before 2.6.28-rc1 allows attackers to cause a denial of service (memory corruption or system crash) via an hfsplus filesystem image with an invalid catalog namelength field, related to the hfsplus_cat_build_key_uni function.
	</description>
 </metadata>
<!-- 8504cb9aa3cf26986c7f273aafa740b5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036010" comment="kernel-bigsmp less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036011" comment="kernel-debug less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036012" comment="kernel-default less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036013" comment="kernel-kdump less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036014" comment="kernel-ppc64 less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036015" comment="kernel-source less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036016" comment="kernel-syms less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036017" comment="kernel-xen less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036018" comment="kernel-xenpae less than 2.6.22.19-0.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4989</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4989" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4989" source="CVE"/>
	<description>
	The _gnutls_x509_verify_certificate function in lib/x509/verify.c in libgnutls in GnuTLS before 2.6.1 trusts certificate chains in which the last certificate is an arbitrary trusted, self-signed certificate, which allows man-in-the-middle attackers to insert a spoofed certificate for any Distinguished Name (DN).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 50487a78a235c0bbe7b3734b780bb9f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036019" comment="gnutls-32bit less than 1.6.1-36.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036020" comment="gnutls-64bit less than 1.6.1-36.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036021" comment="gnutls-devel-32bit less than 1.6.1-36.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036022" comment="gnutls-devel-64bit less than 1.6.1-36.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036023" comment="gnutls-devel less than 1.6.1-36.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036024" comment="gnutls less than 1.6.1-36.4"/>
		</criteria>
	</criteria>
	<!-- 92f7ada346fab894a17174ed22b46b03 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036025" comment="gnutls-32bit less than 1.6.1-36.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036026" comment="gnutls-64bit less than 1.6.1-36.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036027" comment="gnutls-devel-32bit less than 1.6.1-36.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036028" comment="gnutls-devel-64bit less than 1.6.1-36.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036029" comment="gnutls-devel less than 1.6.1-36.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036030" comment="gnutls less than 1.6.1-36.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5006</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5006" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5006" source="CVE"/>
	<description>
	smtp.c in the c-client library in University of Washington IMAP Toolkit 2007b allows remote SMTP servers to cause a denial of service (NULL pointer dereference and application crash) by responding to the QUIT command with a close of the TCP connection instead of the expected 221 response code.
	</description>
 </metadata>
<!-- 640adae6ec729c16814640840f88d6db -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036031" comment="imap-devel less than 2006c1_suse-51.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036032" comment="imap-lib less than 2006c1_suse-51.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036033" comment="imap less than 2006c1_suse-51.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5012</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5012" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5012" source="CVE"/>
	<description>
	Mozilla Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 do not properly change the source URI when processing a canvas element and an HTTP redirect, which allows remote attackers to bypass the same origin policy and access arbitrary images that are not directly accessible to the attacker.  NOTE: this issue can be leveraged to enumerate software on the client by performing redirections related to moz-icon.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 061d649b399bf6dc687c2e75acae19b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034751" comment="epiphany-devel less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034752" comment="epiphany-doc less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034753" comment="epiphany-extensions less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034754" comment="epiphany less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034755" comment="mozilla-xulrunner181-32bit less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034756" comment="mozilla-xulrunner181-64bit less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034757" comment="mozilla-xulrunner181-devel less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034758" comment="mozilla-xulrunner181-l10n less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034759" comment="mozilla-xulrunner181 less than 1.8.1.18-0.1"/>
		</criteria>
	</criteria>
	<!-- 7c70bc51bdcfd393c1802132c39993c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034760" comment="MozillaFirefox-translations less than 2.0.0.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034761" comment="MozillaFirefox less than 2.0.0.18-0.1"/>
		</criteria>
	</criteria>
	<!-- cb48097a7e63637c0a5034f65e4d2f89 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036034" comment="MozillaThunderbird-translations less than 2.0.0.18-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036035" comment="MozillaThunderbird less than 2.0.0.18-1.1"/>
		</criteria>
	</criteria>
	<!-- d3727a2e3ce36a415dccc357e982ccb4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034762" comment="seamonkey-dom-inspector less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034763" comment="seamonkey-irc less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034764" comment="seamonkey-mail less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034765" comment="seamonkey-spellchecker less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034766" comment="seamonkey-venkman less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034767" comment="seamonkey less than 1.1.13-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5013</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5013" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5013" source="CVE"/>
	<description>
	Mozilla Firefox 2.x before 2.0.0.18 and SeaMonkey 1.x before 1.1.13 do not properly check when the Flash module has been dynamically unloaded properly, which allows remote attackers to execute arbitrary code via a crafted SWF file that "dynamically unloads itself from an outside JavaScript function," which triggers an access of an expired memory address.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 061d649b399bf6dc687c2e75acae19b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034751" comment="epiphany-devel less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034752" comment="epiphany-doc less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034753" comment="epiphany-extensions less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034754" comment="epiphany less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034755" comment="mozilla-xulrunner181-32bit less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034756" comment="mozilla-xulrunner181-64bit less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034757" comment="mozilla-xulrunner181-devel less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034758" comment="mozilla-xulrunner181-l10n less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034759" comment="mozilla-xulrunner181 less than 1.8.1.18-0.1"/>
		</criteria>
	</criteria>
	<!-- 7c70bc51bdcfd393c1802132c39993c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034760" comment="MozillaFirefox-translations less than 2.0.0.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034761" comment="MozillaFirefox less than 2.0.0.18-0.1"/>
		</criteria>
	</criteria>
	<!-- d3727a2e3ce36a415dccc357e982ccb4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034762" comment="seamonkey-dom-inspector less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034763" comment="seamonkey-irc less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034764" comment="seamonkey-mail less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034765" comment="seamonkey-spellchecker less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034766" comment="seamonkey-venkman less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034767" comment="seamonkey less than 1.1.13-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5014</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5014" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5014" source="CVE"/>
	<description>
	jslock.cpp in Mozilla Firefox 3.x before 3.0.2, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by modifying the window.__proto__.__proto__ object in a way that causes a lock on a non-native object, which triggers an assertion failure related to the OBJ_IS_NATIVE function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 061d649b399bf6dc687c2e75acae19b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034751" comment="epiphany-devel less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034752" comment="epiphany-doc less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034753" comment="epiphany-extensions less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034754" comment="epiphany less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034755" comment="mozilla-xulrunner181-32bit less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034756" comment="mozilla-xulrunner181-64bit less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034757" comment="mozilla-xulrunner181-devel less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034758" comment="mozilla-xulrunner181-l10n less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034759" comment="mozilla-xulrunner181 less than 1.8.1.18-0.1"/>
		</criteria>
	</criteria>
	<!-- 7c70bc51bdcfd393c1802132c39993c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034760" comment="MozillaFirefox-translations less than 2.0.0.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034761" comment="MozillaFirefox less than 2.0.0.18-0.1"/>
		</criteria>
	</criteria>
	<!-- cb48097a7e63637c0a5034f65e4d2f89 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036034" comment="MozillaThunderbird-translations less than 2.0.0.18-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036035" comment="MozillaThunderbird less than 2.0.0.18-1.1"/>
		</criteria>
	</criteria>
	<!-- d3727a2e3ce36a415dccc357e982ccb4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034762" comment="seamonkey-dom-inspector less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034763" comment="seamonkey-irc less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034764" comment="seamonkey-mail less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034765" comment="seamonkey-spellchecker less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034766" comment="seamonkey-venkman less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034767" comment="seamonkey less than 1.1.13-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5015</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5015" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5015" source="CVE"/>
	<description>
	Mozilla Firefox 3.x before 3.0.4 assigns chrome privileges to a file: URI when it is accessed in the same tab from a chrome or privileged about: page, which makes it easier for user-assisted attackers to execute arbitrary JavaScript with chrome privileges via malicious code in a file that has already been saved on the local system.
	</description>
 </metadata>
<!-- 7c70bc51bdcfd393c1802132c39993c7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034760" comment="MozillaFirefox-translations less than 2.0.0.18-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034761" comment="MozillaFirefox less than 2.0.0.18-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5016</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5016" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5016" source="CVE"/>
	<description>
	The layout engine in Mozilla Firefox 3.x before 3.0.4, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) via multiple vectors that trigger an assertion failure or other consequences.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 061d649b399bf6dc687c2e75acae19b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034751" comment="epiphany-devel less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034752" comment="epiphany-doc less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034753" comment="epiphany-extensions less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034754" comment="epiphany less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034755" comment="mozilla-xulrunner181-32bit less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034756" comment="mozilla-xulrunner181-64bit less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034757" comment="mozilla-xulrunner181-devel less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034758" comment="mozilla-xulrunner181-l10n less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034759" comment="mozilla-xulrunner181 less than 1.8.1.18-0.1"/>
		</criteria>
	</criteria>
	<!-- 7c70bc51bdcfd393c1802132c39993c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034760" comment="MozillaFirefox-translations less than 2.0.0.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034761" comment="MozillaFirefox less than 2.0.0.18-0.1"/>
		</criteria>
	</criteria>
	<!-- cb48097a7e63637c0a5034f65e4d2f89 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036034" comment="MozillaThunderbird-translations less than 2.0.0.18-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036035" comment="MozillaThunderbird less than 2.0.0.18-1.1"/>
		</criteria>
	</criteria>
	<!-- d3727a2e3ce36a415dccc357e982ccb4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034762" comment="seamonkey-dom-inspector less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034763" comment="seamonkey-irc less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034764" comment="seamonkey-mail less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034765" comment="seamonkey-spellchecker less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034766" comment="seamonkey-venkman less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034767" comment="seamonkey less than 1.1.13-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5017</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5017" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5017" source="CVE"/>
	<description>
	Integer overflow in xpcom/io/nsEscape.cpp in the browser engine in Mozilla Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 061d649b399bf6dc687c2e75acae19b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034751" comment="epiphany-devel less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034752" comment="epiphany-doc less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034753" comment="epiphany-extensions less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034754" comment="epiphany less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034755" comment="mozilla-xulrunner181-32bit less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034756" comment="mozilla-xulrunner181-64bit less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034757" comment="mozilla-xulrunner181-devel less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034758" comment="mozilla-xulrunner181-l10n less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034759" comment="mozilla-xulrunner181 less than 1.8.1.18-0.1"/>
		</criteria>
	</criteria>
	<!-- 7c70bc51bdcfd393c1802132c39993c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034760" comment="MozillaFirefox-translations less than 2.0.0.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034761" comment="MozillaFirefox less than 2.0.0.18-0.1"/>
		</criteria>
	</criteria>
	<!-- cb48097a7e63637c0a5034f65e4d2f89 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036034" comment="MozillaThunderbird-translations less than 2.0.0.18-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036035" comment="MozillaThunderbird less than 2.0.0.18-1.1"/>
		</criteria>
	</criteria>
	<!-- d3727a2e3ce36a415dccc357e982ccb4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034762" comment="seamonkey-dom-inspector less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034763" comment="seamonkey-irc less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034764" comment="seamonkey-mail less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034765" comment="seamonkey-spellchecker less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034766" comment="seamonkey-venkman less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034767" comment="seamonkey less than 1.1.13-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5018</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5018" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5018" source="CVE"/>
	<description>
	The JavaScript engine in Mozilla Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) via vectors related to "insufficient class checking" in the Date class.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 061d649b399bf6dc687c2e75acae19b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034751" comment="epiphany-devel less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034752" comment="epiphany-doc less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034753" comment="epiphany-extensions less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034754" comment="epiphany less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034755" comment="mozilla-xulrunner181-32bit less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034756" comment="mozilla-xulrunner181-64bit less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034757" comment="mozilla-xulrunner181-devel less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034758" comment="mozilla-xulrunner181-l10n less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034759" comment="mozilla-xulrunner181 less than 1.8.1.18-0.1"/>
		</criteria>
	</criteria>
	<!-- 7c70bc51bdcfd393c1802132c39993c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034760" comment="MozillaFirefox-translations less than 2.0.0.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034761" comment="MozillaFirefox less than 2.0.0.18-0.1"/>
		</criteria>
	</criteria>
	<!-- cb48097a7e63637c0a5034f65e4d2f89 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036034" comment="MozillaThunderbird-translations less than 2.0.0.18-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036035" comment="MozillaThunderbird less than 2.0.0.18-1.1"/>
		</criteria>
	</criteria>
	<!-- d3727a2e3ce36a415dccc357e982ccb4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034762" comment="seamonkey-dom-inspector less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034763" comment="seamonkey-irc less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034764" comment="seamonkey-mail less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034765" comment="seamonkey-spellchecker less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034766" comment="seamonkey-venkman less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034767" comment="seamonkey less than 1.1.13-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5019</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5019" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5019" source="CVE"/>
	<description>
	The session restore feature in Mozilla Firefox 3.x before 3.0.4 and 2.x before 2.0.0.18 allows remote attackers to violate the same origin policy to conduct cross-site scripting (XSS) attacks and execute arbitrary JavaScript with chrome privileges via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7c70bc51bdcfd393c1802132c39993c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034760" comment="MozillaFirefox-translations less than 2.0.0.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034761" comment="MozillaFirefox less than 2.0.0.18-0.1"/>
		</criteria>
	</criteria>
	<!-- cb48097a7e63637c0a5034f65e4d2f89 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036034" comment="MozillaThunderbird-translations less than 2.0.0.18-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036035" comment="MozillaThunderbird less than 2.0.0.18-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5021</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5021" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5021" source="CVE"/>
	<description>
	nsFrameManager in Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by modifying properties of a file input element while it is still being initialized, then using the blur method to access uninitialized memory.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 061d649b399bf6dc687c2e75acae19b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034751" comment="epiphany-devel less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034752" comment="epiphany-doc less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034753" comment="epiphany-extensions less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034754" comment="epiphany less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034755" comment="mozilla-xulrunner181-32bit less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034756" comment="mozilla-xulrunner181-64bit less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034757" comment="mozilla-xulrunner181-devel less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034758" comment="mozilla-xulrunner181-l10n less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034759" comment="mozilla-xulrunner181 less than 1.8.1.18-0.1"/>
		</criteria>
	</criteria>
	<!-- 7c70bc51bdcfd393c1802132c39993c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034760" comment="MozillaFirefox-translations less than 2.0.0.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034761" comment="MozillaFirefox less than 2.0.0.18-0.1"/>
		</criteria>
	</criteria>
	<!-- cb48097a7e63637c0a5034f65e4d2f89 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036034" comment="MozillaThunderbird-translations less than 2.0.0.18-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036035" comment="MozillaThunderbird less than 2.0.0.18-1.1"/>
		</criteria>
	</criteria>
	<!-- d3727a2e3ce36a415dccc357e982ccb4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034762" comment="seamonkey-dom-inspector less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034763" comment="seamonkey-irc less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034764" comment="seamonkey-mail less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034765" comment="seamonkey-spellchecker less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034766" comment="seamonkey-venkman less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034767" comment="seamonkey less than 1.1.13-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5022</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5022" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5022" source="CVE"/>
	<description>
	The nsXMLHttpRequest::NotifyEventListeners method in Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to bypass the same-origin policy and execute arbitrary script via multiple listeners, which bypass the inner window check.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 061d649b399bf6dc687c2e75acae19b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034751" comment="epiphany-devel less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034752" comment="epiphany-doc less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034753" comment="epiphany-extensions less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034754" comment="epiphany less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034755" comment="mozilla-xulrunner181-32bit less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034756" comment="mozilla-xulrunner181-64bit less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034757" comment="mozilla-xulrunner181-devel less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034758" comment="mozilla-xulrunner181-l10n less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034759" comment="mozilla-xulrunner181 less than 1.8.1.18-0.1"/>
		</criteria>
	</criteria>
	<!-- 7c70bc51bdcfd393c1802132c39993c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034760" comment="MozillaFirefox-translations less than 2.0.0.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034761" comment="MozillaFirefox less than 2.0.0.18-0.1"/>
		</criteria>
	</criteria>
	<!-- cb48097a7e63637c0a5034f65e4d2f89 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036034" comment="MozillaThunderbird-translations less than 2.0.0.18-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036035" comment="MozillaThunderbird less than 2.0.0.18-1.1"/>
		</criteria>
	</criteria>
	<!-- d3727a2e3ce36a415dccc357e982ccb4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034762" comment="seamonkey-dom-inspector less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034763" comment="seamonkey-irc less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034764" comment="seamonkey-mail less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034765" comment="seamonkey-spellchecker less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034766" comment="seamonkey-venkman less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034767" comment="seamonkey less than 1.1.13-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5023</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5023" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5023" source="CVE"/>
	<description>
	Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to bypass the protection mechanism for codebase principals and execute arbitrary script via the -moz-binding CSS property in a signed JAR file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 061d649b399bf6dc687c2e75acae19b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034751" comment="epiphany-devel less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034752" comment="epiphany-doc less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034753" comment="epiphany-extensions less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034754" comment="epiphany less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034755" comment="mozilla-xulrunner181-32bit less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034756" comment="mozilla-xulrunner181-64bit less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034757" comment="mozilla-xulrunner181-devel less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034758" comment="mozilla-xulrunner181-l10n less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034759" comment="mozilla-xulrunner181 less than 1.8.1.18-0.1"/>
		</criteria>
	</criteria>
	<!-- 7c70bc51bdcfd393c1802132c39993c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034760" comment="MozillaFirefox-translations less than 2.0.0.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034761" comment="MozillaFirefox less than 2.0.0.18-0.1"/>
		</criteria>
	</criteria>
	<!-- d3727a2e3ce36a415dccc357e982ccb4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034762" comment="seamonkey-dom-inspector less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034763" comment="seamonkey-irc less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034764" comment="seamonkey-mail less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034765" comment="seamonkey-spellchecker less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034766" comment="seamonkey-venkman less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034767" comment="seamonkey less than 1.1.13-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5024</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5024" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5024" source="CVE"/>
	<description>
	Mozilla Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 do not properly escape quote characters used for XML processing, which allows remote attackers to conduct XML injection attacks via the default namespace in an E4X document.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 061d649b399bf6dc687c2e75acae19b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034751" comment="epiphany-devel less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034752" comment="epiphany-doc less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034753" comment="epiphany-extensions less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034754" comment="epiphany less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034755" comment="mozilla-xulrunner181-32bit less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034756" comment="mozilla-xulrunner181-64bit less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034757" comment="mozilla-xulrunner181-devel less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034758" comment="mozilla-xulrunner181-l10n less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034759" comment="mozilla-xulrunner181 less than 1.8.1.18-0.1"/>
		</criteria>
	</criteria>
	<!-- 7c70bc51bdcfd393c1802132c39993c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034760" comment="MozillaFirefox-translations less than 2.0.0.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034761" comment="MozillaFirefox less than 2.0.0.18-0.1"/>
		</criteria>
	</criteria>
	<!-- cb48097a7e63637c0a5034f65e4d2f89 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036034" comment="MozillaThunderbird-translations less than 2.0.0.18-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036035" comment="MozillaThunderbird less than 2.0.0.18-1.1"/>
		</criteria>
	</criteria>
	<!-- d3727a2e3ce36a415dccc357e982ccb4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034762" comment="seamonkey-dom-inspector less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034763" comment="seamonkey-irc less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034764" comment="seamonkey-mail less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034765" comment="seamonkey-spellchecker less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034766" comment="seamonkey-venkman less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034767" comment="seamonkey less than 1.1.13-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5025</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5025" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5025" source="CVE"/>
	<description>
	Stack-based buffer overflow in the hfs_cat_find_brec function in fs/hfs/catalog.c in the Linux kernel before 2.6.28-rc1 allows attackers to cause a denial of service (memory corruption or system crash) via an hfs filesystem image with an invalid catalog namelength field, a related issue to CVE-2008-4933.
	</description>
 </metadata>
<!-- 8504cb9aa3cf26986c7f273aafa740b5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036010" comment="kernel-bigsmp less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036011" comment="kernel-debug less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036012" comment="kernel-default less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036013" comment="kernel-kdump less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036014" comment="kernel-ppc64 less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036015" comment="kernel-source less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036016" comment="kernel-syms less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036017" comment="kernel-xen less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036018" comment="kernel-xenpae less than 2.6.22.19-0.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5029</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5029" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5029" source="CVE"/>
	<description>
	The __scm_destroy function in net/core/scm.c in the Linux kernel 2.6.27.4, 2.6.26, and earlier makes indirect recursive calls to itself through calls to the fput function, which allows local users to cause a denial of service (panic) via vectors related to sending an SCM_RIGHTS message through a UNIX domain socket and closing file descriptors.
	</description>
 </metadata>
<!-- 8504cb9aa3cf26986c7f273aafa740b5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036010" comment="kernel-bigsmp less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036011" comment="kernel-debug less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036012" comment="kernel-default less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036013" comment="kernel-kdump less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036014" comment="kernel-ppc64 less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036015" comment="kernel-source less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036016" comment="kernel-syms less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036017" comment="kernel-xen less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036018" comment="kernel-xenpae less than 2.6.22.19-0.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5050</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5050" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5050" source="CVE"/>
	<description>
	Off-by-one error in the get_unicode_name function (libclamav/vba_extract.c) in Clam Anti-Virus (ClamAV) before 0.94.1 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted VBA project file, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 3e1b3ac70c8f64e9f5d3d51ffa68e942 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036036" comment="clamav-db less than 0.94.1-2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033880" comment="clamav less than 0.94.1-2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5052</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5052" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5052" source="CVE"/>
	<description>
	The AppendAttributeValue function in the JavaScript engine in Mozilla Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger memory corruption, as demonstrated by e4x/extensions/regress-410192.js.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 061d649b399bf6dc687c2e75acae19b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034751" comment="epiphany-devel less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034752" comment="epiphany-doc less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034753" comment="epiphany-extensions less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034754" comment="epiphany less than 2.20.0-8.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034755" comment="mozilla-xulrunner181-32bit less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034756" comment="mozilla-xulrunner181-64bit less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034757" comment="mozilla-xulrunner181-devel less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034758" comment="mozilla-xulrunner181-l10n less than 1.8.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034759" comment="mozilla-xulrunner181 less than 1.8.1.18-0.1"/>
		</criteria>
	</criteria>
	<!-- 7c70bc51bdcfd393c1802132c39993c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034760" comment="MozillaFirefox-translations less than 2.0.0.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034761" comment="MozillaFirefox less than 2.0.0.18-0.1"/>
		</criteria>
	</criteria>
	<!-- cb48097a7e63637c0a5034f65e4d2f89 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036034" comment="MozillaThunderbird-translations less than 2.0.0.18-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036035" comment="MozillaThunderbird less than 2.0.0.18-1.1"/>
		</criteria>
	</criteria>
	<!-- d3727a2e3ce36a415dccc357e982ccb4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034762" comment="seamonkey-dom-inspector less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034763" comment="seamonkey-irc less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034764" comment="seamonkey-mail less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034765" comment="seamonkey-spellchecker less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034766" comment="seamonkey-venkman less than 1.1.13-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034767" comment="seamonkey less than 1.1.13-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5076</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5076" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5076" source="CVE"/>
	<description>
	htop 0.7 writes process names to a terminal without sanitizing non-printable characters, which might allow local users to hide processes, modify arbitrary files, or have unspecified other impact via a process name with "crazy control strings."
	</description>
 </metadata>
<!-- e6eebf954de2c1a1f212078c0ffe5850 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036037" comment="htop less than 0.6.6-24.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5077</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077" source="CVE"/>
	<description>
	OpenSSL 0.9.8i and earlier does not properly check the return value from the EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7cc020b24990406f52b364aad965f3be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036038" comment="libopenssl-devel less than 0.9.8e-45.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036039" comment="libopenssl0_9_8-32bit less than 0.9.8e-45.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036040" comment="libopenssl0_9_8-64bit less than 0.9.8e-45.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036041" comment="libopenssl0_9_8 less than 0.9.8e-45.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036042" comment="openssl-certs less than 0.9.8e-45.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036043" comment="openssl-doc less than 0.9.8e-45.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036044" comment="openssl less than 0.9.8e-45.7"/>
		</criteria>
	</criteria>
	<!-- 87fa06ce6c77615d48e5d5ced99a033e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036045" comment="compat-openssl097g-32bit less than 0.9.7g-75.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036046" comment="compat-openssl097g-64bit less than 0.9.7g-75.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036047" comment="compat-openssl097g less than 0.9.7g-75.5"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5079</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5079" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5079" source="CVE"/>
	<description>
	net/atm/svc.c in the ATM subsystem in the Linux kernel 2.6.27.8 and earlier allows local users to cause a denial of service (kernel infinite loop) by making two calls to svc_listen for the same socket, and then reading a /proc/net/atm/*vc file, related to corruption of the vcc table.
	</description>
 </metadata>
<!-- 8504cb9aa3cf26986c7f273aafa740b5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036010" comment="kernel-bigsmp less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036011" comment="kernel-debug less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036012" comment="kernel-default less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036013" comment="kernel-kdump less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036014" comment="kernel-ppc64 less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036015" comment="kernel-source less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036016" comment="kernel-syms less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036017" comment="kernel-xen less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036018" comment="kernel-xenpae less than 2.6.22.19-0.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5081</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5081" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5081" source="CVE"/>
	<description>
	The originates_from_local_legacy_unicast_socket function (avahi-core/server.c) in avahi-daemon in Avahi before 0.6.24 allows remote attackers to cause a denial of service (crash) via a crafted mDNS packet with a source port of 0, which triggers an assertion failure.
	</description>
 </metadata>
<!-- b314913be23c588a2e6ca4da67095855 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036048" comment="avahi-32bit less than 0.6.20-40.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036049" comment="avahi-64bit less than 0.6.20-40.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036050" comment="avahi-compat-howl-devel less than 0.6.20-40.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036051" comment="avahi-compat-howl less than 0.6.20-40.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036052" comment="avahi-compat-mDNSResponder-32bit less than 0.6.20-40.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036053" comment="avahi-compat-mDNSResponder-64bit less than 0.6.20-40.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036054" comment="avahi-compat-mDNSResponder-devel less than 0.6.20-40.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036055" comment="avahi-compat-mDNSResponder less than 0.6.20-40.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036056" comment="avahi-devel less than 0.6.20-40.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036057" comment="avahi-glib-32bit less than 0.6.20-40.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036058" comment="avahi-glib-64bit less than 0.6.20-40.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036059" comment="avahi-glib less than 0.6.20-40.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036060" comment="avahi-python less than 0.6.20-40.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036061" comment="avahi-qt3 less than 0.6.20-40.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036062" comment="avahi-qt4 less than 0.6.20-40.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036063" comment="avahi less than 0.6.20-40.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5086</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5086" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5086" source="CVE"/>
	<description>
	Multiple methods in libvirt 0.3.2 through 0.5.1 do not check if a connection is read-only, which allows local users to bypass intended access restrictions and perform administrative actions.
	</description>
 </metadata>
<!-- c08769770b29c96fb099387f28e32809 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036064" comment="libvirt-devel less than 0.3.0-30.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036065" comment="libvirt-doc less than 0.3.0-30.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036066" comment="libvirt-python less than 0.3.0-30.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036067" comment="libvirt less than 0.3.0-30.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5101</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5101" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5101" source="CVE"/>
	<description>
	Buffer overflow in the BMP reader in OptiPNG 0.6 and 0.6.1 allows user-assisted attackers to execute arbitrary code via a crafted BMP image, related to an "array overflow."
	</description>
 </metadata>
<!-- a5c0a2df14cab64172e080cf34313719 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036068" comment="optipng less than 0.6.2-2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5134</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5134" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5134" source="CVE"/>
	<description>
	Buffer overflow in the lbs_process_bss function in drivers/net/wireless/libertas/scan.c in the libertas subsystem in the Linux kernel before 2.6.27.5 allows remote attackers to have an unknown impact via an "invalid beacon/probe response."
	</description>
 </metadata>
<!-- 8504cb9aa3cf26986c7f273aafa740b5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036010" comment="kernel-bigsmp less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036011" comment="kernel-debug less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036012" comment="kernel-default less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036013" comment="kernel-kdump less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036014" comment="kernel-ppc64 less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036015" comment="kernel-source less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036016" comment="kernel-syms less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036017" comment="kernel-xen less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036018" comment="kernel-xenpae less than 2.6.22.19-0.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5138</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5138" source="CVE"/>
	<description>
	passwdehd in libpam-mount 0.43 allows local users to overwrite arbitrary files via a symlink attack on a /tmp/passwdehd.##### temporary file.
	</description>
 </metadata>
<!-- 19eded2f1b85d76a42034869fdd319b4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036069" comment="pam_mount-32bit less than 0.18-84.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036070" comment="pam_mount-64bit less than 0.18-84.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036071" comment="pam_mount less than 0.18-84.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5182</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5182" source="CVE"/>
	<description>
	The inotify functionality in Linux kernel 2.6 before 2.6.28-rc5 might allow local users to gain privileges via unknown vectors related to race conditions in inotify watch removal and umount.
	</description>
 </metadata>
<!-- 8504cb9aa3cf26986c7f273aafa740b5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036010" comment="kernel-bigsmp less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036011" comment="kernel-debug less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036012" comment="kernel-default less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036013" comment="kernel-kdump less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036014" comment="kernel-ppc64 less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036015" comment="kernel-source less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036016" comment="kernel-syms less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036017" comment="kernel-xen less than 2.6.22.19-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036018" comment="kernel-xenpae less than 2.6.22.19-0.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5187</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5187" source="CVE"/>
	<description>
	The load function in the XPM loader for imlib2 1.4.2, and possibly other versions, allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XPM file that triggers a "pointer arithmetic error" and a heap-based buffer overflow, a different vulnerability than CVE-2008-2426.
	</description>
 </metadata>
<!-- c5eb91524d3b494f968a574f2345be31 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036072" comment="imlib2-devel less than 1.3.0-66.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036073" comment="imlib2-filters less than 1.3.0-66.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036074" comment="imlib2-loaders less than 1.3.0-66.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036075" comment="imlib2 less than 1.3.0-66.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5189</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5189" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5189" source="CVE"/>
	<description>
	CRLF injection vulnerability in Ruby on Rails before 2.0.5 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted URL to the redirect_to function.
	</description>
 </metadata>
<!-- e7005d334b9ba2f2def6cfab32062d35 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036076" comment="rubygem-actionpack less than 1.13.3-20.5"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5233</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5233" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5233" source="CVE"/>
	<description>
	xine-lib 1.1.12, and other versions before 1.1.15, does not check for failure of malloc in circumstances including (1) the mymng_process_header function in demux_mng.c, (2) the open_mod_file function in demux_mod.c, and (3) frame_buffer allocation in the real_parse_audio_specific_data function in demux_real.c, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted media file.
	</description>
 </metadata>
<!-- 9e1a1d630bb1286b77d0fc2d6b00aa8c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035670" comment="xine-devel less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035671" comment="xine-extra less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035672" comment="xine-lib-32bit less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035673" comment="xine-lib-64bit less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035674" comment="xine-lib less than 1.1.8-14.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5234</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5234" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5234" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in xine-lib 1.1.12, and other versions before 1.1.15, allow remote attackers to execute arbitrary code via vectors related to (1) a crafted metadata atom size processed by the parse_moov_atom function in demux_qt.c and (2) frame reading in the id3v23_interp_frame function in id3.c.  NOTE: as of 20081122, it is possible that vector 1 has not been fixed in 1.1.15.
	</description>
 </metadata>
<!-- 9e1a1d630bb1286b77d0fc2d6b00aa8c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035670" comment="xine-devel less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035671" comment="xine-extra less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035672" comment="xine-lib-32bit less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035673" comment="xine-lib-64bit less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035674" comment="xine-lib less than 1.1.8-14.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5235</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5235" source="CVE"/>
	<description>
	Heap-based buffer overflow in the demux_real_send_chunk function in src/demuxers/demux_real.c in xine-lib before 1.1.15 allows remote attackers to execute arbitrary code via a crafted Real Media file. NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 9e1a1d630bb1286b77d0fc2d6b00aa8c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035670" comment="xine-devel less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035671" comment="xine-extra less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035672" comment="xine-lib-32bit less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035673" comment="xine-lib-64bit less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035674" comment="xine-lib less than 1.1.8-14.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5236</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5236" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5236" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in xine-lib 1.1.12, and other 1.1.15 and earlier versions, allow remote attackers to execute arbitrary code via vectors related to (1) a crafted EBML element length processed by the parse_block_group function in demux_matroska.c; (2) a certain combination of sps, w, and h values processed by the real_parse_audio_specific_data and demux_real_send_chunk functions in demux_real.c; and (3) an unspecified combination of three values processed by the open_ra_file function in demux_realaudio.c.  NOTE: vector 2 reportedly exists because of an incomplete fix in 1.1.15.
	</description>
 </metadata>
<!-- 9e1a1d630bb1286b77d0fc2d6b00aa8c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035670" comment="xine-devel less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035671" comment="xine-extra less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035672" comment="xine-lib-32bit less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035673" comment="xine-lib-64bit less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035674" comment="xine-lib less than 1.1.8-14.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5237</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5237" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5237" source="CVE"/>
	<description>
	Multiple integer overflows in xine-lib 1.1.12, and other 1.1.15 and earlier versions, allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via (1) crafted width and height values that are not validated by the mymng_process_header function in demux_mng.c before use in an allocation calculation or (2) crafted current_atom_size and string_size values processed by the parse_reference_atom function in demux_qt.c for an RDRF_ATOM string.
	</description>
 </metadata>
<!-- 9e1a1d630bb1286b77d0fc2d6b00aa8c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035670" comment="xine-devel less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035671" comment="xine-extra less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035672" comment="xine-lib-32bit less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035673" comment="xine-lib-64bit less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035674" comment="xine-lib less than 1.1.8-14.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5238</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5238" source="CVE"/>
	<description>
	Integer overflow in the real_parse_mdpr function in demux_real.c in xine-lib 1.1.12, and other versions before 1.1.15, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted stream_name_size field.
	</description>
 </metadata>
<!-- 9e1a1d630bb1286b77d0fc2d6b00aa8c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035670" comment="xine-devel less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035671" comment="xine-extra less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035672" comment="xine-lib-32bit less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035673" comment="xine-lib-64bit less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035674" comment="xine-lib less than 1.1.8-14.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5239</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5239" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5239" source="CVE"/>
	<description>
	xine-lib 1.1.12, and other 1.1.15 and earlier versions, does not properly handle (a) negative and (b) zero values during unspecified read function calls in input_file.c, input_net.c, input_smb.c, and input_http.c, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via vectors such as (1) a file or (2) an HTTP response, which triggers consequences such as out-of-bounds reads and heap-based buffer overflows.
	</description>
 </metadata>
<!-- 9e1a1d630bb1286b77d0fc2d6b00aa8c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035670" comment="xine-devel less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035671" comment="xine-extra less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035672" comment="xine-lib-32bit less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035673" comment="xine-lib-64bit less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035674" comment="xine-lib less than 1.1.8-14.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5240</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5240" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5240" source="CVE"/>
	<description>
	xine-lib 1.1.12, and other 1.1.15 and earlier versions, relies on an untrusted input value to determine the memory allocation and does not check the result for (1) the MATROSKA_ID_TR_CODECPRIVATE track entry element processed by demux_matroska.c; and (2) PROP_TAG, (3) MDPR_TAG, and (4) CONT_TAG chunks processed by the real_parse_headers function in demux_real.c; which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) or possibly execute arbitrary code via a crafted value.
	</description>
 </metadata>
<!-- 9e1a1d630bb1286b77d0fc2d6b00aa8c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035670" comment="xine-devel less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035671" comment="xine-extra less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035672" comment="xine-lib-32bit less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035673" comment="xine-lib-64bit less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035674" comment="xine-lib less than 1.1.8-14.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5241</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5241" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5241" source="CVE"/>
	<description>
	Integer underflow in demux_qt.c in xine-lib 1.1.12, and other 1.1.15 and earlier versions, allows remote attackers to cause a denial of service (crash) via a crafted media file that results in a small value of moov_atom_size in a compressed MOV (aka CMOV_ATOM).
	</description>
 </metadata>
<!-- 9e1a1d630bb1286b77d0fc2d6b00aa8c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035670" comment="xine-devel less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035671" comment="xine-extra less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035672" comment="xine-lib-32bit less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035673" comment="xine-lib-64bit less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035674" comment="xine-lib less than 1.1.8-14.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5242</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5242" source="CVE"/>
	<description>
	demux_qt.c in xine-lib 1.1.12, and other 1.1.15 and earlier versions, does not validate the count field before calling calloc for STSD_ATOM atom allocation, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted media file.
	</description>
 </metadata>
<!-- 9e1a1d630bb1286b77d0fc2d6b00aa8c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035670" comment="xine-devel less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035671" comment="xine-extra less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035672" comment="xine-lib-32bit less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035673" comment="xine-lib-64bit less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035674" comment="xine-lib less than 1.1.8-14.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5243</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5243" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5243" source="CVE"/>
	<description>
	The real_parse_headers function in demux_real.c in xine-lib 1.1.12, and other 1.1.15 and earlier versions, relies on an untrusted input length value to "reindex into an allocated buffer," which allows remote attackers to cause a denial of service (crash) via a crafted value, probably an array index error.
	</description>
 </metadata>
<!-- 9e1a1d630bb1286b77d0fc2d6b00aa8c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035670" comment="xine-devel less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035671" comment="xine-extra less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035672" comment="xine-lib-32bit less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035673" comment="xine-lib-64bit less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035674" comment="xine-lib less than 1.1.8-14.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5244</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5244" source="CVE"/>
	<description>
	Unspecified vulnerability in xine-lib before 1.1.15 has unknown impact and attack vectors related to libfaad.  NOTE: due to the lack of details, it is not clear whether this is an issue in xine-lib or in libfaad.
	</description>
 </metadata>
<!-- 9e1a1d630bb1286b77d0fc2d6b00aa8c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035670" comment="xine-devel less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035671" comment="xine-extra less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035672" comment="xine-lib-32bit less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035673" comment="xine-lib-64bit less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035674" comment="xine-lib less than 1.1.8-14.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5245</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5245" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5245" source="CVE"/>
	<description>
	xine-lib before 1.1.15 performs V4L video frame preallocation before ascertaining the required length, which has unknown impact and attack vectors, possibly related to a buffer overflow in the open_video_capture_device function in src/input/input_v4l.c.
	</description>
 </metadata>
<!-- 9e1a1d630bb1286b77d0fc2d6b00aa8c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035670" comment="xine-devel less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035671" comment="xine-extra less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035672" comment="xine-lib-32bit less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035673" comment="xine-lib-64bit less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035674" comment="xine-lib less than 1.1.8-14.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5246</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5246" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5246" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in xine-lib before 1.1.15 allow remote attackers to execute arbitrary code via vectors that send ID3 data to the (1) id3v22_interp_frame and (2) id3v24_interp_frame functions in src/demuxers/id3.c.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
	</description>
 </metadata>
<!-- 9e1a1d630bb1286b77d0fc2d6b00aa8c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035670" comment="xine-devel less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035671" comment="xine-extra less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035672" comment="xine-lib-32bit less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035673" comment="xine-lib-64bit less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035674" comment="xine-lib less than 1.1.8-14.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5247</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5247" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5247" source="CVE"/>
	<description>
	The real_parse_audio_specific_data function in demux_real.c in xine-lib 1.1.12, and other 1.1.15 and earlier versions, uses an untrusted height (aka codec_data_length) value as a divisor, which allow remote attackers to cause a denial of service (divide-by-zero error and crash) via a zero value.
	</description>
 </metadata>
<!-- 9e1a1d630bb1286b77d0fc2d6b00aa8c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035670" comment="xine-devel less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035671" comment="xine-extra less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035672" comment="xine-lib-32bit less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035673" comment="xine-lib-64bit less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035674" comment="xine-lib less than 1.1.8-14.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5248</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5248" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5248" source="CVE"/>
	<description>
	xine-lib before 1.1.15 allows remote attackers to cause a denial of service (crash) via "MP3 files with metadata consisting only of separators."
	</description>
 </metadata>
<!-- 9e1a1d630bb1286b77d0fc2d6b00aa8c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035670" comment="xine-devel less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035671" comment="xine-extra less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035672" comment="xine-lib-32bit less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035673" comment="xine-lib-64bit less than 1.1.8-14.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035674" comment="xine-lib less than 1.1.8-14.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5250</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5250" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5250" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in MediaWiki before 1.6.11, 1.12.x before 1.12.2, and 1.13.x before 1.13.3, when Internet Explorer is used and uploads are enabled, or an SVG scripting browser is used and SVG uploads are enabled, allows remote authenticated users to inject arbitrary web script or HTML by editing a wiki page.
	</description>
 </metadata>
<!-- ad2fa1a4b6c3da61734395db283f8700 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036077" comment="mediawiki less than 1.10.0-32.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5252</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5252" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5252" source="CVE"/>
	<description>
	Cross-site request forgery (CSRF) vulnerability in the Special:Import feature in MediaWiki 1.3.0 through 1.6.10, 1.12.x before 1.12.2, and 1.13.x before 1.13.3 allows remote attackers to perform unspecified actions as authenticated users via unknown vectors.
	</description>
 </metadata>
<!-- ad2fa1a4b6c3da61734395db283f8700 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036077" comment="mediawiki less than 1.10.0-32.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5256</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5256" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5256" source="CVE"/>
	<description>
	The AcquireDaemonLock function in ipcdUnix.cpp in Sun Innotek VirtualBox before 2.0.6 allows local users to overwrite arbitrary files via a symlink attack on a /tmp/.vbox-$USER-ipc/lock temporary file.
	</description>
 </metadata>
<!-- 807c562d64291ea6387ab78f9092711f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036078" comment="virtualbox-guest-tools less than 1.5.2-10.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036079" comment="virtualbox less than 1.5.2-10.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036080" comment="xorg-x11-driver-virtualbox less than 1.5.2-10.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5277</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5277" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5277" source="CVE"/>
	<description>
	PowerDNS before 2.9.21.2 allows remote attackers to cause a denial of service (daemon crash) via a CH HINFO query.
	</description>
 </metadata>
<!-- 96531c9bb810b80d23f0e3663c9c56d7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036081" comment="pdns-backend-ldap less than 2.9.21-57.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036082" comment="pdns-backend-mysql less than 2.9.21-57.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036083" comment="pdns-backend-postgresql less than 2.9.21-57.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036084" comment="pdns-backend-sqlite2 less than 2.9.21-57.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036085" comment="pdns-backend-sqlite3 less than 2.9.21-57.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036086" comment="pdns less than 2.9.21-57.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5285</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5285" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5285" source="CVE"/>
	<description>
	Wireshark 1.0.4 and earlier allows remote attackers to cause a denial of service via a long SMTP request, which triggers an infinite loop.
	</description>
 </metadata>
<!-- ca7dc4523ffbb7981257a4aa0529accb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035862" comment="wireshark-devel less than 0.99.6-31.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035863" comment="wireshark less than 0.99.6-31.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5286</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5286" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5286" source="CVE"/>
	<description>
	Integer overflow in the _cupsImageReadPNG function in CUPS 1.1.17 through 1.3.9 allows remote attackers to execute arbitrary code via a PNG image with a large height value, which bypasses a validation check and triggers a buffer overflow.
	</description>
 </metadata>
<!-- 525d0ad33e6d135b050b10cbc390c0b6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035784" comment="cups-client less than 1.2.12-22.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035785" comment="cups-devel less than 1.2.12-22.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035786" comment="cups-libs-32bit less than 1.2.12-22.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035787" comment="cups-libs-64bit less than 1.2.12-22.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035788" comment="cups-libs less than 1.2.12-22.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035789" comment="cups less than 1.2.12-22.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5314</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5314" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5314" source="CVE"/>
	<description>
	Stack consumption vulnerability in libclamav/special.c in ClamAV before 0.94.2 allows remote attackers to cause a denial of service (daemon crash) via a crafted JPEG file, related to the cli_check_jpeg_exploit, jpeg_check_photoshop, and jpeg_check_photoshop_8bim functions.
	</description>
 </metadata>
<!-- d391d5f829e20ce2df22543d4fd3b6fb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036087" comment="clamav-db less than 0.94.2-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033890" comment="clamav less than 0.94.2-1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5339</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5339" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5339" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Web Start (JWS) and Java Plug-in with Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allows untrusted JWS applications to perform network connections to unauthorized hosts via unknown vectors, aka CR 6727079.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035386" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035387" comment="java-1_5_0-sun-demo less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035388" comment="java-1_5_0-sun-devel less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035389" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035390" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035391" comment="java-1_5_0-sun-src less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035392" comment="java-1_5_0-sun less than 1.5.0_update17-0.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035393" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035394" comment="java-1_6_0-sun-demo less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035395" comment="java-1_6_0-sun-devel less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035396" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035397" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035398" comment="java-1_6_0-sun less than 1.6.0.u11-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5340</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5340" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5340" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Web Start (JWS) and Java Plug-in with Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allows untrusted JWS applications to gain privileges to access local files or applications via unknown vectors, aka 6727081.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035386" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035387" comment="java-1_5_0-sun-demo less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035388" comment="java-1_5_0-sun-devel less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035389" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035390" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035391" comment="java-1_5_0-sun-src less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035392" comment="java-1_5_0-sun less than 1.5.0_update17-0.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035393" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035394" comment="java-1_6_0-sun-demo less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035395" comment="java-1_6_0-sun-devel less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035396" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035397" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035398" comment="java-1_6_0-sun less than 1.6.0.u11-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5341</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5341" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5341" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Web Start (JWS) and Java Plug-in with Sun JDK and JRE 6 Update 10 and earlier, and JDK and JRE 5.0 Update 16 and earlier, allows untrusted JWS applications to obtain the pathname of the JWS cache and the application username via unknown vectors, aka CR 6727071.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035386" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035387" comment="java-1_5_0-sun-demo less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035388" comment="java-1_5_0-sun-devel less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035389" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035390" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035391" comment="java-1_5_0-sun-src less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035392" comment="java-1_5_0-sun less than 1.5.0_update17-0.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035393" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035394" comment="java-1_6_0-sun-demo less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035395" comment="java-1_6_0-sun-devel less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035396" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035397" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035398" comment="java-1_6_0-sun less than 1.6.0.u11-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5342</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5342" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5342" source="CVE"/>
	<description>
	Unspecified vulnerability in the BasicService for Java Web Start (JWS) and Java Plug-in with Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allows untrusted downloaded applications to cause local files to be displayed in the browser of the user of the untrusted application via unknown vectors, aka 6767668.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035386" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035387" comment="java-1_5_0-sun-demo less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035388" comment="java-1_5_0-sun-devel less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035389" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035390" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035391" comment="java-1_5_0-sun-src less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035392" comment="java-1_5_0-sun less than 1.5.0_update17-0.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035393" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035394" comment="java-1_6_0-sun-demo less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035395" comment="java-1_6_0-sun-devel less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035396" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035397" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035398" comment="java-1_6_0-sun less than 1.6.0.u11-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5343</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5343" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5343" source="CVE"/>
	<description>
	Java Web Start (JWS) and Java Plug-in with Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allows remote attackers to make unauthorized network connections and hijack HTTP sessions via a crafted file that validates as both a GIF and a Java JAR file, aka "GIFAR" and CR 6707535.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035386" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035387" comment="java-1_5_0-sun-demo less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035388" comment="java-1_5_0-sun-devel less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035389" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035390" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035391" comment="java-1_5_0-sun-src less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035392" comment="java-1_5_0-sun less than 1.5.0_update17-0.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035393" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035394" comment="java-1_6_0-sun-demo less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035395" comment="java-1_6_0-sun-devel less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035396" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035397" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035398" comment="java-1_6_0-sun less than 1.6.0.u11-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5344</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5344" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5344" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Web Start (JWS) and Java Plug-in with Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allows untrusted applets to read arbitrary files and make unauthorized network connections via unknown vectors related to applet classloading, aka 6716217.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035386" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035387" comment="java-1_5_0-sun-demo less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035388" comment="java-1_5_0-sun-devel less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035389" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035390" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035391" comment="java-1_5_0-sun-src less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035392" comment="java-1_5_0-sun less than 1.5.0_update17-0.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035393" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035394" comment="java-1_6_0-sun-demo less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035395" comment="java-1_6_0-sun-devel less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035396" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035397" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035398" comment="java-1_6_0-sun less than 1.6.0.u11-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5345</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5345" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5345" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Runtime Environment (JRE) with Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; SDK and JRE 1.4.2_18 and earlier; and SDK and JRE 1.3.1_23 and earlier allows code that is loaded from a local filesystem to read arbitrary files and make unauthorized connections to localhost via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035386" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035387" comment="java-1_5_0-sun-demo less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035388" comment="java-1_5_0-sun-devel less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035389" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035390" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035391" comment="java-1_5_0-sun-src less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035392" comment="java-1_5_0-sun less than 1.5.0_update17-0.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035393" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035394" comment="java-1_6_0-sun-demo less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035395" comment="java-1_6_0-sun-devel less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035396" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035397" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035398" comment="java-1_6_0-sun less than 1.6.0.u11-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5346</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5346" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5346" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Runtime Environment (JRE) for Sun JDK and JRE 5.0 Update 16 and earlier; SDK and JRE 1.4.2_18 and earlier; and SDK and JRE 1.3.1_23 or earlier allows untrusted applets and applications to read arbitrary memory via a crafted ZIP file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035386" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035387" comment="java-1_5_0-sun-demo less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035388" comment="java-1_5_0-sun-devel less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035389" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035390" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035391" comment="java-1_5_0-sun-src less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035392" comment="java-1_5_0-sun less than 1.5.0_update17-0.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035393" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035394" comment="java-1_6_0-sun-demo less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035395" comment="java-1_6_0-sun-devel less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035396" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035397" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035398" comment="java-1_6_0-sun less than 1.6.0.u11-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5347</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5347" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5347" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier allow untrusted applets and applications to gain privileges via vectors related to access to inner classes in the (1) JAX-WS and (2) JAXB packages.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035386" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035387" comment="java-1_5_0-sun-demo less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035388" comment="java-1_5_0-sun-devel less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035389" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035390" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035391" comment="java-1_5_0-sun-src less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035392" comment="java-1_5_0-sun less than 1.5.0_update17-0.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035393" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035394" comment="java-1_6_0-sun-demo less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035395" comment="java-1_6_0-sun-devel less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035396" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035397" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035398" comment="java-1_6_0-sun less than 1.6.0.u11-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5348</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5348" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5348" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier, when using Kerberos authentication, allows remote attackers to cause a denial of service (OS resource consumption) via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035386" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035387" comment="java-1_5_0-sun-demo less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035388" comment="java-1_5_0-sun-devel less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035389" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035390" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035391" comment="java-1_5_0-sun-src less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035392" comment="java-1_5_0-sun less than 1.5.0_update17-0.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035393" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035394" comment="java-1_6_0-sun-demo less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035395" comment="java-1_6_0-sun-devel less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035396" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035397" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035398" comment="java-1_6_0-sun less than 1.6.0.u11-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5349</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5349" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5349" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier, and JDK and JRE 5.0 Update 16 and earlier, allows remote attackers to cause a denial of service (CPU consumption) via a crafted RSA public key.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035386" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035387" comment="java-1_5_0-sun-demo less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035388" comment="java-1_5_0-sun-devel less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035389" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035390" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035391" comment="java-1_5_0-sun-src less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035392" comment="java-1_5_0-sun less than 1.5.0_update17-0.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035393" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035394" comment="java-1_6_0-sun-demo less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035395" comment="java-1_6_0-sun-devel less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035396" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035397" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035398" comment="java-1_6_0-sun less than 1.6.0.u11-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5350</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5350" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5350" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allows untrusted applications and applets to list the contents of the operating user's directory via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035386" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035387" comment="java-1_5_0-sun-demo less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035388" comment="java-1_5_0-sun-devel less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035389" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035390" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035391" comment="java-1_5_0-sun-src less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035392" comment="java-1_5_0-sun less than 1.5.0_update17-0.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035393" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035394" comment="java-1_6_0-sun-demo less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035395" comment="java-1_6_0-sun-devel less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035396" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035397" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035398" comment="java-1_6_0-sun less than 1.6.0.u11-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5351</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5351" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5351" source="CVE"/>
	<description>
	Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier accepts UTF-8 encodings that are not the "shortest" form, which makes it easier for attackers to bypass protection mechanisms for other applications that rely on shortest-form UTF-8 encodings.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035386" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035387" comment="java-1_5_0-sun-demo less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035388" comment="java-1_5_0-sun-devel less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035389" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035390" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035391" comment="java-1_5_0-sun-src less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035392" comment="java-1_5_0-sun less than 1.5.0_update17-0.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035393" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035394" comment="java-1_6_0-sun-demo less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035395" comment="java-1_6_0-sun-devel less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035396" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035397" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035398" comment="java-1_6_0-sun less than 1.6.0.u11-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5352</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5352" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5352" source="CVE"/>
	<description>
	Integer overflow in the JAR unpacking utility (unpack200) in the unpack library (unpack.dll) in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier, and JDK and JRE 5.0 Update 16 and earlier, allows untrusted applications and applets to gain privileges via a Pack200 compressed JAR file that triggers a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035386" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035387" comment="java-1_5_0-sun-demo less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035388" comment="java-1_5_0-sun-devel less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035389" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035390" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035391" comment="java-1_5_0-sun-src less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035392" comment="java-1_5_0-sun less than 1.5.0_update17-0.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035393" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035394" comment="java-1_6_0-sun-demo less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035395" comment="java-1_6_0-sun-devel less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035396" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035397" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035398" comment="java-1_6_0-sun less than 1.6.0.u11-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5353</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5353" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5353" source="CVE"/>
	<description>
	The Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier does not properly enforce context of ZoneInfo objects during deserialization, which allows remote attackers to run untrusted applets and applications in a privileged context, as demonstrated by "deserializing Calendar objects".
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035386" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035387" comment="java-1_5_0-sun-demo less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035388" comment="java-1_5_0-sun-devel less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035389" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035390" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035391" comment="java-1_5_0-sun-src less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035392" comment="java-1_5_0-sun less than 1.5.0_update17-0.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035393" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035394" comment="java-1_6_0-sun-demo less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035395" comment="java-1_6_0-sun-devel less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035396" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035397" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035398" comment="java-1_6_0-sun less than 1.6.0.u11-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5354</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5354" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5354" source="CVE"/>
	<description>
	Stack-based buffer overflow in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allows locally-launched and possibly remote untrusted Java applications to execute arbitrary code via a JAR file with a long Main-Class manifest entry.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035386" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035387" comment="java-1_5_0-sun-demo less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035388" comment="java-1_5_0-sun-devel less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035389" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035390" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035391" comment="java-1_5_0-sun-src less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035392" comment="java-1_5_0-sun less than 1.5.0_update17-0.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035393" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035394" comment="java-1_6_0-sun-demo less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035395" comment="java-1_6_0-sun-devel less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035396" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035397" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035398" comment="java-1_6_0-sun less than 1.6.0.u11-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5355</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5355" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5355" source="CVE"/>
	<description>
	The "Java Update" feature for Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier does not verify the signature of the JRE that is downloaded, which allows remote attackers to execute arbitrary code via DNS man-in-the-middle attacks.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035386" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035387" comment="java-1_5_0-sun-demo less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035388" comment="java-1_5_0-sun-devel less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035389" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035390" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035391" comment="java-1_5_0-sun-src less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035392" comment="java-1_5_0-sun less than 1.5.0_update17-0.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035393" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035394" comment="java-1_6_0-sun-demo less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035395" comment="java-1_6_0-sun-devel less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035396" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035397" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035398" comment="java-1_6_0-sun less than 1.6.0.u11-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5356</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5356" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5356" source="CVE"/>
	<description>
	Heap-based buffer overflow in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier might allow remote attackers to execute arbitrary code via a crafted TrueType font file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035386" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035387" comment="java-1_5_0-sun-demo less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035388" comment="java-1_5_0-sun-devel less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035389" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035390" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035391" comment="java-1_5_0-sun-src less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035392" comment="java-1_5_0-sun less than 1.5.0_update17-0.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035393" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035394" comment="java-1_6_0-sun-demo less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035395" comment="java-1_6_0-sun-devel less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035396" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035397" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035398" comment="java-1_6_0-sun less than 1.6.0.u11-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5357</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5357" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5357" source="CVE"/>
	<description>
	Integer overflow in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; SDK and JRE 1.4.2_18 and earlier; and SDK and JRE 1.3.1_23 and earlier might allow remote attackers to execute arbitrary code via a crafted TrueType font file, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035386" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035387" comment="java-1_5_0-sun-demo less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035388" comment="java-1_5_0-sun-devel less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035389" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035390" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035391" comment="java-1_5_0-sun-src less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035392" comment="java-1_5_0-sun less than 1.5.0_update17-0.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035393" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035394" comment="java-1_6_0-sun-demo less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035395" comment="java-1_6_0-sun-devel less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035396" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035397" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035398" comment="java-1_6_0-sun less than 1.6.0.u11-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5358</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5358" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5358" source="CVE"/>
	<description>
	Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier might allow remote attackers to execute arbitrary code via a crafted GIF file that triggers memory corruption during display of the splash screen, possibly related to splashscreen.dll.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035386" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035387" comment="java-1_5_0-sun-demo less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035388" comment="java-1_5_0-sun-devel less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035389" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035390" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035391" comment="java-1_5_0-sun-src less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035392" comment="java-1_5_0-sun less than 1.5.0_update17-0.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035393" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035394" comment="java-1_6_0-sun-demo less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035395" comment="java-1_6_0-sun-devel less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035396" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035397" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035398" comment="java-1_6_0-sun less than 1.6.0.u11-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5359</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5359" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5359" source="CVE"/>
	<description>
	Buffer overflow in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; SDK and JRE 1.4.2_18 and earlier; and SDK and JRE 1.3.1_23 and earlier might allow remote attackers to execute arbitrary code, related to a ConvolveOp operation in the Java AWT library.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035386" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035387" comment="java-1_5_0-sun-demo less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035388" comment="java-1_5_0-sun-devel less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035389" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035390" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035391" comment="java-1_5_0-sun-src less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035392" comment="java-1_5_0-sun less than 1.5.0_update17-0.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035393" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035394" comment="java-1_6_0-sun-demo less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035395" comment="java-1_6_0-sun-devel less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035396" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035397" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035398" comment="java-1_6_0-sun less than 1.6.0.u11-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5360</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5360" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5360" source="CVE"/>
	<description>
	Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; SDK and JRE 1.4.2_18 and earlier; and SDK and JRE 1.3.1_23 and earlier creates temporary files with predictable file names, which allows attackers to write malicious JAR files via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9bd44f0706e6118eb9ff78c0f46be26e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035386" comment="java-1_5_0-sun-alsa less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035387" comment="java-1_5_0-sun-demo less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035388" comment="java-1_5_0-sun-devel less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035389" comment="java-1_5_0-sun-jdbc less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035390" comment="java-1_5_0-sun-plugin less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035391" comment="java-1_5_0-sun-src less than 1.5.0_update17-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035392" comment="java-1_5_0-sun less than 1.5.0_update17-0.1"/>
		</criteria>
	</criteria>
	<!-- a386252b767e80060cf0d3550d4efb97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035393" comment="java-1_6_0-sun-alsa less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035394" comment="java-1_6_0-sun-demo less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035395" comment="java-1_6_0-sun-devel less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035396" comment="java-1_6_0-sun-jdbc less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035397" comment="java-1_6_0-sun-plugin less than 1.6.0.u11-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035398" comment="java-1_6_0-sun less than 1.6.0.u11-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5432</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5432" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5432" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Moodle before 1.6.8, 1.7 before 1.7.6, 1.8 before 1.8.7, and 1.9 before 1.9.3 allows remote attackers to inject arbitrary web script or HTML via a Wiki page name (aka page title).
	</description>
 </metadata>
<!-- f46fbbaea4702df28d6f59f8690f766b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036088" comment="moodle-af less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036089" comment="moodle-ar less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036090" comment="moodle-be less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036091" comment="moodle-bg less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036092" comment="moodle-bs less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036093" comment="moodle-ca less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036094" comment="moodle-cs less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036095" comment="moodle-da less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036096" comment="moodle-de less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036097" comment="moodle-de_du less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036098" comment="moodle-el less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036099" comment="moodle-es less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036100" comment="moodle-et less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036101" comment="moodle-eu less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036102" comment="moodle-fa less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036103" comment="moodle-fi less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036104" comment="moodle-fr less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036105" comment="moodle-ga less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036106" comment="moodle-gl less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036107" comment="moodle-he less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036108" comment="moodle-hi less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036109" comment="moodle-hr less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036110" comment="moodle-hu less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036111" comment="moodle-id less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036112" comment="moodle-is less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036113" comment="moodle-it less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036114" comment="moodle-ja less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036115" comment="moodle-ka less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036116" comment="moodle-km less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036117" comment="moodle-kn less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036118" comment="moodle-ko less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036119" comment="moodle-lt less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036120" comment="moodle-lv less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036121" comment="moodle-mi_tn less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036122" comment="moodle-ms less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036123" comment="moodle-nl less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036124" comment="moodle-nn less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036125" comment="moodle-no less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036126" comment="moodle-pl less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036127" comment="moodle-pt less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036128" comment="moodle-ro less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036129" comment="moodle-ru less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036130" comment="moodle-sk less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036131" comment="moodle-sl less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036132" comment="moodle-so less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036133" comment="moodle-sq less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036134" comment="moodle-sr less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036135" comment="moodle-sv less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036136" comment="moodle-th less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036137" comment="moodle-tl less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036138" comment="moodle-tr less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036139" comment="moodle-uk less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036140" comment="moodle-vi less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036141" comment="moodle-zh_cn less than 1.8.2-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036142" comment="moodle less than 1.8.2-17.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5498</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5498" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5498" source="CVE"/>
	<description>
	Array index error in the imageRotate function in PHP 5.2.8 and earlier allows context-dependent attackers to read the contents of arbitrary memory locations via a crafted value of the third argument (aka the bgd_color or clrBack argument) for an indexed image.
	</description>
 </metadata>
<!-- 3291c2ef45434af34802ca073998445d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036143" comment="apache2-mod_php5 less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036144" comment="php5-bcmath less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036145" comment="php5-bz2 less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036146" comment="php5-calendar less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036147" comment="php5-ctype less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036148" comment="php5-curl less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036149" comment="php5-dba less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036150" comment="php5-dbase less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036151" comment="php5-devel less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036152" comment="php5-dom less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036153" comment="php5-exif less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036154" comment="php5-fastcgi less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036155" comment="php5-ftp less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036156" comment="php5-gd less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036157" comment="php5-gettext less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036158" comment="php5-gmp less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036159" comment="php5-hash less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036160" comment="php5-iconv less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036161" comment="php5-imap less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036162" comment="php5-json less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036163" comment="php5-ldap less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036164" comment="php5-mbstring less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036165" comment="php5-mcrypt less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036166" comment="php5-mhash less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036167" comment="php5-mysql less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036168" comment="php5-ncurses less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036169" comment="php5-odbc less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036170" comment="php5-openssl less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036171" comment="php5-pcntl less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036172" comment="php5-pdo less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036173" comment="php5-pear less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036174" comment="php5-pgsql less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036175" comment="php5-posix less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036176" comment="php5-pspell less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036177" comment="php5-readline less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036178" comment="php5-shmop less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036179" comment="php5-snmp less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036180" comment="php5-soap less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036181" comment="php5-sockets less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036182" comment="php5-sqlite less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036183" comment="php5-suhosin less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036184" comment="php5-sysvmsg less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036185" comment="php5-sysvsem less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036186" comment="php5-sysvshm less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036187" comment="php5-tidy less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036188" comment="php5-tokenizer less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036189" comment="php5-wddx less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036190" comment="php5-xmlreader less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036191" comment="php5-xmlrpc less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036192" comment="php5-xmlwriter less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036193" comment="php5-xsl less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036194" comment="php5-zip less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036195" comment="php5-zlib less than 5.2.9-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5499</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5499" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5499" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player for Linux 10.0.12.36, and 9.0.151.0 and earlier, allows remote attackers to execute arbitrary code via a crafted SWF file.
	</description>
 </metadata>
<!-- 38e55e93c138aa8cec67ead2fb83a654 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031991" comment="flash-player less than 9.0.152.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5500</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5500" source="CVE"/>
	<description>
	The layout engine in Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to cause a denial of service (crash) and possibly trigger memory corruption via vectors related to (1) a reachable assertion or (2) an integer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0f4b6dd522350b04341a42f69190de9f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036196" comment="seamonkey-dom-inspector less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036197" comment="seamonkey-irc less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036198" comment="seamonkey-mail less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036199" comment="seamonkey-spellchecker less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036200" comment="seamonkey-venkman less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036201" comment="seamonkey less than 1.1.14-1.1"/>
		</criteria>
	</criteria>
	<!-- 195820826d3e66233d74d155aa116fc7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036202" comment="MozillaFirefox-translations less than 2.0.0.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036203" comment="MozillaFirefox less than 2.0.0.19-0.1"/>
		</criteria>
	</criteria>
	<!-- 565e3cc3f2466445941427dbd062511e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036204" comment="MozillaThunderbird-translations less than 2.0.0.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036205" comment="MozillaThunderbird less than 2.0.0.19-0.1"/>
		</criteria>
	</criteria>
	<!-- 853e45729409d6cbf18fa9b96fa1844b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036206" comment="mozilla-xulrunner181-32bit less than 1.8.1.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036207" comment="mozilla-xulrunner181-64bit less than 1.8.1.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036208" comment="mozilla-xulrunner181-devel less than 1.8.1.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036209" comment="mozilla-xulrunner181-l10n less than 1.8.1.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036210" comment="mozilla-xulrunner181 less than 1.8.1.19-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5503</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5503" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5503" source="CVE"/>
	<description>
	The loadBindingDocument function in Mozilla Firefox 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 does not perform any security checks related to the same-domain policy, which allows remote attackers to read or access data from other domains via crafted XBL bindings.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0f4b6dd522350b04341a42f69190de9f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036196" comment="seamonkey-dom-inspector less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036197" comment="seamonkey-irc less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036198" comment="seamonkey-mail less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036199" comment="seamonkey-spellchecker less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036200" comment="seamonkey-venkman less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036201" comment="seamonkey less than 1.1.14-1.1"/>
		</criteria>
	</criteria>
	<!-- 195820826d3e66233d74d155aa116fc7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036202" comment="MozillaFirefox-translations less than 2.0.0.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036203" comment="MozillaFirefox less than 2.0.0.19-0.1"/>
		</criteria>
	</criteria>
	<!-- 565e3cc3f2466445941427dbd062511e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036204" comment="MozillaThunderbird-translations less than 2.0.0.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036205" comment="MozillaThunderbird less than 2.0.0.19-0.1"/>
		</criteria>
	</criteria>
	<!-- 853e45729409d6cbf18fa9b96fa1844b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036206" comment="mozilla-xulrunner181-32bit less than 1.8.1.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036207" comment="mozilla-xulrunner181-64bit less than 1.8.1.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036208" comment="mozilla-xulrunner181-devel less than 1.8.1.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036209" comment="mozilla-xulrunner181-l10n less than 1.8.1.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036210" comment="mozilla-xulrunner181 less than 1.8.1.19-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5504</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5504" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5504" source="CVE"/>
	<description>
	Mozilla Firefox 2.x before 2.0.0.19 allows remote attackers to run arbitrary JavaScript with chrome privileges via vectors related to the feed preview, a different vulnerability than CVE-2008-3836.
	</description>
 </metadata>
<!-- 195820826d3e66233d74d155aa116fc7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036202" comment="MozillaFirefox-translations less than 2.0.0.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036203" comment="MozillaFirefox less than 2.0.0.19-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5506</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5506" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5506" source="CVE"/>
	<description>
	Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to bypass the same origin policy by causing the browser to issue an XMLHttpRequest to an attacker-controlled resource that uses a 302 redirect to a resource in a different domain, then reading content from the response, aka "response disclosure."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0f4b6dd522350b04341a42f69190de9f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036196" comment="seamonkey-dom-inspector less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036197" comment="seamonkey-irc less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036198" comment="seamonkey-mail less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036199" comment="seamonkey-spellchecker less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036200" comment="seamonkey-venkman less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036201" comment="seamonkey less than 1.1.14-1.1"/>
		</criteria>
	</criteria>
	<!-- 195820826d3e66233d74d155aa116fc7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036202" comment="MozillaFirefox-translations less than 2.0.0.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036203" comment="MozillaFirefox less than 2.0.0.19-0.1"/>
		</criteria>
	</criteria>
	<!-- 565e3cc3f2466445941427dbd062511e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036204" comment="MozillaThunderbird-translations less than 2.0.0.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036205" comment="MozillaThunderbird less than 2.0.0.19-0.1"/>
		</criteria>
	</criteria>
	<!-- 853e45729409d6cbf18fa9b96fa1844b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036206" comment="mozilla-xulrunner181-32bit less than 1.8.1.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036207" comment="mozilla-xulrunner181-64bit less than 1.8.1.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036208" comment="mozilla-xulrunner181-devel less than 1.8.1.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036209" comment="mozilla-xulrunner181-l10n less than 1.8.1.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036210" comment="mozilla-xulrunner181 less than 1.8.1.19-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5507</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5507" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5507" source="CVE"/>
	<description>
	Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allow remote attackers to bypass the same origin policy and access portions of data from another domain via a JavaScript URL that redirects to the target resource, which generates an error if the target data does not have JavaScript syntax, which can be accessed using the window.onerror DOM API.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0f4b6dd522350b04341a42f69190de9f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036196" comment="seamonkey-dom-inspector less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036197" comment="seamonkey-irc less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036198" comment="seamonkey-mail less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036199" comment="seamonkey-spellchecker less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036200" comment="seamonkey-venkman less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036201" comment="seamonkey less than 1.1.14-1.1"/>
		</criteria>
	</criteria>
	<!-- 195820826d3e66233d74d155aa116fc7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036202" comment="MozillaFirefox-translations less than 2.0.0.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036203" comment="MozillaFirefox less than 2.0.0.19-0.1"/>
		</criteria>
	</criteria>
	<!-- 565e3cc3f2466445941427dbd062511e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036204" comment="MozillaThunderbird-translations less than 2.0.0.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036205" comment="MozillaThunderbird less than 2.0.0.19-0.1"/>
		</criteria>
	</criteria>
	<!-- 853e45729409d6cbf18fa9b96fa1844b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036206" comment="mozilla-xulrunner181-32bit less than 1.8.1.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036207" comment="mozilla-xulrunner181-64bit less than 1.8.1.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036208" comment="mozilla-xulrunner181-devel less than 1.8.1.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036209" comment="mozilla-xulrunner181-l10n less than 1.8.1.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036210" comment="mozilla-xulrunner181 less than 1.8.1.19-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5508</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5508" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5508" source="CVE"/>
	<description>
	Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 does not properly parse URLs with leading whitespace or control characters, which might allow remote attackers to misrepresent URLs and simplify phishing attacks.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0f4b6dd522350b04341a42f69190de9f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036196" comment="seamonkey-dom-inspector less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036197" comment="seamonkey-irc less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036198" comment="seamonkey-mail less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036199" comment="seamonkey-spellchecker less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036200" comment="seamonkey-venkman less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036201" comment="seamonkey less than 1.1.14-1.1"/>
		</criteria>
	</criteria>
	<!-- 195820826d3e66233d74d155aa116fc7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036202" comment="MozillaFirefox-translations less than 2.0.0.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036203" comment="MozillaFirefox less than 2.0.0.19-0.1"/>
		</criteria>
	</criteria>
	<!-- 565e3cc3f2466445941427dbd062511e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036204" comment="MozillaThunderbird-translations less than 2.0.0.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036205" comment="MozillaThunderbird less than 2.0.0.19-0.1"/>
		</criteria>
	</criteria>
	<!-- 853e45729409d6cbf18fa9b96fa1844b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036206" comment="mozilla-xulrunner181-32bit less than 1.8.1.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036207" comment="mozilla-xulrunner181-64bit less than 1.8.1.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036208" comment="mozilla-xulrunner181-devel less than 1.8.1.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036209" comment="mozilla-xulrunner181-l10n less than 1.8.1.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036210" comment="mozilla-xulrunner181 less than 1.8.1.19-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5510</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5510" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5510" source="CVE"/>
	<description>
	The CSS parser in Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 ignores the '\0' escaped null character, which might allow remote attackers to bypass protection mechanisms such as sanitization routines.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0f4b6dd522350b04341a42f69190de9f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036196" comment="seamonkey-dom-inspector less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036197" comment="seamonkey-irc less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036198" comment="seamonkey-mail less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036199" comment="seamonkey-spellchecker less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036200" comment="seamonkey-venkman less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036201" comment="seamonkey less than 1.1.14-1.1"/>
		</criteria>
	</criteria>
	<!-- 195820826d3e66233d74d155aa116fc7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036202" comment="MozillaFirefox-translations less than 2.0.0.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036203" comment="MozillaFirefox less than 2.0.0.19-0.1"/>
		</criteria>
	</criteria>
	<!-- 565e3cc3f2466445941427dbd062511e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036204" comment="MozillaThunderbird-translations less than 2.0.0.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036205" comment="MozillaThunderbird less than 2.0.0.19-0.1"/>
		</criteria>
	</criteria>
	<!-- 853e45729409d6cbf18fa9b96fa1844b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036206" comment="mozilla-xulrunner181-32bit less than 1.8.1.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036207" comment="mozilla-xulrunner181-64bit less than 1.8.1.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036208" comment="mozilla-xulrunner181-devel less than 1.8.1.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036209" comment="mozilla-xulrunner181-l10n less than 1.8.1.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036210" comment="mozilla-xulrunner181 less than 1.8.1.19-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5511</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5511" source="CVE"/>
	<description>
	Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to bypass the same origin policy and conduct cross-site scripting (XSS) attacks via an XBL binding to an "unloaded document."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0f4b6dd522350b04341a42f69190de9f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036196" comment="seamonkey-dom-inspector less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036197" comment="seamonkey-irc less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036198" comment="seamonkey-mail less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036199" comment="seamonkey-spellchecker less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036200" comment="seamonkey-venkman less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036201" comment="seamonkey less than 1.1.14-1.1"/>
		</criteria>
	</criteria>
	<!-- 195820826d3e66233d74d155aa116fc7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036202" comment="MozillaFirefox-translations less than 2.0.0.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036203" comment="MozillaFirefox less than 2.0.0.19-0.1"/>
		</criteria>
	</criteria>
	<!-- 565e3cc3f2466445941427dbd062511e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036204" comment="MozillaThunderbird-translations less than 2.0.0.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036205" comment="MozillaThunderbird less than 2.0.0.19-0.1"/>
		</criteria>
	</criteria>
	<!-- 853e45729409d6cbf18fa9b96fa1844b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036206" comment="mozilla-xulrunner181-32bit less than 1.8.1.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036207" comment="mozilla-xulrunner181-64bit less than 1.8.1.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036208" comment="mozilla-xulrunner181-devel less than 1.8.1.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036209" comment="mozilla-xulrunner181-l10n less than 1.8.1.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036210" comment="mozilla-xulrunner181 less than 1.8.1.19-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5512</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5512" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5512" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allow remote attackers to run arbitrary JavaScript with chrome privileges via unknown vectors in which "page content can pollute XPCNativeWrappers."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0f4b6dd522350b04341a42f69190de9f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036196" comment="seamonkey-dom-inspector less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036197" comment="seamonkey-irc less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036198" comment="seamonkey-mail less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036199" comment="seamonkey-spellchecker less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036200" comment="seamonkey-venkman less than 1.1.14-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036201" comment="seamonkey less than 1.1.14-1.1"/>
		</criteria>
	</criteria>
	<!-- 195820826d3e66233d74d155aa116fc7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036202" comment="MozillaFirefox-translations less than 2.0.0.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036203" comment="MozillaFirefox less than 2.0.0.19-0.1"/>
		</criteria>
	</criteria>
	<!-- 565e3cc3f2466445941427dbd062511e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036204" comment="MozillaThunderbird-translations less than 2.0.0.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036205" comment="MozillaThunderbird less than 2.0.0.19-0.1"/>
		</criteria>
	</criteria>
	<!-- 853e45729409d6cbf18fa9b96fa1844b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036206" comment="mozilla-xulrunner181-32bit less than 1.8.1.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036207" comment="mozilla-xulrunner181-64bit less than 1.8.1.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036208" comment="mozilla-xulrunner181-devel less than 1.8.1.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036209" comment="mozilla-xulrunner181-l10n less than 1.8.1.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036210" comment="mozilla-xulrunner181 less than 1.8.1.19-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5513</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5513" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5513" source="CVE"/>
	<description>
	Unspecified vulnerability in the session-restore feature in Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19 allows remote attackers to bypass the same origin policy, inject content into documents associated with other domains, and conduct cross-site scripting (XSS) attacks via unknown vectors related to restoration of SessionStore data.
	</description>
 </metadata>
<!-- 195820826d3e66233d74d155aa116fc7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036202" comment="MozillaFirefox-translations less than 2.0.0.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036203" comment="MozillaFirefox less than 2.0.0.19-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5514</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5514" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5514" source="CVE"/>
	<description>
	Off-by-one error in the rfc822_output_char function in the RFC822BUFFER routines in the University of Washington (UW) c-client library, as used by the UW IMAP toolkit before imap-2007e and other applications, allows context-dependent attackers to cause a denial of service (crash) via an e-mail message that triggers a buffer overflow.
	</description>
 </metadata>
<!-- 640adae6ec729c16814640840f88d6db -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036031" comment="imap-devel less than 2006c1_suse-51.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036032" comment="imap-lib less than 2006c1_suse-51.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036033" comment="imap less than 2006c1_suse-51.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5515</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5515" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5515" source="CVE"/>
	<description>
	Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.
	</description>
 </metadata>
<!-- 5f950e1a740f8dca3f68bba7e306eb4a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053694" comment="tomcat55-admin-webapps less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053695" comment="tomcat55-common-lib less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053696" comment="tomcat55-jasper-javadoc less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053697" comment="tomcat55-jasper less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053698" comment="tomcat55-jsp-2_0-api-javadoc less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053699" comment="tomcat55-jsp-2_0-api less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053700" comment="tomcat55-server-lib less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053701" comment="tomcat55-servlet-2_4-api-javadoc less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053702" comment="tomcat55-servlet-2_4-api less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053703" comment="tomcat55-webapps less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053704" comment="tomcat55 less than 5.5.23-113.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5517</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5517" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5517" source="CVE"/>
	<description>
	The web interface in git (gitweb) 1.5.x before 1.5.6 allows remote attackers to execute arbitrary commands via shell metacharacters related to (1) git_snapshot and (2) git_object.
	</description>
 </metadata>
<!-- 796e4ff9bed0f05cd0d30909add8c226 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036211" comment="git-arch less than 1.5.2.4-24.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036212" comment="git-core less than 1.5.2.4-24.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036213" comment="git-cvs less than 1.5.2.4-24.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036214" comment="git-email less than 1.5.2.4-24.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036215" comment="git-svn less than 1.5.2.4-24.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036216" comment="git less than 1.5.2.4-24.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036217" comment="gitk less than 1.5.2.4-24.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5519</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5519" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5519" source="CVE"/>
	<description>
	The JK Connector (aka mod_jk) 1.2.0 through 1.2.26 in Apache Tomcat allows remote attackers to obtain sensitive information via an arbitrary request from an HTTP client, in opportunistic circumstances involving (1) a request from a different client that included a Content-Length header but no POST data or (2) a rapid series of requests, related to noncompliance with the AJP protocol's requirements for requests containing Content-Length headers.
	</description>
 </metadata>
<!-- 75d26deab5ae41117b9e9fbccb1c5244 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056024" comment="apache2-mod_jk less than 1.2.21-59.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5557</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5557" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5557" source="CVE"/>
	<description>
	Heap-based buffer overflow in ext/mbstring/libmbfl/filters/mbfilter_htmlent.c in the mbstring extension in PHP 4.3.0 through 5.2.6 allows context-dependent attackers to execute arbitrary code via a crafted string containing an HTML entity, which is not properly handled during Unicode conversion, related to the (1) mb_convert_encoding, (2) mb_check_encoding, (3) mb_convert_variables, and (4) mb_parse_str functions.
	</description>
 </metadata>
<!-- 119a5e76286999a9037a4721e0b5e5cf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036218" comment="apache2-mod_php5 less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036219" comment="php5-bcmath less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036220" comment="php5-bz2 less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036221" comment="php5-calendar less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036222" comment="php5-ctype less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036223" comment="php5-curl less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036224" comment="php5-dba less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036225" comment="php5-dbase less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036226" comment="php5-devel less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036227" comment="php5-dom less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036228" comment="php5-exif less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036229" comment="php5-fastcgi less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036230" comment="php5-ftp less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036231" comment="php5-gd less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036232" comment="php5-gettext less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036233" comment="php5-gmp less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036234" comment="php5-hash less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036235" comment="php5-iconv less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036236" comment="php5-imap less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036237" comment="php5-json less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036238" comment="php5-ldap less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036239" comment="php5-mbstring less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036240" comment="php5-mcrypt less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036241" comment="php5-mhash less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036242" comment="php5-mysql less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036243" comment="php5-ncurses less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036244" comment="php5-odbc less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036245" comment="php5-openssl less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036246" comment="php5-pcntl less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036247" comment="php5-pdo less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036248" comment="php5-pear less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036249" comment="php5-pgsql less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036250" comment="php5-posix less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036251" comment="php5-pspell less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036252" comment="php5-readline less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036253" comment="php5-shmop less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036254" comment="php5-snmp less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036255" comment="php5-soap less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036256" comment="php5-sockets less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036257" comment="php5-sqlite less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036258" comment="php5-suhosin less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036259" comment="php5-sysvmsg less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036260" comment="php5-sysvsem less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036261" comment="php5-sysvshm less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036262" comment="php5-tidy less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036263" comment="php5-tokenizer less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036264" comment="php5-wddx less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036265" comment="php5-xmlreader less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036266" comment="php5-xmlrpc less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036267" comment="php5-xmlwriter less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036268" comment="php5-xsl less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036269" comment="php5-zip less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036270" comment="php5-zlib less than 5.2.6-0.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5587</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5587" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5587" source="CVE"/>
	<description>
	Directory traversal vulnerability in libraries/lib.inc.php in phpPgAdmin 4.2.1 and earlier, when register_globals is enabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the _language parameter to index.php.
	</description>
 </metadata>
<!-- b9472610e9807bc5daba05dd9149d1ce -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036271" comment="phpPgAdmin less than 4.1.3-19.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5621</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5621" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5621" source="CVE"/>
	<description>
	Cross-site request forgery (CSRF) vulnerability in phpMyAdmin 2.11.x before 2.11.9.4 and 3.x before 3.1.1.0 allows remote attackers to perform unauthorized actions as the administrator via a link or IMG tag to tbl_structure.php with a modified table parameter.  NOTE: other unspecified pages are also reachable, but they have the same root cause.  NOTE: this can be leveraged to conduct SQL injection attacks and execute arbitrary code.
	</description>
 </metadata>
<!-- 73adad68b37fe8bb88a7a57d6f7234c4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035069" comment="phpMyAdmin less than 2.11.9.4-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5622</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5622" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5622" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2008-5621.  Reason: This candidate is a duplicate of CVE-2008-5621.  Notes: All CVE users should reference CVE-2008-5621 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
<!-- 73adad68b37fe8bb88a7a57d6f7234c4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035069" comment="phpMyAdmin less than 2.11.9.4-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5658</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5658" source="CVE"/>
	<description>
	Directory traversal vulnerability in the ZipArchive::extractTo function in PHP 5.2.6 and earlier allows context-dependent attackers to write arbitrary files via a ZIP file with a file whose name contains .. (dot dot) sequences.
	</description>
 </metadata>
<!-- 119a5e76286999a9037a4721e0b5e5cf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036218" comment="apache2-mod_php5 less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036219" comment="php5-bcmath less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036220" comment="php5-bz2 less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036221" comment="php5-calendar less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036222" comment="php5-ctype less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036223" comment="php5-curl less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036224" comment="php5-dba less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036225" comment="php5-dbase less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036226" comment="php5-devel less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036227" comment="php5-dom less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036228" comment="php5-exif less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036229" comment="php5-fastcgi less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036230" comment="php5-ftp less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036231" comment="php5-gd less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036232" comment="php5-gettext less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036233" comment="php5-gmp less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036234" comment="php5-hash less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036235" comment="php5-iconv less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036236" comment="php5-imap less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036237" comment="php5-json less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036238" comment="php5-ldap less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036239" comment="php5-mbstring less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036240" comment="php5-mcrypt less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036241" comment="php5-mhash less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036242" comment="php5-mysql less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036243" comment="php5-ncurses less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036244" comment="php5-odbc less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036245" comment="php5-openssl less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036246" comment="php5-pcntl less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036247" comment="php5-pdo less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036248" comment="php5-pear less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036249" comment="php5-pgsql less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036250" comment="php5-posix less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036251" comment="php5-pspell less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036252" comment="php5-readline less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036253" comment="php5-shmop less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036254" comment="php5-snmp less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036255" comment="php5-soap less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036256" comment="php5-sockets less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036257" comment="php5-sqlite less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036258" comment="php5-suhosin less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036259" comment="php5-sysvmsg less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036260" comment="php5-sysvsem less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036261" comment="php5-sysvshm less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036262" comment="php5-tidy less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036263" comment="php5-tokenizer less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036264" comment="php5-wddx less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036265" comment="php5-xmlreader less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036266" comment="php5-xmlrpc less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036267" comment="php5-xmlwriter less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036268" comment="php5-xsl less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036269" comment="php5-zip less than 5.2.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036270" comment="php5-zlib less than 5.2.6-0.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5679</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5679" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5679" source="CVE"/>
	<description>
	The HTML parsing engine in Opera before 9.63 allows remote attackers to execute arbitrary code via crafted web pages that trigger an invalid pointer calculation and heap corruption.
	</description>
 </metadata>
<!-- 74cc3d906e7554b295e021cfbb7be468 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036272" comment="opera less than 9.63-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5680</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5680" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5680" source="CVE"/>
	<description>
	Multiple buffer overflows in Opera before 9.63 might allow (1) remote attackers to execute arbitrary code via a crafted text area, or allow (2) user-assisted remote attackers to execute arbitrary code via a long host name in a file: URL.  NOTE: this might overlap CVE-2008-5178.
	</description>
 </metadata>
<!-- 74cc3d906e7554b295e021cfbb7be468 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036272" comment="opera less than 9.63-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5681</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5681" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5681" source="CVE"/>
	<description>
	Opera before 9.63 does not block unspecified "scripted URLs" during the feed preview, which allows remote attackers to read existing subscriptions and force subscriptions to arbitrary feed URLs.
	</description>
 </metadata>
<!-- 74cc3d906e7554b295e021cfbb7be468 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036272" comment="opera less than 9.63-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5682</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5682" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5682" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Opera before 9.63 allows remote attackers to inject arbitrary web script or HTML via built-in XSLT templates.
	</description>
 </metadata>
<!-- 74cc3d906e7554b295e021cfbb7be468 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036272" comment="opera less than 9.63-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5683</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5683" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5683" source="CVE"/>
	<description>
	Unspecified vulnerability in Opera before 9.63 allows remote attackers to "reveal random data" via unknown vectors.
	</description>
 </metadata>
<!-- 74cc3d906e7554b295e021cfbb7be468 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036272" comment="opera less than 9.63-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5702</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5702" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5702" source="CVE"/>
	<description>
	Buffer underflow in the ibwdt_ioctl function in drivers/watchdog/ib700wdt.c in the Linux kernel before 2.6.28-rc1 might allow local users to have an unknown impact via a certain /dev/watchdog WDIOC_SETTIMEOUT IOCTL call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8504cb9aa3cf26986c7f273aafa740b5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036010" comment="kernel-bigsmp less than 2.6.22.19-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036011" comment="kernel-debug less than 2.6.22.19-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036012" comment="kernel-default less than 2.6.22.19-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036013" comment="kernel-kdump less than 2.6.22.19-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036014" comment="kernel-ppc64 less than 2.6.22.19-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036015" comment="kernel-source less than 2.6.22.19-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036016" comment="kernel-syms less than 2.6.22.19-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036017" comment="kernel-xen less than 2.6.22.19-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036018" comment="kernel-xenpae less than 2.6.22.19-0.2"/>
		</criteria>
	</criteria>
	<!-- b36aaab84a5618e58a83fd28deda41c5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035966" comment="kernel-bigsmp less than 2.6.22.19-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035967" comment="kernel-debug less than 2.6.22.19-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035968" comment="kernel-default less than 2.6.22.19-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035969" comment="kernel-kdump less than 2.6.22.19-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035970" comment="kernel-ppc64 less than 2.6.22.19-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035971" comment="kernel-source less than 2.6.22.19-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035972" comment="kernel-syms less than 2.6.22.19-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035973" comment="kernel-xen less than 2.6.22.19-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035974" comment="kernel-xenpae less than 2.6.22.19-0.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5714</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5714" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5714" source="CVE"/>
	<description>
	Off-by-one error in monitor.c in Qemu 0.9.1 might make it easier for remote attackers to guess the VNC password, which is limited to seven characters where eight was intended.
	</description>
 </metadata>
<!-- 0e2b33e755c079848c85abff921e8caa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034945" comment="qemu less than 0.10.1-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5718</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5718" source="CVE"/>
	<description>
	The papd daemon in Netatalk before 2.0.4-beta2, when using certain variables in a pipe command for the print file, allows remote attackers to execute arbitrary commands via shell metacharacters in a print request, as demonstrated using a crafted Title.
	</description>
 </metadata>
<!-- 33e8b3a372a563cdd33c79fa926310d4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036273" comment="netatalk-devel less than 2.0.3-130.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036274" comment="netatalk less than 2.0.3-130.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5824</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5824" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5824" source="CVE"/>
	<description>
	Heap-based buffer overflow in msadpcm.c in libaudiofile in audiofile 0.2.6 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted WAV file.
	</description>
 </metadata>
<!-- 2992a8c985944148b6def71a35d49505 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036275" comment="audiofile-32bit less than 0.2.6-77.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036276" comment="audiofile-64bit less than 0.2.6-77.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036277" comment="audiofile-devel less than 0.2.6-77.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036278" comment="audiofile less than 0.2.6-77.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5907</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5907" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5907" source="CVE"/>
	<description>
	The png_check_keyword function in pngwutil.c in libpng before 1.0.42, and 1.2.x before 1.2.34, might allow context-dependent attackers to set the value of an arbitrary memory location to zero via vectors involving creation of crafted PNG files with keywords, related to an implicit cast of the '\0' character constant to a NULL pointer.  NOTE: some sources incorrectly report this as a double free vulnerability.
	</description>
 </metadata>
<!-- 9b02f47a28434213726e0108b96fc34e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036279" comment="libpng-32bit less than 1.2.18-15.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036280" comment="libpng-64bit less than 1.2.18-15.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036281" comment="libpng-devel-32bit less than 1.2.18-15.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036282" comment="libpng-devel-64bit less than 1.2.18-15.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036283" comment="libpng-devel less than 1.2.18-15.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036284" comment="libpng less than 1.2.18-15.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5917</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5917" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5917" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in the XSS filter (framework/Text_Filter/Filter/xss.php) in Horde Application Framework 3.2.2 and 3.3, when Internet Explorer is being used, allows remote attackers to inject arbitrary web script or HTML via unknown vectors related to style attributes.
	</description>
 </metadata>
<!-- 4fd493f7705e77f572e843bea0269e78 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036285" comment="horde less than 3.1.9-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20086123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-6123</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-6123" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6123" source="CVE"/>
	<description>
	The netsnmp_udp_fmtaddr function (snmplib/snmpUDPDomain.c) in net-snmp 5.0.9 through 5.4.2.1, when using TCP wrappers for client authorization, does not properly parse hosts.allow rules, which allows remote attackers to bypass intended access restrictions and execute SNMP queries, related to "source/destination IP address confusion."
	</description>
 </metadata>
<!-- 0ad0b2d78cf31f47b77f069596392978 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036286" comment="libsnmp15 less than 5.4.1-19.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036287" comment="net-snmp-32bit less than 5.4.1-19.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036288" comment="net-snmp-64bit less than 5.4.1-19.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036289" comment="net-snmp-devel-64bit less than 5.4.1-19.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036290" comment="net-snmp-devel less than 5.4.1-19.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036291" comment="net-snmp less than 5.4.1-19.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036292" comment="perl-SNMP less than 5.4.1-19.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036293" comment="snmp-mibs less than 5.4.1-19.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20086235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-6235</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-6235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6235" source="CVE"/>
	<description>
	The Netrw plugin (netrw.vim) in Vim 7.0 and 7.1 allows user-assisted attackers to execute arbitrary commands via shell metacharacters in a filename used by the (1) "D" (delete) command or (2) b:netrw_curdir variable, as demonstrated using the netrw.v4 and netrw.v5 test cases.
	</description>
 </metadata>
<!-- 4811f82775ba2e73f4c7806cd79ad5c0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035542" comment="gvim less than 7.2-9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035543" comment="vim-base less than 7.2-9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035544" comment="vim-data less than 7.2-9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035545" comment="vim-enhanced less than 7.2-9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20086393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-6393</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-6393" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6393" source="CVE"/>
	<description>
	PSI Jabber client before 0.12.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a file transfer request with a negative value in a SOCKS5 option, which bypasses a signed integer check and triggers an integer overflow and a heap-based buffer overflow.
	</description>
 </metadata>
<!-- b4f0fdeff4de0c2f5d70187fa57f487f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036294" comment="psi less than 0.10-26.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20086679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-6679</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-6679" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6679" source="CVE"/>
	<description>
	Buffer overflow in the BaseFont writer module in Ghostscript 8.62, and possibly other versions, allows remote attackers to cause a denial of service (ps2pdf crash) and possibly execute arbitrary code via a crafted Postscript file.
	</description>
 </metadata>
<!-- fdc70560402b44cb7ce9829765211428 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034727" comment="ghostscript-fonts-other less than 8.15.4-3.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034728" comment="ghostscript-fonts-rus less than 8.15.4-3.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034729" comment="ghostscript-fonts-std less than 8.15.4-3.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034730" comment="ghostscript-ijs-devel less than 8.15.4-3.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034731" comment="ghostscript-library less than 8.15.4-3.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034732" comment="ghostscript-omni less than 8.15.4-3.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034733" comment="ghostscript-x11 less than 8.15.4-3.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034734" comment="libgimpprint-devel less than 4.2.7-178.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034735" comment="libgimpprint less than 4.2.7-178.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20086680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-6680</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-6680" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6680" source="CVE"/>
	<description>
	libclamav/pe.c in ClamAV before 0.95 allows remote attackers to cause a denial of service (crash) via a crafted EXE file that triggers a divide-by-zero error.
	</description>
 </metadata>
<!-- 948121c661973e0f48957c2eceb4541a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036295" comment="clamav-db less than 0.95-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036296" comment="clamav less than 0.95-0.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20087159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-7159</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-7159" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7159" source="CVE"/>
	<description>
	The silc_asn1_encoder function in lib/silcasn1/silcasn1_encode.c in Secure Internet Live Conferencing (SILC) Toolkit before 1.1.8 allows remote attackers to overwrite a stack location and possibly execute arbitrary code via a crafted OID value, related to incorrect use of a %lu format string.
	</description>
 </metadata>
<!-- a1d993f6a0398f2c0b4e0ce65a7cf70e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054840" comment="silc-toolkit-devel less than 1.1.2-14.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054841" comment="silc-toolkit less than 1.1.2-14.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20087160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-7160</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2008-7160" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7160" source="CVE"/>
	<description>
	The silc_http_server_parse function in lib/silchttp/silchttpserver.c in the internal HTTP server in silcd in Secure Internet Live Conferencing (SILC) Toolkit before 1.1.9 allows remote attackers to overwrite a stack location and possibly execute arbitrary code via a crafted Content-Length header, related to incorrect use of a %lu format string.
	</description>
 </metadata>
<!-- a1d993f6a0398f2c0b4e0ce65a7cf70e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054840" comment="silc-toolkit-devel less than 1.1.2-14.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054841" comment="silc-toolkit less than 1.1.2-14.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0021</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0021" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0021" source="CVE"/>
	<description>
	NTP 4.2.4 before 4.2.4p5 and 4.2.5 before 4.2.5p150 does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys, a similar vulnerability to CVE-2008-5077.
	</description>
 </metadata>
<!-- 78ff99ed0bcf98d08d0a5c45479e04d3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036297" comment="xntp-doc less than 4.2.4p3-25.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036298" comment="xntp less than 4.2.4p3-25.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0023</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0023" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0023" source="CVE"/>
	<description>
	The apr_strmatch_precompile function in strmatch/apr_strmatch.c in Apache APR-util before 1.3.5 allows remote attackers to cause a denial of service (daemon crash) via crafted input involving (1) a .htaccess file used with the Apache HTTP Server, (2) the SVNMasterURI directive in the mod_dav_svn module in the Apache HTTP Server, (3) the mod_apreq2 module for the Apache HTTP Server, or (4) an application that uses the libapreq2 library, which triggers a heap-based buffer underflow.
	</description>
 </metadata>
<!-- 9d2407b0352245ff49a54784986b83a9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053396" comment="libapr-util1-64bit less than 1.2.8-68.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053397" comment="libapr-util1-dbd-mysql less than 1.2.8-68.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053398" comment="libapr-util1-dbd-pgsql less than 1.2.8-68.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053399" comment="libapr-util1-dbd-sqlite3 less than 1.2.8-68.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053400" comment="libapr-util1-devel-64bit less than 1.2.8-68.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053401" comment="libapr-util1-devel less than 1.2.8-68.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053402" comment="libapr-util1 less than 1.2.8-68.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0025</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0025" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0025" source="CVE"/>
	<description>
	BIND 9.6.0, 9.5.1, 9.5.0, 9.4.3, and earlier does not properly check the return value from the OpenSSL DSA_verify function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077.
	</description>
 </metadata>
<!-- 5c696f1a00acd08086f59287bdbfb6fb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036299" comment="bind-chrootenv less than 9.4.1.P1-12.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036300" comment="bind-devel-64bit less than 9.4.1.P1-12.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036301" comment="bind-devel less than 9.4.1.P1-12.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036302" comment="bind-doc less than 9.4.1.P1-12.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036303" comment="bind-libs-32bit less than 9.4.1.P1-12.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036304" comment="bind-libs-64bit less than 9.4.1.P1-12.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036305" comment="bind-libs less than 9.4.1.P1-12.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036306" comment="bind-utils less than 9.4.1.P1-12.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036307" comment="bind less than 9.4.1.P1-12.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0028</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0028" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0028" source="CVE"/>
	<description>
	The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.
	</description>
 </metadata>
<!-- b36aaab84a5618e58a83fd28deda41c5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035966" comment="kernel-bigsmp less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035967" comment="kernel-debug less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035968" comment="kernel-default less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035969" comment="kernel-kdump less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035970" comment="kernel-ppc64 less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035971" comment="kernel-source less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035972" comment="kernel-syms less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035973" comment="kernel-xen less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035974" comment="kernel-xenpae less than 2.6.22.19-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0030</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0030" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0030" source="CVE"/>
	<description>
	A certain Red Hat patch for SquirrelMail 1.4.8 sets the same SQMSESSID cookie value for all sessions, which allows remote authenticated users to access other users' folder lists and configuration data in opportunistic circumstances by using the standard webmail.php interface.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2008-3663.
	</description>
 </metadata>
<!-- 216b58596b159eb38a9ff8ee0ccc682c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035846" comment="squirrelmail less than 1.4.17-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0033</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0033" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0033" source="CVE"/>
	<description>
	Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.
	</description>
 </metadata>
<!-- 5f950e1a740f8dca3f68bba7e306eb4a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053694" comment="tomcat55-admin-webapps less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053695" comment="tomcat55-common-lib less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053696" comment="tomcat55-jasper-javadoc less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053697" comment="tomcat55-jasper less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053698" comment="tomcat55-jsp-2_0-api-javadoc less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053699" comment="tomcat55-jsp-2_0-api less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053700" comment="tomcat55-server-lib less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053701" comment="tomcat55-servlet-2_4-api-javadoc less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053702" comment="tomcat55-servlet-2_4-api less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053703" comment="tomcat55-webapps less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053704" comment="tomcat55 less than 5.5.23-113.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0034</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0034" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0034" source="CVE"/>
	<description>
	parse.c in sudo 1.6.9p17 through 1.6.9p19 does not properly interpret a system group (aka %group) in the sudoers file during authorization decisions for a user who belongs to that group, which allows local users to leverage an applicable sudoers file and gain root privileges via a sudo command.
	</description>
 </metadata>
<!-- a8f3c364afbdcae1420bf6c13dab2c7b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036308" comment="sudo less than 1.6.9p2-23.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0037</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0037" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0037" source="CVE"/>
	<description>
	The redirect implementation in curl and libcurl 5.11 through 7.19.3, when CURLOPT_FOLLOWLOCATION is enabled, accepts arbitrary Location values, which might allow remote HTTP servers to (1) trigger arbitrary requests to intranet servers, (2) read or overwrite arbitrary files via a redirect to a file: URL, or (3) execute arbitrary commands via a redirect to an scp: URL.
	</description>
 </metadata>
<!-- 2321d30d371b0fa595359e20f7ce3f3c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036309" comment="curl-ca-bundle less than 7.16.4-16.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036310" comment="curl less than 7.16.4-16.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036311" comment="libcurl-devel less than 7.16.4-16.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036312" comment="libcurl4-32bit less than 7.16.4-16.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036313" comment="libcurl4-64bit less than 7.16.4-16.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036314" comment="libcurl4 less than 7.16.4-16.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0040</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0040" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0040" source="CVE"/>
	<description>
	The PNG reference library (aka libpng) before 1.0.43, and 1.2.x before 1.2.35, as used in pngcrush and other applications, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file that triggers a free of an uninitialized pointer in (1) the png_read_png function, (2) pCAL chunk handling, or (3) setup of 16-bit gamma tables.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0251a7029312d45772658b445302db7c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036315" comment="libpng-32bit less than 1.2.18-15.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036316" comment="libpng-64bit less than 1.2.18-15.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036317" comment="libpng-devel-32bit less than 1.2.18-15.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036318" comment="libpng-devel-64bit less than 1.2.18-15.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036319" comment="libpng-devel less than 1.2.18-15.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036320" comment="libpng less than 1.2.18-15.8"/>
		</criteria>
	</criteria>
	<!-- 2a53ff2c15c7dff9903f97890b341edb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036321" comment="libpng-32bit less than 1.2.18-15.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036322" comment="libpng-64bit less than 1.2.18-15.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036323" comment="libpng-devel-32bit less than 1.2.18-15.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036324" comment="libpng-devel-64bit less than 1.2.18-15.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036325" comment="libpng-devel less than 1.2.18-15.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036326" comment="libpng less than 1.2.18-15.10"/>
		</criteria>
	</criteria>
	<!-- 468dcee6ae0a6b23da4670fc11618a60 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036327" comment="MozillaFirefox-translations less than 2.0.0.21post-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036328" comment="MozillaFirefox less than 2.0.0.21post-0.1"/>
		</criteria>
	</criteria>
	<!-- cb58df3a93b69014571b008c271b64f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036329" comment="seamonkey-dom-inspector less than 1.1.16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036330" comment="seamonkey-irc less than 1.1.16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036331" comment="seamonkey-mail less than 1.1.16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036332" comment="seamonkey-spellchecker less than 1.1.16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036333" comment="seamonkey-venkman less than 1.1.16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036334" comment="seamonkey less than 1.1.16-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0049</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0049" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0049" source="CVE"/>
	<description>
	Belgian eID middleware (eidlib) 2.6.0 and earlier does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys, a similar vulnerability to CVE-2008-5077.
	</description>
 </metadata>
<!-- 05c24508b48c6d37bc55ef2ebd8caf3b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036335" comment="eID-belgium less than 2.5.9-119.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0065</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0065" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0065" source="CVE"/>
	<description>
	Buffer overflow in net/sctp/sm_statefuns.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.28-git8 allows remote attackers to have an unknown impact via an FWD-TSN (aka FORWARD-TSN) chunk with a large stream ID.
	</description>
 </metadata>
<!-- b36aaab84a5618e58a83fd28deda41c5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035966" comment="kernel-bigsmp less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035967" comment="kernel-debug less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035968" comment="kernel-default less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035969" comment="kernel-kdump less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035970" comment="kernel-ppc64 less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035971" comment="kernel-source less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035972" comment="kernel-syms less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035973" comment="kernel-xen less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035974" comment="kernel-xenpae less than 2.6.22.19-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0114</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0114" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0114" source="CVE"/>
	<description>
	Unspecified vulnerability in the Settings Manager in Adobe Flash Player 9.x before 9.0.159.0 and 10.x before 10.0.22.87, and possibly other versions, allows remote attackers to trick a user into visiting an arbitrary URL via unknown vectors, related to "a potential Clickjacking issue variant."
	</description>
 </metadata>
<!-- 31b49f5e5d89220061c13b7ea115b027 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032032" comment="flash-player less than 9.0.159.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0115</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0115" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0115" source="CVE"/>
	<description>
	The Device Mapper multipathing driver (aka multipath-tools or device-mapper-multipath) 0.4.8, as used in SUSE openSUSE, SUSE Linux Enterprise Server (SLES), Fedora, and possibly other operating systems, uses world-writable permissions for the socket file (aka /var/run/multipathd.sock), which allows local users to send arbitrary commands to the multipath daemon.
	</description>
 </metadata>
<!-- 0277f35acff854e5557194f4ce501d5e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036336" comment="kpartx less than 0.4.7-80.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036337" comment="multipath-tools less than 0.4.7-80.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0125</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0125" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0125" source="CVE"/>
	<description>
	** DISPUTED **  NOTE: this issue has been disputed by the upstream vendor. nasl/nasl_crypto2.c in the Nessus Attack Scripting Language library (aka libnasl) 2.2.11 does not properly check the return value from the OpenSSL DSA_do_verify function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077.  NOTE: the upstream vendor has disputed this issue, stating "while we do misuse this function (this is a bug), it has absolutely no security ramification."
	</description>
 </metadata>
<!-- c2ff5137c7732be49805e487459a8110 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036338" comment="libnasl less than 2.2.10-15.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0135</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0135" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0135" source="CVE"/>
	<description>
	Multiple integer overflows in the Audible::Tag::readTag function in metadata/audible/audibletag.cpp in Amarok 1.4.10 through 2.0.1 allow remote attackers to execute arbitrary code via an Audible Audio (.aa) file with a large (1) nlen or (2) vlen Tag value, each of which triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 0806404c60fc84726fc594d21e6de419 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036339" comment="amarok-lang less than 1.4.7-37.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036340" comment="amarok-libvisual less than 1.4.7-37.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036341" comment="amarok-xine less than 1.4.7-37.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036342" comment="amarok-yauap less than 1.4.7-37.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036343" comment="amarok less than 1.4.7-37.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0136</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0136" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0136" source="CVE"/>
	<description>
	Multiple array index errors in the Audible::Tag::readTag function in metadata/audible/audibletag.cpp in Amarok 1.4.10 through 2.0.1 allow remote attackers to cause a denial of service (application crash) or execute arbitrary code via an Audible Audio (.aa) file with a crafted (1) nlen or (2) vlen Tag value, each of which can lead to an invalid pointer dereference, or the writing of a 0x00 byte to an arbitrary memory location, after an allocation failure.
	</description>
 </metadata>
<!-- 0806404c60fc84726fc594d21e6de419 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036339" comment="amarok-lang less than 1.4.7-37.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036340" comment="amarok-libvisual less than 1.4.7-37.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036341" comment="amarok-xine less than 1.4.7-37.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036342" comment="amarok-yauap less than 1.4.7-37.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036343" comment="amarok less than 1.4.7-37.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0146</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146" source="CVE"/>
	<description>
	Multiple buffer overflows in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allow remote attackers to cause a denial of service (crash) via a crafted PDF file, related to (1) JBIG2SymbolDict::setBitmap and (2) JBIG2Stream::readSymbolDictSeg.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 314eb7d2c76d9970da1d2e6e807a4e6b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036344" comment="poppler-devel less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036345" comment="poppler-doc less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036346" comment="poppler-glib less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036347" comment="poppler-qt4 less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036348" comment="poppler-qt less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036349" comment="poppler-tools less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036350" comment="poppler less than 0.5.4-101.6"/>
		</criteria>
	</criteria>
	<!-- 804311da028672eacbbeec641420fa47 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036351" comment="kdegraphics3-3D less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036352" comment="kdegraphics3-devel less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036353" comment="kdegraphics3-extra less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036354" comment="kdegraphics3-fax less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036355" comment="kdegraphics3-imaging less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036356" comment="kdegraphics3-kamera less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036357" comment="kdegraphics3-pdf less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036358" comment="kdegraphics3-postscript less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036359" comment="kdegraphics3-scan less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036360" comment="kdegraphics3-tex less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036361" comment="kdegraphics3 less than 3.5.7-60.7"/>
		</criteria>
	</criteria>
	<!-- d6aae2a6659ba7f7c8504daf6e33cedc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036362" comment="xpdf-tools less than 3.02-19.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036363" comment="xpdf less than 3.02-19.8"/>
		</criteria>
	</criteria>
	<!-- f184201908e91477cabdc65eec900094 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036364" comment="cups-client less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036365" comment="cups-devel less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036366" comment="cups-libs-32bit less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036367" comment="cups-libs-64bit less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036368" comment="cups-libs less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036369" comment="cups less than 1.2.12-22.21"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0147</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0147" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147" source="CVE"/>
	<description>
	Multiple integer overflows in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allow remote attackers to cause a denial of service (crash) via a crafted PDF file, related to (1) JBIG2Stream::readSymbolDictSeg, (2) JBIG2Stream::readSymbolDictSeg, and (3) JBIG2Stream::readGenericBitmap.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 314eb7d2c76d9970da1d2e6e807a4e6b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036344" comment="poppler-devel less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036345" comment="poppler-doc less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036346" comment="poppler-glib less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036347" comment="poppler-qt4 less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036348" comment="poppler-qt less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036349" comment="poppler-tools less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036350" comment="poppler less than 0.5.4-101.6"/>
		</criteria>
	</criteria>
	<!-- 804311da028672eacbbeec641420fa47 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036351" comment="kdegraphics3-3D less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036352" comment="kdegraphics3-devel less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036353" comment="kdegraphics3-extra less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036354" comment="kdegraphics3-fax less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036355" comment="kdegraphics3-imaging less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036356" comment="kdegraphics3-kamera less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036357" comment="kdegraphics3-pdf less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036358" comment="kdegraphics3-postscript less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036359" comment="kdegraphics3-scan less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036360" comment="kdegraphics3-tex less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036361" comment="kdegraphics3 less than 3.5.7-60.7"/>
		</criteria>
	</criteria>
	<!-- d6aae2a6659ba7f7c8504daf6e33cedc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036362" comment="xpdf-tools less than 3.02-19.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036363" comment="xpdf less than 3.02-19.8"/>
		</criteria>
	</criteria>
	<!-- f184201908e91477cabdc65eec900094 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036364" comment="cups-client less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036365" comment="cups-devel less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036366" comment="cups-libs-32bit less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036367" comment="cups-libs-64bit less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036368" comment="cups-libs less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036369" comment="cups less than 1.2.12-22.21"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0153</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0153" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0153" source="CVE"/>
	<description>
	International Components for Unicode (ICU) 4.0, 3.6, and other 3.x versions, as used in Apple Mac OS X 10.5 before 10.5.7, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Fedora 9 and 10, and possibly other operating systems, does not properly handle invalid byte sequences during Unicode conversion, which might allow remote attackers to conduct cross-site scripting (XSS) attacks.
	</description>
 </metadata>
<!-- 0a8fa59efa6b7fc211ab1d34c839c21d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053856" comment="icu-data less than 3.6-13.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053857" comment="icu less than 3.6-13.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053858" comment="libicu-32bit less than 3.6-13.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053859" comment="libicu-64bit less than 3.6-13.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053860" comment="libicu-devel-32bit less than 3.6-13.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053861" comment="libicu-devel-64bit less than 3.6-13.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053862" comment="libicu-devel less than 3.6-13.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053863" comment="libicu-doc less than 3.6-13.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053864" comment="libicu less than 3.6-13.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0159</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0159" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0159" source="CVE"/>
	<description>
	Stack-based buffer overflow in the cookedprint function in ntpq/ntpq.c in ntpq in NTP before 4.2.4p7-RC2 allows remote NTP servers to execute arbitrary code via a crafted response.
	</description>
 </metadata>
<!-- 9e0b235bbce45733bc5c57a1598dac4d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036370" comment="xntp-doc less than 4.2.4p3-25.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036371" comment="xntp less than 4.2.4p3-25.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0163</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0163" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0163" source="CVE"/>
	<description>
	Integer overflow in the TIFF image decoding routines in CUPS 1.3.9 and earlier allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via a crafted TIFF image, which is not properly handled by the (1) _cupsImageReadTIFF function in the imagetops filter and (2) imagetoraster filter, leading to a heap-based buffer overflow.
	</description>
 </metadata>
<!-- f184201908e91477cabdc65eec900094 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036364" comment="cups-client less than 1.2.12-22.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036365" comment="cups-devel less than 1.2.12-22.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036366" comment="cups-libs-32bit less than 1.2.12-22.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036367" comment="cups-libs-64bit less than 1.2.12-22.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036368" comment="cups-libs less than 1.2.12-22.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036369" comment="cups less than 1.2.12-22.21"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0165</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0165" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0165" source="CVE"/>
	<description>
	Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, as used in Poppler and other products, when running on Mac OS X, has unspecified impact, related to "g*allocn."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 314eb7d2c76d9970da1d2e6e807a4e6b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036344" comment="poppler-devel less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036345" comment="poppler-doc less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036346" comment="poppler-glib less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036347" comment="poppler-qt4 less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036348" comment="poppler-qt less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036349" comment="poppler-tools less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036350" comment="poppler less than 0.5.4-101.6"/>
		</criteria>
	</criteria>
	<!-- 804311da028672eacbbeec641420fa47 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036351" comment="kdegraphics3-3D less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036352" comment="kdegraphics3-devel less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036353" comment="kdegraphics3-extra less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036354" comment="kdegraphics3-fax less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036355" comment="kdegraphics3-imaging less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036356" comment="kdegraphics3-kamera less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036357" comment="kdegraphics3-pdf less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036358" comment="kdegraphics3-postscript less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036359" comment="kdegraphics3-scan less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036360" comment="kdegraphics3-tex less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036361" comment="kdegraphics3 less than 3.5.7-60.7"/>
		</criteria>
	</criteria>
	<!-- d6aae2a6659ba7f7c8504daf6e33cedc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036362" comment="xpdf-tools less than 3.02-19.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036363" comment="xpdf less than 3.02-19.8"/>
		</criteria>
	</criteria>
	<!-- f184201908e91477cabdc65eec900094 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036364" comment="cups-client less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036365" comment="cups-devel less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036366" comment="cups-libs-32bit less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036367" comment="cups-libs-64bit less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036368" comment="cups-libs less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036369" comment="cups less than 1.2.12-22.21"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0166</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166" source="CVE"/>
	<description>
	The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers a free of uninitialized memory.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 314eb7d2c76d9970da1d2e6e807a4e6b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036344" comment="poppler-devel less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036345" comment="poppler-doc less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036346" comment="poppler-glib less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036347" comment="poppler-qt4 less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036348" comment="poppler-qt less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036349" comment="poppler-tools less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036350" comment="poppler less than 0.5.4-101.6"/>
		</criteria>
	</criteria>
	<!-- 804311da028672eacbbeec641420fa47 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036351" comment="kdegraphics3-3D less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036352" comment="kdegraphics3-devel less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036353" comment="kdegraphics3-extra less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036354" comment="kdegraphics3-fax less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036355" comment="kdegraphics3-imaging less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036356" comment="kdegraphics3-kamera less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036357" comment="kdegraphics3-pdf less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036358" comment="kdegraphics3-postscript less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036359" comment="kdegraphics3-scan less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036360" comment="kdegraphics3-tex less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036361" comment="kdegraphics3 less than 3.5.7-60.7"/>
		</criteria>
	</criteria>
	<!-- d6aae2a6659ba7f7c8504daf6e33cedc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036362" comment="xpdf-tools less than 3.02-19.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036363" comment="xpdf less than 3.02-19.8"/>
		</criteria>
	</criteria>
	<!-- f184201908e91477cabdc65eec900094 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036364" comment="cups-client less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036365" comment="cups-devel less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036366" comment="cups-libs-32bit less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036367" comment="cups-libs-64bit less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036368" comment="cups-libs less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036369" comment="cups less than 1.2.12-22.21"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0179</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0179" source="CVE"/>
	<description>
	libmikmod 3.1.11 through 3.2.0, as used by MikMod and possibly other products, allows user-assisted attackers to cause a denial of service (application crash) by loading an XM file.
	</description>
 </metadata>
<!-- 483cd936b357a16ed8cf98eb89cf66bb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034723" comment="libmikmod-32bit less than 3.1.11a-34.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034724" comment="libmikmod-64bit less than 3.1.11a-34.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034725" comment="libmikmod-devel less than 3.1.11a-34.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034726" comment="libmikmod less than 3.1.11a-34.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0186</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0186" source="CVE"/>
	<description>
	Integer overflow in libsndfile 1.0.18, as used in Winamp and other products, allows context-dependent attackers to execute arbitrary code via crafted description chunks in a CAF audio file, leading to a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 0201aad425f51ee855306ce4675664c8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036372" comment="libsndfile-32bit less than 1.0.17-81.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036373" comment="libsndfile-64bit less than 1.0.17-81.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036374" comment="libsndfile-devel less than 1.0.17-81.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036375" comment="libsndfile-octave less than 1.0.17-81.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036376" comment="libsndfile-progs less than 1.0.17-81.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036377" comment="libsndfile less than 1.0.17-81.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0193</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0193" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0193" source="CVE"/>
	<description>
	Heap-based buffer overflow in Adobe Acrobat Reader 9 before 9.1, 8 before 8.1.4, and 7 before 7.1.1 allows remote attackers to execute arbitrary code via a PDF file with a malformed JBIG2 symbol dictionary segment, a different vulnerability than CVE-2009-1061 and CVE-2009-1062.
	</description>
 </metadata>
<!-- 03e82aa4432227738e571f5f8f20efc5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036378" comment="acroread less than 8.1.4-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0196</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0196" source="CVE"/>
	<description>
	Heap-based buffer overflow in the big2_decode_symbol_dict function (jbig2_symbol_dict.c) in the JBIG2 decoding library (jbig2dec) in Ghostscript 8.64, and probably earlier versions, allows remote attackers to execute arbitrary code via a PDF file with a JBIG2 symbol dictionary segment with a large run length value.
	</description>
 </metadata>
<!-- fdc70560402b44cb7ce9829765211428 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034727" comment="ghostscript-fonts-other less than 8.15.4-3.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034728" comment="ghostscript-fonts-rus less than 8.15.4-3.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034729" comment="ghostscript-fonts-std less than 8.15.4-3.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034730" comment="ghostscript-ijs-devel less than 8.15.4-3.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034731" comment="ghostscript-library less than 8.15.4-3.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034732" comment="ghostscript-omni less than 8.15.4-3.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034733" comment="ghostscript-x11 less than 8.15.4-3.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034734" comment="libgimpprint-devel less than 4.2.7-178.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034735" comment="libgimpprint less than 4.2.7-178.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0198</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0198" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0198" source="CVE"/>
	<description>
	Heap-based buffer overflow in the JBIG2 filter in Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted PDF file that contains JBIG2 text region segments with Huffman encoding.
	</description>
 </metadata>
<!-- 8cb28f685e1443f37a38c6b45f183d74 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036379" comment="acroread less than 8.1.6-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0200</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0200" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0200" source="CVE"/>
	<description>
	Integer underflow in OpenOffice.org (OOo) before 3.1.1 and StarOffice/StarSuite 7, 8, and 9 might allow remote attackers to execute arbitrary code via crafted records in the document table of a Word document, leading to a heap-based buffer overflow.
	</description>
 </metadata>
<!-- c52adfcc42ed540fc593548904645187 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054575" comment="OpenOffice_org-base less than 2.3.0.1.2-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054576" comment="OpenOffice_org-calc less than 2.3.0.1.2-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054577" comment="OpenOffice_org-devel less than 2.3.0.1.2-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054578" comment="OpenOffice_org-draw less than 2.3.0.1.2-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054579" comment="OpenOffice_org-filters less than 2.3.0.1.2-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054580" comment="OpenOffice_org-gnome less than 2.3.0.1.2-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054581" comment="OpenOffice_org-impress less than 2.3.0.1.2-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054582" comment="OpenOffice_org-kde less than 2.3.0.1.2-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054583" comment="OpenOffice_org-mailmerge less than 2.3.0.1.2-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054584" comment="OpenOffice_org-math less than 2.3.0.1.2-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054585" comment="OpenOffice_org-mono less than 2.3.0.1.2-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054586" comment="OpenOffice_org-officebean less than 2.3.0.1.2-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054587" comment="OpenOffice_org-pyuno less than 2.3.0.1.2-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054588" comment="OpenOffice_org-sdk-doc less than 2.3.0.1.2-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054589" comment="OpenOffice_org-sdk less than 2.3.0.1.2-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054590" comment="OpenOffice_org-testtool less than 2.3.0.1.2-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054591" comment="OpenOffice_org-writer less than 2.3.0.1.2-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054592" comment="OpenOffice_org less than 2.3.0.1.2-10.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0201</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0201" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0201" source="CVE"/>
	<description>
	Heap-based buffer overflow in OpenOffice.org (OOo) before 3.1.1 and StarOffice/StarSuite 7, 8, and 9 might allow remote attackers to execute arbitrary code via unspecified records in a crafted Word document, related to "table parsing."
	</description>
 </metadata>
<!-- c52adfcc42ed540fc593548904645187 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054575" comment="OpenOffice_org-base less than 2.3.0.1.2-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054576" comment="OpenOffice_org-calc less than 2.3.0.1.2-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054577" comment="OpenOffice_org-devel less than 2.3.0.1.2-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054578" comment="OpenOffice_org-draw less than 2.3.0.1.2-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054579" comment="OpenOffice_org-filters less than 2.3.0.1.2-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054580" comment="OpenOffice_org-gnome less than 2.3.0.1.2-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054581" comment="OpenOffice_org-impress less than 2.3.0.1.2-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054582" comment="OpenOffice_org-kde less than 2.3.0.1.2-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054583" comment="OpenOffice_org-mailmerge less than 2.3.0.1.2-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054584" comment="OpenOffice_org-math less than 2.3.0.1.2-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054585" comment="OpenOffice_org-mono less than 2.3.0.1.2-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054586" comment="OpenOffice_org-officebean less than 2.3.0.1.2-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054587" comment="OpenOffice_org-pyuno less than 2.3.0.1.2-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054588" comment="OpenOffice_org-sdk-doc less than 2.3.0.1.2-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054589" comment="OpenOffice_org-sdk less than 2.3.0.1.2-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054590" comment="OpenOffice_org-testtool less than 2.3.0.1.2-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054591" comment="OpenOffice_org-writer less than 2.3.0.1.2-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054592" comment="OpenOffice_org less than 2.3.0.1.2-10.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0241</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0241" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0241" source="CVE"/>
	<description>
	Stack-based buffer overflow in the process_path function in gmetad/server.c in Ganglia 3.1.1 allows remote attackers to cause a denial of service (crash) via a request to the gmetad service with a long pathname.
	</description>
 </metadata>
<!-- 8f6baba203b545345b58590ab71c754b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036380" comment="ganglia-monitor-core-devel less than 2.5.7-99.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036381" comment="ganglia-monitor-core-gmetad less than 2.5.7-99.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036382" comment="ganglia-monitor-core-gmond less than 2.5.7-99.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036383" comment="ganglia-monitor-core less than 2.5.7-99.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036384" comment="ganglia-webfrontend less than 2.5.7-99.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0269</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0269" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0269" source="CVE"/>
	<description>
	fs/ecryptfs/inode.c in the eCryptfs subsystem in the Linux kernel before 2.6.28.1 allows local users to cause a denial of service (fault or memory corruption), or possibly have unspecified other impact, via a readlink call that results in an error, leading to use of a -1 return value as an array index.
	</description>
 </metadata>
<!-- b36aaab84a5618e58a83fd28deda41c5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035966" comment="kernel-bigsmp less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035967" comment="kernel-debug less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035968" comment="kernel-default less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035969" comment="kernel-kdump less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035970" comment="kernel-ppc64 less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035971" comment="kernel-source less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035972" comment="kernel-syms less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035973" comment="kernel-xen less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035974" comment="kernel-xenpae less than 2.6.22.19-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0310</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0310" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0310" source="CVE"/>
	<description>
	Buffer overflow in SUSE blinux (aka sbl) in SUSE openSUSE 10.3 through 11.0 has unknown impact and attack vectors related to "incoming data and authentication-strings."
	</description>
 </metadata>
<!-- 3c5132461d81ae14351600c00889cb11 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036385" comment="sbl less than 3.0f-16.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0316</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0316" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0316" source="CVE"/>
	<description>
	Untrusted search path vulnerability in src/if_python.c in the Python interface in Vim before 7.2.045 allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983), as demonstrated by an erroneous search path for plugin/bike.vim in bicyclerepair.
	</description>
 </metadata>
<!-- 4811f82775ba2e73f4c7806cd79ad5c0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035542" comment="gvim less than 7.2-9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035543" comment="vim-base less than 7.2-9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035544" comment="vim-data less than 7.2-9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035545" comment="vim-enhanced less than 7.2-9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0322</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0322" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0322" source="CVE"/>
	<description>
	drivers/firmware/dell_rbu.c in the Linux kernel before 2.6.27.13, and 2.6.28.x before 2.6.28.2, allows local users to cause a denial of service (system crash) via a read system call that specifies zero bytes from the (1) image_type or (2) packet_size file in /sys/devices/platform/dell_rbu/.
	</description>
 </metadata>
<!-- b36aaab84a5618e58a83fd28deda41c5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035966" comment="kernel-bigsmp less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035967" comment="kernel-debug less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035968" comment="kernel-default less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035969" comment="kernel-kdump less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035970" comment="kernel-ppc64 less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035971" comment="kernel-source less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035972" comment="kernel-syms less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035973" comment="kernel-xen less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035974" comment="kernel-xenpae less than 2.6.22.19-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0352</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0352" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0352" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Mozilla Firefox 3.x before 3.0.6, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the layout engine and destruction of arbitrary layout objects by the nsViewManager::Composite function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 468dcee6ae0a6b23da4670fc11618a60 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036327" comment="MozillaFirefox-translations less than 2.0.0.21post-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036328" comment="MozillaFirefox less than 2.0.0.21post-0.1"/>
		</criteria>
	</criteria>
	<!-- cb58df3a93b69014571b008c271b64f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036329" comment="seamonkey-dom-inspector less than 1.1.16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036330" comment="seamonkey-irc less than 1.1.16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036331" comment="seamonkey-mail less than 1.1.16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036332" comment="seamonkey-spellchecker less than 1.1.16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036333" comment="seamonkey-venkman less than 1.1.16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036334" comment="seamonkey less than 1.1.16-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0353</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0353" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0353" source="CVE"/>
	<description>
	Unspecified vulnerability in Mozilla Firefox 3.x before 3.0.6, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the JavaScript engine.
	</description>
 </metadata>
<!-- 468dcee6ae0a6b23da4670fc11618a60 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036327" comment="MozillaFirefox-translations less than 2.0.0.21post-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036328" comment="MozillaFirefox less than 2.0.0.21post-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0357</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0357" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0357" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.6 and SeaMonkey before 1.1.15 do not properly restrict access from web pages to the (1) Set-Cookie and (2) Set-Cookie2 HTTP response headers, which allows remote attackers to obtain sensitive information from cookies via XMLHttpRequest calls, related to the HTTPOnly protection mechanism.
	</description>
 </metadata>
<!-- cb58df3a93b69014571b008c271b64f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036329" comment="seamonkey-dom-inspector less than 1.1.16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036330" comment="seamonkey-irc less than 1.1.16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036331" comment="seamonkey-mail less than 1.1.16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036332" comment="seamonkey-spellchecker less than 1.1.16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036333" comment="seamonkey-venkman less than 1.1.16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036334" comment="seamonkey less than 1.1.16-1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0365</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0365" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0365" source="CVE"/>
	<description>
	nm-applet.conf in GNOME NetworkManager before 0.7.0.99 contains an incorrect deny setting, which allows local users to discover (1) network connection passwords and (2) pre-shared keys via calls to the GetSecrets method in the dbus request handler.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 53f9a3590be806fad802661b9d72d773 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036386" comment="NetworkManager-gnome less than 0.6.5-37.6"/>
	</criteria>
	<!-- 899de54362214cb9b1496d406d58542c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036387" comment="NetworkManager-devel less than 0.6.5-37.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036388" comment="NetworkManager-glib less than 0.6.5-37.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036389" comment="NetworkManager less than 0.6.5-37.6"/>
		</criteria>
	</criteria>
	<!-- ac1fdff60a91fb052e3b3ae8d3df183d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036390" comment="NetworkManager-kde-devel less than 0.2r674918-55.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036391" comment="NetworkManager-kde less than 0.2r674918-55.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036392" comment="NetworkManager-openvpn-kde less than 0.2r674918-55.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036393" comment="NetworkManager-vpnc-kde less than 0.2r674918-55.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0368</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0368" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0368" source="CVE"/>
	<description>
	OpenSC before 0.11.7 allows physically proximate attackers to bypass intended PIN requirements and read private data objects via a (1) low level APDU command or (2) debugging tool, as demonstrated by reading the 4601 or 4701 file with the opensc-explorer or opensc-tool program.
	</description>
 </metadata>
<!-- dc96df9d0b9e018d13e8b307cbd82481 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036394" comment="libopensc2-32bit less than 0.11.3-21.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036395" comment="libopensc2-64bit less than 0.11.3-21.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036396" comment="libopensc2 less than 0.11.3-21.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036397" comment="opensc-32bit less than 0.11.3-21.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036398" comment="opensc-64bit less than 0.11.3-21.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036399" comment="opensc-devel less than 0.11.3-21.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036400" comment="opensc less than 0.11.3-21.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0386</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0386" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0386" source="CVE"/>
	<description>
	Heap-based buffer overflow in the qtdemux_parse_samples function in gst/qtdemux/qtdemux.c in GStreamer Good Plug-ins (aka gst-plugins-good) 0.10.9 through 0.10.11 might allow remote attackers to execute arbitrary code via crafted Composition Time To Sample (ctts) atom data in a malformed QuickTime media .mov file.
	</description>
 </metadata>
<!-- 5ef274d551ab9e4e5fc4775272134b53 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036401" comment="gstreamer010-plugins-good-doc less than 0.10.6-41.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036402" comment="gstreamer010-plugins-good-extra less than 0.10.6-41.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036403" comment="gstreamer010-plugins-good less than 0.10.6-41.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0387</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0387" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0387" source="CVE"/>
	<description>
	Array index error in the qtdemux_parse_samples function in gst/qtdemux/qtdemux.c in GStreamer Good Plug-ins (aka gst-plugins-good) 0.10.9 through 0.10.11 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted Sync Sample (aka stss) atom data in a malformed QuickTime media .mov file, related to "mark keyframes."
	</description>
 </metadata>
<!-- 5ef274d551ab9e4e5fc4775272134b53 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036401" comment="gstreamer010-plugins-good-doc less than 0.10.6-41.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036402" comment="gstreamer010-plugins-good-extra less than 0.10.6-41.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036403" comment="gstreamer010-plugins-good less than 0.10.6-41.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0397</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0397" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0397" source="CVE"/>
	<description>
	Heap-based buffer overflow in the qtdemux_parse_samples function in gst/qtdemux/qtdemux.c in GStreamer Good Plug-ins (aka gst-plugins-good) 0.10.9 through 0.10.11, and GStreamer Plug-ins (aka gstreamer-plugins) 0.8.5, might allow remote attackers to execute arbitrary code via crafted Time-to-sample (aka stts) atom data in a malformed QuickTime media .mov file.
	</description>
 </metadata>
<!-- 5ef274d551ab9e4e5fc4775272134b53 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036401" comment="gstreamer010-plugins-good-doc less than 0.10.6-41.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036402" comment="gstreamer010-plugins-good-extra less than 0.10.6-41.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036403" comment="gstreamer010-plugins-good less than 0.10.6-41.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0490</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0490" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0490" source="CVE"/>
	<description>
	Stack-based buffer overflow in the String_parse::get_nonspace_quoted function in lib-src/allegro/strparse.cpp in Audacity 1.2.6 and other versions before 1.3.6 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a .gro file containing a long string.
	</description>
 </metadata>
<!-- 8a3451a8f32b07b65df2d88b6630d90a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036404" comment="audacity less than 1.3.3-46.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0499</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0499" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0499" source="CVE"/>
	<description>
	Cross-site request forgery (CSRF) vulnerability in the forum code in Moodle 1.7 before 1.7.7, 1.8 before 1.8.8, and 1.9 before 1.9.4 allows remote attackers to delete unauthorized forum posts via a link or IMG tag to post.php.
	</description>
 </metadata>
<!-- b9ec1816ecb787b4492642cd5084c7a0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036405" comment="moodle-af less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036406" comment="moodle-ar less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036407" comment="moodle-be less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036408" comment="moodle-bg less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036409" comment="moodle-bs less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036410" comment="moodle-ca less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036411" comment="moodle-cs less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036412" comment="moodle-da less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036413" comment="moodle-de less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036414" comment="moodle-de_du less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036415" comment="moodle-el less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036416" comment="moodle-es less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036417" comment="moodle-et less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036418" comment="moodle-eu less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036419" comment="moodle-fa less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036420" comment="moodle-fi less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036421" comment="moodle-fr less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036422" comment="moodle-ga less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036423" comment="moodle-gl less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036424" comment="moodle-he less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036425" comment="moodle-hi less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036426" comment="moodle-hr less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036427" comment="moodle-hu less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036428" comment="moodle-id less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036429" comment="moodle-is less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036430" comment="moodle-it less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036431" comment="moodle-ja less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036432" comment="moodle-ka less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036433" comment="moodle-km less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036434" comment="moodle-kn less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036435" comment="moodle-ko less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036436" comment="moodle-lt less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036437" comment="moodle-lv less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036438" comment="moodle-mi_tn less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036439" comment="moodle-ms less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036440" comment="moodle-nl less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036441" comment="moodle-nn less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036442" comment="moodle-no less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036443" comment="moodle-pl less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036444" comment="moodle-pt less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036445" comment="moodle-ro less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036446" comment="moodle-ru less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036447" comment="moodle-sk less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036448" comment="moodle-sl less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036449" comment="moodle-so less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036450" comment="moodle-sq less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036451" comment="moodle-sr less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036452" comment="moodle-sv less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036453" comment="moodle-th less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036454" comment="moodle-tl less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036455" comment="moodle-tr less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036456" comment="moodle-uk less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036457" comment="moodle-vi less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036458" comment="moodle-zh_cn less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036459" comment="moodle less than 1.8.2-17.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0500</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0500" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in course/lib.php in Moodle 1.6 before 1.6.9, 1.7 before 1.7.7, 1.8 before 1.8.8, and 1.9 before 1.9.4 allows remote attackers to inject arbitrary web script or HTML via crafted log table information that is not properly handled when it is displayed in a log report.
	</description>
 </metadata>
<!-- b9ec1816ecb787b4492642cd5084c7a0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036405" comment="moodle-af less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036406" comment="moodle-ar less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036407" comment="moodle-be less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036408" comment="moodle-bg less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036409" comment="moodle-bs less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036410" comment="moodle-ca less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036411" comment="moodle-cs less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036412" comment="moodle-da less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036413" comment="moodle-de less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036414" comment="moodle-de_du less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036415" comment="moodle-el less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036416" comment="moodle-es less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036417" comment="moodle-et less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036418" comment="moodle-eu less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036419" comment="moodle-fa less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036420" comment="moodle-fi less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036421" comment="moodle-fr less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036422" comment="moodle-ga less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036423" comment="moodle-gl less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036424" comment="moodle-he less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036425" comment="moodle-hi less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036426" comment="moodle-hr less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036427" comment="moodle-hu less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036428" comment="moodle-id less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036429" comment="moodle-is less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036430" comment="moodle-it less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036431" comment="moodle-ja less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036432" comment="moodle-ka less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036433" comment="moodle-km less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036434" comment="moodle-kn less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036435" comment="moodle-ko less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036436" comment="moodle-lt less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036437" comment="moodle-lv less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036438" comment="moodle-mi_tn less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036439" comment="moodle-ms less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036440" comment="moodle-nl less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036441" comment="moodle-nn less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036442" comment="moodle-no less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036443" comment="moodle-pl less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036444" comment="moodle-pt less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036445" comment="moodle-ro less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036446" comment="moodle-ru less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036447" comment="moodle-sk less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036448" comment="moodle-sl less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036449" comment="moodle-so less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036450" comment="moodle-sq less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036451" comment="moodle-sr less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036452" comment="moodle-sv less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036453" comment="moodle-th less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036454" comment="moodle-tl less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036455" comment="moodle-tr less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036456" comment="moodle-uk less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036457" comment="moodle-vi less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036458" comment="moodle-zh_cn less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036459" comment="moodle less than 1.8.2-17.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0501</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0501" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0501" source="CVE"/>
	<description>
	Unspecified vulnerability in the Calendar export feature in Moodle 1.8 before 1.8.8 and 1.9 before 1.9.4 allows attackers to obtain sensitive information and conduct "brute force attacks on user accounts" via unknown vectors.
	</description>
 </metadata>
<!-- b9ec1816ecb787b4492642cd5084c7a0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036405" comment="moodle-af less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036406" comment="moodle-ar less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036407" comment="moodle-be less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036408" comment="moodle-bg less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036409" comment="moodle-bs less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036410" comment="moodle-ca less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036411" comment="moodle-cs less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036412" comment="moodle-da less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036413" comment="moodle-de less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036414" comment="moodle-de_du less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036415" comment="moodle-el less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036416" comment="moodle-es less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036417" comment="moodle-et less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036418" comment="moodle-eu less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036419" comment="moodle-fa less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036420" comment="moodle-fi less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036421" comment="moodle-fr less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036422" comment="moodle-ga less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036423" comment="moodle-gl less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036424" comment="moodle-he less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036425" comment="moodle-hi less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036426" comment="moodle-hr less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036427" comment="moodle-hu less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036428" comment="moodle-id less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036429" comment="moodle-is less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036430" comment="moodle-it less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036431" comment="moodle-ja less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036432" comment="moodle-ka less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036433" comment="moodle-km less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036434" comment="moodle-kn less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036435" comment="moodle-ko less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036436" comment="moodle-lt less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036437" comment="moodle-lv less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036438" comment="moodle-mi_tn less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036439" comment="moodle-ms less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036440" comment="moodle-nl less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036441" comment="moodle-nn less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036442" comment="moodle-no less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036443" comment="moodle-pl less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036444" comment="moodle-pt less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036445" comment="moodle-ro less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036446" comment="moodle-ru less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036447" comment="moodle-sk less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036448" comment="moodle-sl less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036449" comment="moodle-so less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036450" comment="moodle-sq less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036451" comment="moodle-sr less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036452" comment="moodle-sv less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036453" comment="moodle-th less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036454" comment="moodle-tl less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036455" comment="moodle-tr less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036456" comment="moodle-uk less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036457" comment="moodle-vi less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036458" comment="moodle-zh_cn less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036459" comment="moodle less than 1.8.2-17.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0502</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0502" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0502" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in blocks/html/block_html.php in Snoopy 1.2.3, as used in Moodle 1.6 before 1.6.9, 1.7 before 1.7.7, 1.8 before 1.8.8, and 1.9 before 1.9.4, allows remote attackers to inject arbitrary web script or HTML via an HTML block, which is not properly handled when the "Login as" feature is used to visit a MyMoodle or Blog page.
	</description>
 </metadata>
<!-- b9ec1816ecb787b4492642cd5084c7a0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036405" comment="moodle-af less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036406" comment="moodle-ar less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036407" comment="moodle-be less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036408" comment="moodle-bg less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036409" comment="moodle-bs less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036410" comment="moodle-ca less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036411" comment="moodle-cs less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036412" comment="moodle-da less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036413" comment="moodle-de less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036414" comment="moodle-de_du less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036415" comment="moodle-el less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036416" comment="moodle-es less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036417" comment="moodle-et less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036418" comment="moodle-eu less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036419" comment="moodle-fa less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036420" comment="moodle-fi less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036421" comment="moodle-fr less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036422" comment="moodle-ga less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036423" comment="moodle-gl less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036424" comment="moodle-he less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036425" comment="moodle-hi less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036426" comment="moodle-hr less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036427" comment="moodle-hu less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036428" comment="moodle-id less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036429" comment="moodle-is less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036430" comment="moodle-it less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036431" comment="moodle-ja less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036432" comment="moodle-ka less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036433" comment="moodle-km less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036434" comment="moodle-kn less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036435" comment="moodle-ko less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036436" comment="moodle-lt less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036437" comment="moodle-lv less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036438" comment="moodle-mi_tn less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036439" comment="moodle-ms less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036440" comment="moodle-nl less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036441" comment="moodle-nn less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036442" comment="moodle-no less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036443" comment="moodle-pl less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036444" comment="moodle-pt less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036445" comment="moodle-ro less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036446" comment="moodle-ru less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036447" comment="moodle-sk less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036448" comment="moodle-sl less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036449" comment="moodle-so less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036450" comment="moodle-sq less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036451" comment="moodle-sr less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036452" comment="moodle-sv less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036453" comment="moodle-th less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036454" comment="moodle-tl less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036455" comment="moodle-tr less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036456" comment="moodle-uk less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036457" comment="moodle-vi less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036458" comment="moodle-zh_cn less than 1.8.2-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036459" comment="moodle less than 1.8.2-17.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0509</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0509" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0509" source="CVE"/>
	<description>
	Heap-based buffer overflow in the JBIG2 filter in Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 allows remote attackers to execute arbitrary code via a crafted file that triggers memory corruption.
	</description>
 </metadata>
<!-- 8cb28f685e1443f37a38c6b45f183d74 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036379" comment="acroread less than 8.1.6-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0510</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0510" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0510" source="CVE"/>
	<description>
	Heap-based buffer overflow in the JBIG2 filter in Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 might allow remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2009-0511, CVE-2009-0512, CVE-2009-0888, and CVE-2009-0889.
	</description>
 </metadata>
<!-- 8cb28f685e1443f37a38c6b45f183d74 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036379" comment="acroread less than 8.1.6-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0511</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0511" source="CVE"/>
	<description>
	Heap-based buffer overflow in the JBIG2 filter in Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 might allow remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2009-0510, CVE-2009-0512, CVE-2009-0888, and CVE-2009-0889.
	</description>
 </metadata>
<!-- 8cb28f685e1443f37a38c6b45f183d74 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036379" comment="acroread less than 8.1.6-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0512</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0512" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0512" source="CVE"/>
	<description>
	Heap-based buffer overflow in the JBIG2 filter in Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 might allow remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2009-0510, CVE-2009-0511, CVE-2009-0888, and CVE-2009-0889.
	</description>
 </metadata>
<!-- 8cb28f685e1443f37a38c6b45f183d74 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036379" comment="acroread less than 8.1.6-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0519</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0519" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0519" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player 9.x before 9.0.159.0 and 10.x before 10.0.22.87 allows remote attackers to cause a denial of service (browser crash) or possibly execute arbitrary code via a crafted Shockwave Flash (aka .swf) file.
	</description>
 </metadata>
<!-- 31b49f5e5d89220061c13b7ea115b027 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032032" comment="flash-player less than 9.0.159.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0520</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0520" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0520" source="CVE"/>
	<description>
	Adobe Flash Player 9.x before 9.0.159.0 and 10.x before 10.0.22.87 does not properly remove references to destroyed objects during Shockwave Flash file processing, which allows remote attackers to execute arbitrary code via a crafted file, related to a "buffer overflow issue."
	</description>
 </metadata>
<!-- 31b49f5e5d89220061c13b7ea115b027 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032032" comment="flash-player less than 9.0.159.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0521</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0521" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0521" source="CVE"/>
	<description>
	Untrusted search path vulnerability in Adobe Flash Player 9.x before 9.0.159.0 and 10.x before 10.0.22.87 on Linux allows local users to obtain sensitive information or gain privileges via a crafted library in a directory contained in the RPATH.
	</description>
 </metadata>
<!-- 31b49f5e5d89220061c13b7ea115b027 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032032" comment="flash-player less than 9.0.159.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0544</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0544" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0544" source="CVE"/>
	<description>
	Buffer overflow in the PyCrypto ARC2 module 2.0.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large ARC2 key length.
	</description>
 </metadata>
<!-- a1237733213a6cd24246d782ef3e5ca1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036460" comment="python-crypto less than 2.0.1-103.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0578</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0578" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0578" source="CVE"/>
	<description>
	GNOME NetworkManager before 0.7.0.99 does not properly verify privileges for dbus (1) modify and (2) delete requests, which allows local users to change or remove the network connections of arbitrary users via unspecified vectors related to org.freedesktop.NetworkManagerUserSettings and at_console.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 53f9a3590be806fad802661b9d72d773 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036386" comment="NetworkManager-gnome less than 0.6.5-37.6"/>
	</criteria>
	<!-- 899de54362214cb9b1496d406d58542c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036387" comment="NetworkManager-devel less than 0.6.5-37.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036388" comment="NetworkManager-glib less than 0.6.5-37.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036389" comment="NetworkManager less than 0.6.5-37.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0580</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0580" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0580" source="CVE"/>
	<description>
	Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.
	</description>
 </metadata>
<!-- 5f950e1a740f8dca3f68bba7e306eb4a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053694" comment="tomcat55-admin-webapps less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053695" comment="tomcat55-common-lib less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053696" comment="tomcat55-jasper-javadoc less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053697" comment="tomcat55-jasper less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053698" comment="tomcat55-jsp-2_0-api-javadoc less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053699" comment="tomcat55-jsp-2_0-api less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053700" comment="tomcat55-server-lib less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053701" comment="tomcat55-servlet-2_4-api-javadoc less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053702" comment="tomcat55-servlet-2_4-api less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053703" comment="tomcat55-webapps less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053704" comment="tomcat55 less than 5.5.23-113.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0581</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0581" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0581" source="CVE"/>
	<description>
	Memory leak in LittleCMS (aka lcms or liblcms) before 1.18beta2, as used in Firefox 3.1beta, OpenJDK, and GIMP, allows context-dependent attackers to cause a denial of service (memory consumption and application crash) via a crafted image file.
	</description>
 </metadata>
<!-- e0afe0dc5c698ef57fd58c7d08a1afca -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036461" comment="liblcms-32bit less than 1.16-39.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036462" comment="liblcms-64bit less than 1.16-39.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036463" comment="liblcms-devel-32bit less than 1.16-39.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036464" comment="liblcms-devel-64bit less than 1.16-39.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036465" comment="liblcms-devel less than 1.16-39.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036466" comment="liblcms less than 1.16-39.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0582</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0582" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0582" source="CVE"/>
	<description>
	The ntlm_challenge function in the NTLM SASL authentication mechanism in camel/camel-sasl-ntlm.c in Camel in Evolution Data Server (aka evolution-data-server) 2.24.5 and earlier, and 2.25.92 and earlier 2.25.x versions, does not validate whether a certain length value is consistent with the amount of data in a challenge packet, which allows remote mail servers to read information from the process memory of a client, or cause a denial of service (client crash), via an NTLM authentication type 2 packet with a length value that exceeds the amount of packet data.
	</description>
 </metadata>
<!-- dabe9365872066bd786ab750609a6a40 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036467" comment="evolution-data-server-32bit less than 1.12.0-5.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036468" comment="evolution-data-server-64bit less than 1.12.0-5.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036469" comment="evolution-data-server-devel less than 1.12.0-5.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036470" comment="evolution-data-server-doc less than 1.12.0-5.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036471" comment="evolution-data-server less than 1.12.0-5.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0583</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0583" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0583" source="CVE"/>
	<description>
	Multiple integer overflows in icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allow context-dependent attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly execute arbitrary code by using a device file for a translation request that operates on a crafted image file and targets a certain "native color space," related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images.
	</description>
 </metadata>
<!-- ca5ee32c7a833af59d9df328e6cee100 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036472" comment="ghostscript-fonts-other less than 8.15.4-3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036473" comment="ghostscript-fonts-rus less than 8.15.4-3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036474" comment="ghostscript-fonts-std less than 8.15.4-3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036475" comment="ghostscript-ijs-devel less than 8.15.4-3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036476" comment="ghostscript-library less than 8.15.4-3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036477" comment="ghostscript-omni less than 8.15.4-3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036478" comment="ghostscript-x11 less than 8.15.4-3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036479" comment="libgimpprint-devel less than 4.2.7-178.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036480" comment="libgimpprint less than 4.2.7-178.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0584</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0584" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0584" source="CVE"/>
	<description>
	icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code by using a device file for processing a crafted image file associated with large integer values for certain sizes, related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images.
	</description>
 </metadata>
<!-- ca5ee32c7a833af59d9df328e6cee100 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036472" comment="ghostscript-fonts-other less than 8.15.4-3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036473" comment="ghostscript-fonts-rus less than 8.15.4-3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036474" comment="ghostscript-fonts-std less than 8.15.4-3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036475" comment="ghostscript-ijs-devel less than 8.15.4-3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036476" comment="ghostscript-library less than 8.15.4-3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036477" comment="ghostscript-omni less than 8.15.4-3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036478" comment="ghostscript-x11 less than 8.15.4-3.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036479" comment="libgimpprint-devel less than 4.2.7-178.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036480" comment="libgimpprint less than 4.2.7-178.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0590</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0590" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0590" source="CVE"/>
	<description>
	The ASN1_STRING_print_ex function in OpenSSL before 0.9.8k allows remote attackers to cause a denial of service (invalid memory access and application crash) via vectors that trigger printing of a (1) BMPString or (2) UniversalString with an invalid encoded length.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2b23a077cfada6a58ffb10e898bcd615 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036481" comment="libopenssl-devel less than 0.9.8e-45.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036482" comment="libopenssl0_9_8-32bit less than 0.9.8e-45.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036483" comment="libopenssl0_9_8-64bit less than 0.9.8e-45.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036484" comment="libopenssl0_9_8 less than 0.9.8e-45.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036485" comment="openssl-certs less than 0.9.8e-45.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036486" comment="openssl-doc less than 0.9.8e-45.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036487" comment="openssl less than 0.9.8e-45.9"/>
		</criteria>
	</criteria>
	<!-- f29bc510f4ec67fd2f24fbc774fc3f2f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036488" comment="compat-openssl097g-32bit less than 0.9.7g-75.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036489" comment="compat-openssl097g-64bit less than 0.9.7g-75.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036490" comment="compat-openssl097g less than 0.9.7g-75.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0599</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0599" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0599" source="CVE"/>
	<description>
	Buffer overflow in wiretap/netscreen.c in Wireshark 0.99.7 through 1.0.5 allows user-assisted remote attackers to cause a denial of service (application crash) via a malformed NetScreen snoop file.
	</description>
 </metadata>
<!-- 1ab0b94032a4fc59c1c2c4e35fc01d57 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036491" comment="wireshark-devel less than 0.99.6-31.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036492" comment="wireshark less than 0.99.6-31.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0600</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0600" source="CVE"/>
	<description>
	Wireshark 0.99.6 through 1.0.5 allows user-assisted remote attackers to cause a denial of service (application crash) via a crafted Tektronix K12 text capture file, as demonstrated by a file with exactly one frame.
	</description>
 </metadata>
<!-- 1ab0b94032a4fc59c1c2c4e35fc01d57 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036491" comment="wireshark-devel less than 0.99.6-31.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036492" comment="wireshark less than 0.99.6-31.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0601</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0601" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0601" source="CVE"/>
	<description>
	Format string vulnerability in Wireshark 0.99.8 through 1.0.5 on non-Windows platforms allows local users to cause a denial of service (application crash) via format string specifiers in the HOME environment variable.
	</description>
 </metadata>
<!-- 1ab0b94032a4fc59c1c2c4e35fc01d57 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036491" comment="wireshark-devel less than 0.99.6-31.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036492" comment="wireshark less than 0.99.6-31.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0642</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0642" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0642" source="CVE"/>
	<description>
	ext/openssl/ossl_ocsp.c in Ruby 1.8 and 1.9 does not properly check the return value from the OCSP_basic_verify function, which might allow remote attackers to successfully present an invalid X.509 certificate, possibly involving a revoked certificate.
	</description>
 </metadata>
<!-- c147c81633c8cf23c7022e50919e2209 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053195" comment="ruby-devel less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053196" comment="ruby-doc-html less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053197" comment="ruby-doc-ri less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053198" comment="ruby-examples less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053199" comment="ruby-test-suite less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053200" comment="ruby-tk less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053201" comment="ruby less than 1.8.6.p369-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0652</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0652" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0652" source="CVE"/>
	<description>
	The Internationalized Domain Names (IDN) blacklist in Mozilla Firefox 3.0.6 and other versions before 3.0.9; Thunderbird before 2.0.0.21; and SeaMonkey before 1.1.15 does not include box-drawing characters, which allows remote attackers to spoof URLs and conduct phishing attacks, as demonstrated by homoglyphs of the / (slash) and ? (question mark) characters in a subdomain of a .cn domain name, a different vulnerability than CVE-2005-0233.  NOTE: some third parties claim that 3.0.6 is not affected, but much older versions perhaps are affected.
	</description>
 </metadata>
<!-- cb58df3a93b69014571b008c271b64f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036329" comment="seamonkey-dom-inspector less than 1.1.16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036330" comment="seamonkey-irc less than 1.1.16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036331" comment="seamonkey-mail less than 1.1.16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036332" comment="seamonkey-spellchecker less than 1.1.16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036333" comment="seamonkey-venkman less than 1.1.16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036334" comment="seamonkey less than 1.1.16-1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0658</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0658" source="CVE"/>
	<description>
	Buffer overflow in Adobe Reader 9.0 and earlier, and Acrobat 9.0 and earlier, allows remote attackers to execute arbitrary code via a crafted PDF document, related to a non-JavaScript function call and possibly an embedded JBIG2 image stream, as exploited in the wild in February 2009 by Trojan.Pidief.E.
	</description>
 </metadata>
<!-- 03e82aa4432227738e571f5f8f20efc5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036378" comment="acroread less than 8.1.4-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0663</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0663" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0663" source="CVE"/>
	<description>
	Heap-based buffer overflow in the DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module 1.49 for Perl might allow context-dependent attackers to execute arbitrary code via unspecified input to an application that uses the getline and pg_getline functions to read database rows.
	</description>
 </metadata>
<!-- 1af0be7953f693b75af34b78a7cf8ca3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036493" comment="perl-DBD-Pg less than 1.49-76.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0676</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0676" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0676" source="CVE"/>
	<description>
	The sock_getsockopt function in net/core/sock.c in the Linux kernel before 2.6.28.6 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel memory via an SO_BSDCOMPAT getsockopt request.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 82fe92100e56a9a9db21ff031e1cafb5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054123" comment="kernel-bigsmp less than 2.6.22.19-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054124" comment="kernel-debug less than 2.6.22.19-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054125" comment="kernel-default less than 2.6.22.19-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054126" comment="kernel-kdump less than 2.6.22.19-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054127" comment="kernel-ppc64 less than 2.6.22.19-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054128" comment="kernel-source less than 2.6.22.19-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054129" comment="kernel-syms less than 2.6.22.19-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054130" comment="kernel-xen less than 2.6.22.19-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054131" comment="kernel-xenpae less than 2.6.22.19-0.4"/>
		</criteria>
	</criteria>
	<!-- b36aaab84a5618e58a83fd28deda41c5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009035966" comment="kernel-bigsmp less than 2.6.22.19-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035967" comment="kernel-debug less than 2.6.22.19-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035968" comment="kernel-default less than 2.6.22.19-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035969" comment="kernel-kdump less than 2.6.22.19-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035970" comment="kernel-ppc64 less than 2.6.22.19-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035971" comment="kernel-source less than 2.6.22.19-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035972" comment="kernel-syms less than 2.6.22.19-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035973" comment="kernel-xen less than 2.6.22.19-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009035974" comment="kernel-xenpae less than 2.6.22.19-0.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0688</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0688" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0688" source="CVE"/>
	<description>
	Multiple buffer overflows in the CMU Cyrus SASL library before 2.1.23 might allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via strings that are used as input to the sasl_encode64 function in lib/saslutil.c.
	</description>
 </metadata>
<!-- c8f7feab7548e931f28523d44f81e05c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036494" comment="cyrus-sasl-32bit less than 2.1.22-82.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036495" comment="cyrus-sasl-64bit less than 2.1.22-82.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036496" comment="cyrus-sasl-crammd5-32bit less than 2.1.22-82.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036497" comment="cyrus-sasl-crammd5-64bit less than 2.1.22-82.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036498" comment="cyrus-sasl-crammd5 less than 2.1.22-82.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036499" comment="cyrus-sasl-devel-32bit less than 2.1.22-82.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036500" comment="cyrus-sasl-devel-64bit less than 2.1.22-82.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036501" comment="cyrus-sasl-devel less than 2.1.22-82.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036502" comment="cyrus-sasl-digestmd5-32bit less than 2.1.22-82.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036503" comment="cyrus-sasl-digestmd5-64bit less than 2.1.22-82.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036504" comment="cyrus-sasl-digestmd5 less than 2.1.22-82.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036505" comment="cyrus-sasl-gssapi-32bit less than 2.1.22-82.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036506" comment="cyrus-sasl-gssapi-64bit less than 2.1.22-82.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036507" comment="cyrus-sasl-gssapi less than 2.1.22-82.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036508" comment="cyrus-sasl-otp-32bit less than 2.1.22-82.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036509" comment="cyrus-sasl-otp-64bit less than 2.1.22-82.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036510" comment="cyrus-sasl-otp less than 2.1.22-82.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036511" comment="cyrus-sasl-plain-32bit less than 2.1.22-82.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036512" comment="cyrus-sasl-plain-64bit less than 2.1.22-82.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036513" comment="cyrus-sasl-plain less than 2.1.22-82.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036514" comment="cyrus-sasl less than 2.1.22-82.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0692</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0692" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0692" source="CVE"/>
	<description>
	Stack-based buffer overflow in the script_write_params method in client/dhclient.c in ISC DHCP dhclient 4.1 before 4.1.0p1, 4.0 before 4.0.1p1, 3.1 before 3.1.2p1, 3.0, and 2.0 allows remote DHCP servers to execute arbitrary code via a crafted subnet-mask option.
	</description>
 </metadata>
<!-- ad22e43341380c18433746bd25b02346 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053403" comment="dhcp-client less than 3.0.6-24.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053404" comment="dhcp-devel less than 3.0.6-24.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053405" comment="dhcp-relay less than 3.0.6-24.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053406" comment="dhcp-server less than 3.0.6-24.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053407" comment="dhcp less than 3.0.6-24.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0696</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0696" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0696" source="CVE"/>
	<description>
	The dns_db_findrdataset function in db.c in named in ISC BIND 9.4 before 9.4.3-P3, 9.5 before 9.5.1-P3, and 9.6 before 9.6.1-P1, when configured as a master server, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via an ANY record in the prerequisite section of a crafted dynamic update message, as exploited in the wild in July 2009.
	</description>
 </metadata>
<!-- 2e4a0b05deafffc560721af15910308a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053631" comment="bind-chrootenv less than 9.4.1.P1-12.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053632" comment="bind-devel-64bit less than 9.4.1.P1-12.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053633" comment="bind-devel less than 9.4.1.P1-12.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053634" comment="bind-doc less than 9.4.1.P1-12.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053635" comment="bind-libs-32bit less than 9.4.1.P1-12.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053636" comment="bind-libs-64bit less than 9.4.1.P1-12.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053637" comment="bind-libs less than 9.4.1.P1-12.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053638" comment="bind-utils less than 9.4.1.P1-12.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053639" comment="bind less than 9.4.1.P1-12.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0698</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0698" source="CVE"/>
	<description>
	Integer overflow in the 4xm demuxer (demuxers/demux_4xm.c) in xine-lib 1.1.16.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a 4X movie file with a large current_track value, a similar issue to CVE-2009-0385.
	</description>
 </metadata>
<!-- 4a0eddf0b27bf627bb916187feb6dc77 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036515" comment="xine-devel less than 1.1.8-14.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036516" comment="xine-extra less than 1.1.8-14.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036517" comment="xine-lib-32bit less than 1.1.8-14.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036518" comment="xine-lib-64bit less than 1.1.8-14.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036519" comment="xine-lib less than 1.1.8-14.14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0723</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0723" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0723" source="CVE"/>
	<description>
	Multiple integer overflows in LittleCMS (aka lcms or liblcms) before 1.18beta2, as used in Firefox 3.1beta, OpenJDK, and GIMP, allow context-dependent attackers to execute arbitrary code via a crafted image file that triggers a heap-based buffer overflow.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- e0afe0dc5c698ef57fd58c7d08a1afca -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036461" comment="liblcms-32bit less than 1.16-39.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036462" comment="liblcms-64bit less than 1.16-39.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036463" comment="liblcms-devel-32bit less than 1.16-39.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036464" comment="liblcms-devel-64bit less than 1.16-39.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036465" comment="liblcms-devel less than 1.16-39.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036466" comment="liblcms less than 1.16-39.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0733</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0733" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0733" source="CVE"/>
	<description>
	Multiple stack-based buffer overflows in the ReadSetOfCurves function in LittleCMS (aka lcms or liblcms) before 1.18beta2, as used in Firefox 3.1beta, OpenJDK, and GIMP, allow context-dependent attackers to execute arbitrary code via a crafted image file associated with a large integer value for the (1) input or (2) output channel, related to the ReadLUT_A2B and ReadLUT_B2A functions.
	</description>
 </metadata>
<!-- e0afe0dc5c698ef57fd58c7d08a1afca -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036461" comment="liblcms-32bit less than 1.16-39.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036462" comment="liblcms-64bit less than 1.16-39.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036463" comment="liblcms-devel-32bit less than 1.16-39.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036464" comment="liblcms-devel-64bit less than 1.16-39.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036465" comment="liblcms-devel less than 1.16-39.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036466" comment="liblcms less than 1.16-39.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0749</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0749" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0749" source="CVE"/>
	<description>
	Use-after-free vulnerability in the GIFReadNextExtension function in lib/pngxtern/gif/gifread.c in OptiPNG 0.6.2 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a crafted GIF image that causes the realloc function to return a new pointer, which triggers memory corruption when the old pointer is accessed.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 635d66639c1196b74c1f3732a73929e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036520" comment="optipng less than 0.6.2-2.3"/>
	</criteria>
	<!-- a5c0a2df14cab64172e080cf34313719 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036068" comment="optipng less than 0.6.2-2.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0754</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0754" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0754" source="CVE"/>
	<description>
	PHP 4.4.4, 5.1.6, and other versions, when running on Apache, allows local users to modify behavior of other sites hosted on the same web server by modifying the mbstring.func_overload setting within .htaccess, which causes this setting to be applied to other virtual hosts on the same server.
	</description>
 </metadata>
<!-- 3291c2ef45434af34802ca073998445d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036143" comment="apache2-mod_php5 less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036144" comment="php5-bcmath less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036145" comment="php5-bz2 less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036146" comment="php5-calendar less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036147" comment="php5-ctype less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036148" comment="php5-curl less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036149" comment="php5-dba less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036150" comment="php5-dbase less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036151" comment="php5-devel less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036152" comment="php5-dom less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036153" comment="php5-exif less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036154" comment="php5-fastcgi less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036155" comment="php5-ftp less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036156" comment="php5-gd less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036157" comment="php5-gettext less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036158" comment="php5-gmp less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036159" comment="php5-hash less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036160" comment="php5-iconv less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036161" comment="php5-imap less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036162" comment="php5-json less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036163" comment="php5-ldap less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036164" comment="php5-mbstring less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036165" comment="php5-mcrypt less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036166" comment="php5-mhash less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036167" comment="php5-mysql less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036168" comment="php5-ncurses less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036169" comment="php5-odbc less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036170" comment="php5-openssl less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036171" comment="php5-pcntl less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036172" comment="php5-pdo less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036173" comment="php5-pear less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036174" comment="php5-pgsql less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036175" comment="php5-posix less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036176" comment="php5-pspell less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036177" comment="php5-readline less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036178" comment="php5-shmop less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036179" comment="php5-snmp less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036180" comment="php5-soap less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036181" comment="php5-sockets less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036182" comment="php5-sqlite less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036183" comment="php5-suhosin less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036184" comment="php5-sysvmsg less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036185" comment="php5-sysvsem less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036186" comment="php5-sysvshm less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036187" comment="php5-tidy less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036188" comment="php5-tokenizer less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036189" comment="php5-wddx less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036190" comment="php5-xmlreader less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036191" comment="php5-xmlrpc less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036192" comment="php5-xmlwriter less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036193" comment="php5-xsl less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036194" comment="php5-zip less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036195" comment="php5-zlib less than 5.2.9-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0755</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0755" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0755" source="CVE"/>
	<description>
	The FormWidgetChoice::loadDefaults function in Poppler before 0.10.4 allows remote attackers to cause a denial of service (crash) via a PDF file with an invalid Form Opt entry.
	</description>
 </metadata>
<!-- 314eb7d2c76d9970da1d2e6e807a4e6b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036344" comment="poppler-devel less than 0.5.4-101.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036345" comment="poppler-doc less than 0.5.4-101.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036346" comment="poppler-glib less than 0.5.4-101.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036347" comment="poppler-qt4 less than 0.5.4-101.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036348" comment="poppler-qt less than 0.5.4-101.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036349" comment="poppler-tools less than 0.5.4-101.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036350" comment="poppler less than 0.5.4-101.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0756</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0756" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0756" source="CVE"/>
	<description>
	The JBIG2Stream::readSymbolDictSeg function in Poppler before 0.10.4 allows remote attackers to cause a denial of service (crash) via a PDF file that triggers a parsing error, which is not properly handled by JBIG2SymbolDict::~JBIG2SymbolDict and triggers an invalid memory dereference.
	</description>
 </metadata>
<!-- 314eb7d2c76d9970da1d2e6e807a4e6b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036344" comment="poppler-devel less than 0.5.4-101.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036345" comment="poppler-doc less than 0.5.4-101.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036346" comment="poppler-glib less than 0.5.4-101.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036347" comment="poppler-qt4 less than 0.5.4-101.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036348" comment="poppler-qt less than 0.5.4-101.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036349" comment="poppler-tools less than 0.5.4-101.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036350" comment="poppler less than 0.5.4-101.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0771</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0771" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0771" source="CVE"/>
	<description>
	The layout engine in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain vectors that trigger memory corruption and assertion failures.
	</description>
 </metadata>
<!-- cb58df3a93b69014571b008c271b64f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036329" comment="seamonkey-dom-inspector less than 1.1.16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036330" comment="seamonkey-irc less than 1.1.16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036331" comment="seamonkey-mail less than 1.1.16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036332" comment="seamonkey-spellchecker less than 1.1.16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036333" comment="seamonkey-venkman less than 1.1.16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036334" comment="seamonkey less than 1.1.16-1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0772</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0772" source="CVE"/>
	<description>
	The layout engine in Mozilla Firefox 2 and 3 before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to nsCSSStyleSheet::GetOwnerNode, events, and garbage collection, which triggers memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 468dcee6ae0a6b23da4670fc11618a60 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036327" comment="MozillaFirefox-translations less than 2.0.0.21post-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036328" comment="MozillaFirefox less than 2.0.0.21post-0.1"/>
		</criteria>
	</criteria>
	<!-- cb58df3a93b69014571b008c271b64f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036329" comment="seamonkey-dom-inspector less than 1.1.16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036330" comment="seamonkey-irc less than 1.1.16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036331" comment="seamonkey-mail less than 1.1.16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036332" comment="seamonkey-spellchecker less than 1.1.16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036333" comment="seamonkey-venkman less than 1.1.16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036334" comment="seamonkey less than 1.1.16-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0773</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0773" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0773" source="CVE"/>
	<description>
	The JavaScript engine in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) a splice of an array that contains "some non-set elements," which causes jsarray.cpp to pass an incorrect argument to the ResizeSlots function, which triggers memory corruption; (2) vectors related to js_DecompileValueGenerator, jsopcode.cpp, __defineSetter__, and watch, which triggers an assertion failure or a segmentation fault; and (3) vectors related to gczeal, __defineSetter__, and watch, which triggers a hang.
	</description>
 </metadata>
<!-- cb58df3a93b69014571b008c271b64f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036329" comment="seamonkey-dom-inspector less than 1.1.16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036330" comment="seamonkey-irc less than 1.1.16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036331" comment="seamonkey-mail less than 1.1.16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036332" comment="seamonkey-spellchecker less than 1.1.16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036333" comment="seamonkey-venkman less than 1.1.16-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036334" comment="seamonkey less than 1.1.16-1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0774</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0774" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0774" source="CVE"/>
	<description>
	The layout engine in Mozilla Firefox 2 and 3 before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to gczeal, a different vulnerability than CVE-2009-0773.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 468dcee6ae0a6b23da4670fc11618a60 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036327" comment="MozillaFirefox-translations less than 2.0.0.21post-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036328" comment="MozillaFirefox less than 2.0.0.21post-0.1"/>
		</criteria>
	</criteria>
	<!-- cb58df3a93b69014571b008c271b64f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036329" comment="seamonkey-dom-inspector less than 1.1.16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036330" comment="seamonkey-irc less than 1.1.16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036331" comment="seamonkey-mail less than 1.1.16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036332" comment="seamonkey-spellchecker less than 1.1.16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036333" comment="seamonkey-venkman less than 1.1.16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036334" comment="seamonkey less than 1.1.16-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0776</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0776" source="CVE"/>
	<description>
	nsIRDFService in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allows remote attackers to bypass the same-origin policy and read XML data from another domain via a cross-domain redirect.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 468dcee6ae0a6b23da4670fc11618a60 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036327" comment="MozillaFirefox-translations less than 2.0.0.21post-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036328" comment="MozillaFirefox less than 2.0.0.21post-0.1"/>
		</criteria>
	</criteria>
	<!-- cb58df3a93b69014571b008c271b64f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036329" comment="seamonkey-dom-inspector less than 1.1.16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036330" comment="seamonkey-irc less than 1.1.16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036331" comment="seamonkey-mail less than 1.1.16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036332" comment="seamonkey-spellchecker less than 1.1.16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036333" comment="seamonkey-venkman less than 1.1.16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036334" comment="seamonkey less than 1.1.16-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0781</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0781" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0781" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the calendar application in the examples web application in Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 allows remote attackers to inject arbitrary web script or HTML via the time parameter, related to "invalid HTML."
	</description>
 </metadata>
<!-- 5f950e1a740f8dca3f68bba7e306eb4a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053694" comment="tomcat55-admin-webapps less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053695" comment="tomcat55-common-lib less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053696" comment="tomcat55-jasper-javadoc less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053697" comment="tomcat55-jasper less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053698" comment="tomcat55-jsp-2_0-api-javadoc less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053699" comment="tomcat55-jsp-2_0-api less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053700" comment="tomcat55-server-lib less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053701" comment="tomcat55-servlet-2_4-api-javadoc less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053702" comment="tomcat55-servlet-2_4-api less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053703" comment="tomcat55-webapps less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053704" comment="tomcat55 less than 5.5.23-113.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0783</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0783" source="CVE"/>
	<description>
	Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.
	</description>
 </metadata>
<!-- 5f950e1a740f8dca3f68bba7e306eb4a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053694" comment="tomcat55-admin-webapps less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053695" comment="tomcat55-common-lib less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053696" comment="tomcat55-jasper-javadoc less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053697" comment="tomcat55-jasper less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053698" comment="tomcat55-jsp-2_0-api-javadoc less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053699" comment="tomcat55-jsp-2_0-api less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053700" comment="tomcat55-server-lib less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053701" comment="tomcat55-servlet-2_4-api-javadoc less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053702" comment="tomcat55-servlet-2_4-api less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053703" comment="tomcat55-webapps less than 5.5.23-113.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053704" comment="tomcat55 less than 5.5.23-113.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0789</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0789" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0789" source="CVE"/>
	<description>
	OpenSSL before 0.9.8k on WIN64 and certain other platforms does not properly handle a malformed ASN.1 structure, which allows remote attackers to cause a denial of service (invalid memory access and application crash) by placing this structure in the public key of a certificate, as demonstrated by an RSA public key.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2b23a077cfada6a58ffb10e898bcd615 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036481" comment="libopenssl-devel less than 0.9.8e-45.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036482" comment="libopenssl0_9_8-32bit less than 0.9.8e-45.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036483" comment="libopenssl0_9_8-64bit less than 0.9.8e-45.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036484" comment="libopenssl0_9_8 less than 0.9.8e-45.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036485" comment="openssl-certs less than 0.9.8e-45.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036486" comment="openssl-doc less than 0.9.8e-45.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036487" comment="openssl less than 0.9.8e-45.9"/>
		</criteria>
	</criteria>
	<!-- f29bc510f4ec67fd2f24fbc774fc3f2f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036488" comment="compat-openssl097g-32bit less than 0.9.7g-75.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036489" comment="compat-openssl097g-64bit less than 0.9.7g-75.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036490" comment="compat-openssl097g less than 0.9.7g-75.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0790</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0790" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0790" source="CVE"/>
	<description>
	The pluto IKE daemon in Openswan and Strongswan IPsec 2.6 before 2.6.21 and 2.4 before 2.4.14, and Strongswan 4.2 before 4.2.14 and 2.8 before 2.8.9, allows remote attackers to cause a denial of service (daemon crash and restart) via a crafted (1) R_U_THERE or (2) R_U_THERE_ACK Dead Peer Detection (DPD) IPsec IKE Notification message that triggers a NULL pointer dereference related to inconsistent ISAKMP state and the lack of a phase2 state association in DPD.
	</description>
 </metadata>
<!-- 8c70928a355b5eb7a1c7fc1b23a8a74e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036521" comment="openswan-doc less than 2.4.7-64.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036522" comment="openswan less than 2.4.7-64.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0791</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0791" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0791" source="CVE"/>
	<description>
	Multiple integer overflows in Xpdf 2.x and 3.x and Poppler 0.x, as used in the pdftops filter in CUPS 1.1.17, 1.1.22, and 1.3.7, GPdf, and kdegraphics KPDF, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file that triggers a heap-based buffer overflow, possibly related to (1) Decrypt.cxx, (2) FoFiTrueType.cxx, (3) gmem.c, (4) JBIG2Stream.cxx, and (5) PSOutputDev.cxx in pdftops/. NOTE: the JBIG2Stream.cxx vector may overlap CVE-2009-1179.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- aeed41f3d3f06978f8e11a1be3323a86 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036523" comment="cups-client less than 1.2.12-22.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036524" comment="cups-devel less than 1.2.12-22.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036525" comment="cups-libs-32bit less than 1.2.12-22.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036526" comment="cups-libs-64bit less than 1.2.12-22.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036527" comment="cups-libs less than 1.2.12-22.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036528" comment="cups less than 1.2.12-22.24"/>
		</criteria>
	</criteria>
	<!-- ef8f1bb6cdfacfb250de777405645e49 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054132" comment="xpdf-tools less than 3.02-19.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054133" comment="xpdf less than 3.02-19.10"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0792</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0792" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0792" source="CVE"/>
	<description>
	Multiple integer overflows in icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allow context-dependent attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly execute arbitrary code by using a device file for a translation request that operates on a crafted image file and targets a certain "native color space," related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images.  NOTE: this issue exists because of an incomplete fix for CVE-2009-0583.
	</description>
 </metadata>
<!-- fdc70560402b44cb7ce9829765211428 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034727" comment="ghostscript-fonts-other less than 8.15.4-3.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034728" comment="ghostscript-fonts-rus less than 8.15.4-3.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034729" comment="ghostscript-fonts-std less than 8.15.4-3.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034730" comment="ghostscript-ijs-devel less than 8.15.4-3.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034731" comment="ghostscript-library less than 8.15.4-3.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034732" comment="ghostscript-omni less than 8.15.4-3.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034733" comment="ghostscript-x11 less than 8.15.4-3.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034734" comment="libgimpprint-devel less than 4.2.7-178.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034735" comment="libgimpprint less than 4.2.7-178.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0799</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0799" source="CVE"/>
	<description>
	The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers an out-of-bounds read.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 314eb7d2c76d9970da1d2e6e807a4e6b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036344" comment="poppler-devel less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036345" comment="poppler-doc less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036346" comment="poppler-glib less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036347" comment="poppler-qt4 less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036348" comment="poppler-qt less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036349" comment="poppler-tools less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036350" comment="poppler less than 0.5.4-101.6"/>
		</criteria>
	</criteria>
	<!-- 804311da028672eacbbeec641420fa47 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036351" comment="kdegraphics3-3D less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036352" comment="kdegraphics3-devel less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036353" comment="kdegraphics3-extra less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036354" comment="kdegraphics3-fax less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036355" comment="kdegraphics3-imaging less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036356" comment="kdegraphics3-kamera less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036357" comment="kdegraphics3-pdf less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036358" comment="kdegraphics3-postscript less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036359" comment="kdegraphics3-scan less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036360" comment="kdegraphics3-tex less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036361" comment="kdegraphics3 less than 3.5.7-60.7"/>
		</criteria>
	</criteria>
	<!-- d6aae2a6659ba7f7c8504daf6e33cedc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036362" comment="xpdf-tools less than 3.02-19.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036363" comment="xpdf less than 3.02-19.8"/>
		</criteria>
	</criteria>
	<!-- f184201908e91477cabdc65eec900094 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036364" comment="cups-client less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036365" comment="cups-devel less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036366" comment="cups-libs-32bit less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036367" comment="cups-libs-64bit less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036368" comment="cups-libs less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036369" comment="cups less than 1.2.12-22.21"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0800</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0800" source="CVE"/>
	<description>
	Multiple "input validation flaws" in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allow remote attackers to execute arbitrary code via a crafted PDF file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 314eb7d2c76d9970da1d2e6e807a4e6b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036344" comment="poppler-devel less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036345" comment="poppler-doc less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036346" comment="poppler-glib less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036347" comment="poppler-qt4 less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036348" comment="poppler-qt less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036349" comment="poppler-tools less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036350" comment="poppler less than 0.5.4-101.6"/>
		</criteria>
	</criteria>
	<!-- 804311da028672eacbbeec641420fa47 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036351" comment="kdegraphics3-3D less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036352" comment="kdegraphics3-devel less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036353" comment="kdegraphics3-extra less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036354" comment="kdegraphics3-fax less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036355" comment="kdegraphics3-imaging less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036356" comment="kdegraphics3-kamera less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036357" comment="kdegraphics3-pdf less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036358" comment="kdegraphics3-postscript less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036359" comment="kdegraphics3-scan less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036360" comment="kdegraphics3-tex less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036361" comment="kdegraphics3 less than 3.5.7-60.7"/>
		</criteria>
	</criteria>
	<!-- d6aae2a6659ba7f7c8504daf6e33cedc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036362" comment="xpdf-tools less than 3.02-19.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036363" comment="xpdf less than 3.02-19.8"/>
		</criteria>
	</criteria>
	<!-- f184201908e91477cabdc65eec900094 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036364" comment="cups-client less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036365" comment="cups-devel less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036366" comment="cups-libs-32bit less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036367" comment="cups-libs-64bit less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036368" comment="cups-libs less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036369" comment="cups less than 1.2.12-22.21"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0834</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0834" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0834" source="CVE"/>
	<description>
	The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.
	</description>
 </metadata>
<!-- b36aaab84a5618e58a83fd28deda41c5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035966" comment="kernel-bigsmp less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035967" comment="kernel-debug less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035968" comment="kernel-default less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035969" comment="kernel-kdump less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035970" comment="kernel-ppc64 less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035971" comment="kernel-source less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035972" comment="kernel-syms less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035973" comment="kernel-xen less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035974" comment="kernel-xenpae less than 2.6.22.19-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0835</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0835" source="CVE"/>
	<description>
	The __secure_computing function in kernel/seccomp.c in the seccomp subsystem in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform, when CONFIG_SECCOMP is enabled, does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass intended access restrictions via crafted syscalls that are misinterpreted as (a) stat or (b) chmod, a related issue to CVE-2009-0342 and CVE-2009-0343.
	</description>
 </metadata>
<!-- b36aaab84a5618e58a83fd28deda41c5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035966" comment="kernel-bigsmp less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035967" comment="kernel-debug less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035968" comment="kernel-default less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035969" comment="kernel-kdump less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035970" comment="kernel-ppc64 less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035971" comment="kernel-source less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035972" comment="kernel-syms less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035973" comment="kernel-xen less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035974" comment="kernel-xenpae less than 2.6.22.19-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0844</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0844" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0844" source="CVE"/>
	<description>
	The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to cause a denial of service (daemon crash) and possibly obtain sensitive information via a crafted length value that triggers a buffer over-read.
	</description>
 </metadata>
<!-- 0801012c98f8f6f5a600aff42a181053 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036529" comment="krb5-32bit less than 1.6.2-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036530" comment="krb5-64bit less than 1.6.2-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036531" comment="krb5-apps-clients less than 1.6.2-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036532" comment="krb5-apps-servers less than 1.6.2-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036533" comment="krb5-client less than 1.6.2-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036534" comment="krb5-devel-32bit less than 1.6.2-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036535" comment="krb5-devel-64bit less than 1.6.2-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036536" comment="krb5-devel less than 1.6.2-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036537" comment="krb5-server less than 1.6.2-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036538" comment="krb5 less than 1.6.2-22.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0845</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0845" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0845" source="CVE"/>
	<description>
	The spnego_gss_accept_sec_context function in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3, when SPNEGO is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via invalid ContextFlags data in the reqFlags field in a negTokenInit token.
	</description>
 </metadata>
<!-- 0801012c98f8f6f5a600aff42a181053 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036529" comment="krb5-32bit less than 1.6.2-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036530" comment="krb5-64bit less than 1.6.2-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036531" comment="krb5-apps-clients less than 1.6.2-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036532" comment="krb5-apps-servers less than 1.6.2-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036533" comment="krb5-client less than 1.6.2-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036534" comment="krb5-devel-32bit less than 1.6.2-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036535" comment="krb5-devel-64bit less than 1.6.2-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036536" comment="krb5-devel less than 1.6.2-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036537" comment="krb5-server less than 1.6.2-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036538" comment="krb5 less than 1.6.2-22.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0846</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0846" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0846" source="CVE"/>
	<description>
	The asn1_decode_generaltime function in lib/krb5/asn.1/asn1_decode.c in the ASN.1 GeneralizedTime decoder in MIT Kerberos 5 (aka krb5) before 1.6.4 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via vectors involving an invalid DER encoding that triggers a free of an uninitialized pointer.
	</description>
 </metadata>
<!-- 0801012c98f8f6f5a600aff42a181053 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036529" comment="krb5-32bit less than 1.6.2-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036530" comment="krb5-64bit less than 1.6.2-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036531" comment="krb5-apps-clients less than 1.6.2-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036532" comment="krb5-apps-servers less than 1.6.2-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036533" comment="krb5-client less than 1.6.2-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036534" comment="krb5-devel-32bit less than 1.6.2-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036535" comment="krb5-devel-64bit less than 1.6.2-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036536" comment="krb5-devel less than 1.6.2-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036537" comment="krb5-server less than 1.6.2-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036538" comment="krb5 less than 1.6.2-22.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0847</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0847" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0847" source="CVE"/>
	<description>
	The asn1buf_imbed function in the ASN.1 decoder in MIT Kerberos 5 (aka krb5) 1.6.3, when PK-INIT is used, allows remote attackers to cause a denial of service (application crash) via a crafted length value that triggers an erroneous malloc call, related to incorrect calculations with pointer arithmetic.
	</description>
 </metadata>
<!-- 0801012c98f8f6f5a600aff42a181053 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036529" comment="krb5-32bit less than 1.6.2-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036530" comment="krb5-64bit less than 1.6.2-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036531" comment="krb5-apps-clients less than 1.6.2-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036532" comment="krb5-apps-servers less than 1.6.2-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036533" comment="krb5-client less than 1.6.2-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036534" comment="krb5-devel-32bit less than 1.6.2-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036535" comment="krb5-devel-64bit less than 1.6.2-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036536" comment="krb5-devel less than 1.6.2-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036537" comment="krb5-server less than 1.6.2-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036538" comment="krb5 less than 1.6.2-22.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0859</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0859" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0859" source="CVE"/>
	<description>
	The shm_get_stat function in ipc/shm.c in the shm subsystem in the Linux kernel before 2.6.28.5, when CONFIG_SHMEM is disabled, misinterprets the data type of an inode, which allows local users to cause a denial of service (system hang) via an SHM_INFO shmctl call, as demonstrated by running the ipcs program.
	</description>
 </metadata>
<!-- b36aaab84a5618e58a83fd28deda41c5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035966" comment="kernel-bigsmp less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035967" comment="kernel-debug less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035968" comment="kernel-default less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035969" comment="kernel-kdump less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035970" comment="kernel-ppc64 less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035971" comment="kernel-source less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035972" comment="kernel-syms less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035973" comment="kernel-xen less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035974" comment="kernel-xenpae less than 2.6.22.19-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0901</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0901" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0901" source="CVE"/>
	<description>
	The Active Template Library (ATL) in Microsoft Visual Studio .NET 2003 SP1, Visual Studio 2005 SP1 and 2008 Gold, and Visual C++ 2005 SP1 and 2008 Gold and SP1; and Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2; does not prevent VariantClear calls on an uninitialized VARIANT, which allows remote attackers to execute arbitrary code via a malformed stream to an ATL (1) component or (2) control, related to ATL headers and error handling, aka "ATL Uninitialized Object Vulnerability."
	</description>
 </metadata>
<!-- 90d1e006eeffa0e68e97d94151105e3b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053690" comment="flash-player less than 9.0.246.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0914</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0914" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0914" source="CVE"/>
	<description>
	Opera before 9.64 allows remote attackers to execute arbitrary code via a crafted JPEG image that triggers memory corruption.
	</description>
 </metadata>
<!-- 2cfd6322b172b34f75ad0338475356b1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036539" comment="opera less than 9.64-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0915</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0915" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0915" source="CVE"/>
	<description>
	Opera before 9.64 allows remote attackers to conduct cross-domain scripting attacks via unspecified vectors related to plug-ins.
	</description>
 </metadata>
<!-- 2cfd6322b172b34f75ad0338475356b1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036539" comment="opera less than 9.64-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0916</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0916" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0916" source="CVE"/>
	<description>
	Unspecified vulnerability in Opera before 9.64 has unknown impact and attack vectors, related to a "moderately severe issue."
	</description>
 </metadata>
<!-- 2cfd6322b172b34f75ad0338475356b1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036539" comment="opera less than 9.64-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0922</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0922" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0922" source="CVE"/>
	<description>
	PostgreSQL before 8.3.7, 8.2.13, 8.1.17, 8.0.21, and 7.4.25 allows remote authenticated users to cause a denial of service (stack consumption and crash) by triggering a failure in the conversion of a localized error message to a client-specified encoding, as demonstrated using mismatched encoding conversion requests.
	</description>
 </metadata>
<!-- bb91595b014b5bcfc445a9c2e8828b36 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036540" comment="postgresql-contrib less than 8.2.13-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036541" comment="postgresql-devel less than 8.2.13-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036542" comment="postgresql-docs less than 8.2.13-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036543" comment="postgresql-libs-32bit less than 8.2.13-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036544" comment="postgresql-libs-64bit less than 8.2.13-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036545" comment="postgresql-libs less than 8.2.13-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036546" comment="postgresql-server less than 8.2.13-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036547" comment="postgresql less than 8.2.13-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0927</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0927" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0927" source="CVE"/>
	<description>
	Stack-based buffer overflow in Adobe Reader and Adobe Acrobat 9 before 9.1, 8 before 8.1.3 , and 7 before 7.1.1 allows remote attackers to execute arbitrary code via a crafted argument to the getIcon method of a Collab object, a different vulnerability than CVE-2009-0658.
	</description>
 </metadata>
<!-- 03e82aa4432227738e571f5f8f20efc5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036378" comment="acroread less than 8.1.4-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0928</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0928" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0928" source="CVE"/>
	<description>
	Heap-based buffer overflow in Adobe Acrobat Reader and Acrobat Professional 7.1.0, 8.1.3, 9.0.0, and other versions allows remote attackers to execute arbitrary code via a PDF file containing a JBIG2 stream with a size inconsistency related to an unspecified table.
	</description>
 </metadata>
<!-- 03e82aa4432227738e571f5f8f20efc5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036378" comment="acroread less than 8.1.4-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0930</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0930" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0930" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in Horde IMP before 4.2.2 and 4.3.3 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors to (1) smime.php, (2) pgp.php, and (3) message.php.
	</description>
 </metadata>
<!-- 19fab159e700065821eee8a4856b8565 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034623" comment="imp less than 4.1.6-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0932</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0932" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0932" source="CVE"/>
	<description>
	Directory traversal vulnerability in framework/Image/Image.php in Horde before 3.2.4 and 3.3.3 and Horde Groupware before 1.1.5 allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the Horde_Image driver name.
	</description>
 </metadata>
<!-- 4fd493f7705e77f572e843bea0269e78 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036285" comment="horde less than 3.1.9-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0946</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0946" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0946" source="CVE"/>
	<description>
	Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c.
	</description>
 </metadata>
<!-- 62fc892a3c02e4cea5408b01ce596eee -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036548" comment="freetype2-32bit less than 2.3.5-18.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036549" comment="freetype2-64bit less than 2.3.5-18.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036550" comment="freetype2-devel-32bit less than 2.3.5-18.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036551" comment="freetype2-devel-64bit less than 2.3.5-18.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036552" comment="freetype2-devel less than 2.3.5-18.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036553" comment="freetype2 less than 2.3.5-18.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0949</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0949" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0949" source="CVE"/>
	<description>
	The ippReadIO function in cups/ipp.c in cupsd in CUPS before 1.3.10 does not properly initialize memory for IPP request packets, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a scheduler request with two consecutive IPP_TAG_UNSUPPORTED tags.
	</description>
 </metadata>
<!-- aeed41f3d3f06978f8e11a1be3323a86 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036523" comment="cups-client less than 1.2.12-22.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036524" comment="cups-devel less than 1.2.12-22.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036525" comment="cups-libs-32bit less than 1.2.12-22.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036526" comment="cups-libs-64bit less than 1.2.12-22.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036527" comment="cups-libs less than 1.2.12-22.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036528" comment="cups less than 1.2.12-22.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1061</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1061" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1061" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Acrobat Reader 9 before 9.1, 8 before 8.1.4, and 7 before 7.1.1 might allow remote attackers to execute arbitrary code via unknown attack vectors related to JBIG2 and "input validation," a different vulnerability than CVE-2009-0193 and CVE-2009-1062.
	</description>
 </metadata>
<!-- 03e82aa4432227738e571f5f8f20efc5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036378" comment="acroread less than 8.1.4-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1062</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1062" source="CVE"/>
	<description>
	Adobe Acrobat Reader 9 before 9.1, 8 before 8.1.4, and 7 before 7.1.1 might allow remote attackers to trigger memory corruption and possibly execute arbitrary code via unknown attack vectors related to JBIG2, a different vulnerability than CVE-2009-0193 and CVE-2009-1061.
	</description>
 </metadata>
<!-- 03e82aa4432227738e571f5f8f20efc5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036378" comment="acroread less than 8.1.4-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1072</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1072" source="CVE"/>
	<description>
	nfsd in the Linux kernel before 2.6.28.9 does not drop the CAP_MKNOD capability before handling a user request in a thread, which allows local users to create device nodes, as demonstrated on a filesystem that has been exported with the root_squash option.
	</description>
 </metadata>
<!-- b36aaab84a5618e58a83fd28deda41c5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035966" comment="kernel-bigsmp less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035967" comment="kernel-debug less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035968" comment="kernel-default less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035969" comment="kernel-kdump less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035970" comment="kernel-ppc64 less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035971" comment="kernel-source less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035972" comment="kernel-syms less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035973" comment="kernel-xen less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035974" comment="kernel-xenpae less than 2.6.22.19-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1093</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1093" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1093" source="CVE"/>
	<description>
	LdapCtx in the LDAP service in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; SDK and JRE 1.3.1_24 and earlier; and 1.4.2_19 and earlier does not close the connection when initialization fails, which allows remote attackers to cause a denial of service (LDAP service hang).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 271a01c312faa95c39337c065d2bb15b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036554" comment="java-1_5_0-sun-alsa less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036555" comment="java-1_5_0-sun-demo less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036556" comment="java-1_5_0-sun-devel less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036557" comment="java-1_5_0-sun-jdbc less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036558" comment="java-1_5_0-sun-plugin less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036559" comment="java-1_5_0-sun-src less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036560" comment="java-1_5_0-sun less than 1.5.0_update18-0.1"/>
		</criteria>
	</criteria>
	<!-- b1f7e8b684c510cd82f25b68ed9b4233 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036561" comment="java-1_6_0-sun-alsa less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036562" comment="java-1_6_0-sun-demo less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036563" comment="java-1_6_0-sun-devel less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036564" comment="java-1_6_0-sun-jdbc less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036565" comment="java-1_6_0-sun-plugin less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036566" comment="java-1_6_0-sun-src less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036567" comment="java-1_6_0-sun less than 1.6.0.u12-1.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1094</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1094" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1094" source="CVE"/>
	<description>
	Unspecified vulnerability in the LDAP implementation in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; SDK and JRE 1.3.1_24 and earlier; and 1.4.2_19 and earlier allows remote LDAP servers to execute arbitrary code via unknown vectors related to serialized data.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 271a01c312faa95c39337c065d2bb15b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036554" comment="java-1_5_0-sun-alsa less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036555" comment="java-1_5_0-sun-demo less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036556" comment="java-1_5_0-sun-devel less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036557" comment="java-1_5_0-sun-jdbc less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036558" comment="java-1_5_0-sun-plugin less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036559" comment="java-1_5_0-sun-src less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036560" comment="java-1_5_0-sun less than 1.5.0_update18-0.1"/>
		</criteria>
	</criteria>
	<!-- b1f7e8b684c510cd82f25b68ed9b4233 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036561" comment="java-1_6_0-sun-alsa less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036562" comment="java-1_6_0-sun-demo less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036563" comment="java-1_6_0-sun-devel less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036564" comment="java-1_6_0-sun-jdbc less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036565" comment="java-1_6_0-sun-plugin less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036566" comment="java-1_6_0-sun-src less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036567" comment="java-1_6_0-sun less than 1.6.0.u12-1.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1095</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1095" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1095" source="CVE"/>
	<description>
	Integer overflow in unpack200 in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via a JAR file with crafted Pack200 headers.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 271a01c312faa95c39337c065d2bb15b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036554" comment="java-1_5_0-sun-alsa less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036555" comment="java-1_5_0-sun-demo less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036556" comment="java-1_5_0-sun-devel less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036557" comment="java-1_5_0-sun-jdbc less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036558" comment="java-1_5_0-sun-plugin less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036559" comment="java-1_5_0-sun-src less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036560" comment="java-1_5_0-sun less than 1.5.0_update18-0.1"/>
		</criteria>
	</criteria>
	<!-- b1f7e8b684c510cd82f25b68ed9b4233 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036561" comment="java-1_6_0-sun-alsa less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036562" comment="java-1_6_0-sun-demo less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036563" comment="java-1_6_0-sun-devel less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036564" comment="java-1_6_0-sun-jdbc less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036565" comment="java-1_6_0-sun-plugin less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036566" comment="java-1_6_0-sun-src less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036567" comment="java-1_6_0-sun less than 1.6.0.u12-1.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1096</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1096" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1096" source="CVE"/>
	<description>
	Buffer overflow in unpack200 in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via a JAR file with crafted Pack200 headers.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 271a01c312faa95c39337c065d2bb15b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036554" comment="java-1_5_0-sun-alsa less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036555" comment="java-1_5_0-sun-demo less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036556" comment="java-1_5_0-sun-devel less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036557" comment="java-1_5_0-sun-jdbc less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036558" comment="java-1_5_0-sun-plugin less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036559" comment="java-1_5_0-sun-src less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036560" comment="java-1_5_0-sun less than 1.5.0_update18-0.1"/>
		</criteria>
	</criteria>
	<!-- b1f7e8b684c510cd82f25b68ed9b4233 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036561" comment="java-1_6_0-sun-alsa less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036562" comment="java-1_6_0-sun-demo less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036563" comment="java-1_6_0-sun-devel less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036564" comment="java-1_6_0-sun-jdbc less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036565" comment="java-1_6_0-sun-plugin less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036566" comment="java-1_6_0-sun-src less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036567" comment="java-1_6_0-sun less than 1.6.0.u12-1.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1097</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1097" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1097" source="CVE"/>
	<description>
	Multiple buffer overflows in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier allow remote attackers to access files or execute arbitrary code via (1) a crafted PNG image that triggers an integer overflow during memory allocation for display on the splash screen, aka CR 6804996; and (2) a crafted GIF image from which unspecified values are used in calculation of offsets, leading to object-pointer corruption, aka CR 6804997.
	</description>
 </metadata>
<!-- b1f7e8b684c510cd82f25b68ed9b4233 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036561" comment="java-1_6_0-sun-alsa less than 1.6.0.u12-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036562" comment="java-1_6_0-sun-demo less than 1.6.0.u12-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036563" comment="java-1_6_0-sun-devel less than 1.6.0.u12-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036564" comment="java-1_6_0-sun-jdbc less than 1.6.0.u12-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036565" comment="java-1_6_0-sun-plugin less than 1.6.0.u12-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036566" comment="java-1_6_0-sun-src less than 1.6.0.u12-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036567" comment="java-1_6_0-sun less than 1.6.0.u12-1.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1098</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1098" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1098" source="CVE"/>
	<description>
	Buffer overflow in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; 1.4.2_19 and earlier; and 1.3.1_24 and earlier allows remote attackers to access files or execute arbitrary code via a crafted GIF image, aka CR 6804998.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 271a01c312faa95c39337c065d2bb15b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036554" comment="java-1_5_0-sun-alsa less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036555" comment="java-1_5_0-sun-demo less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036556" comment="java-1_5_0-sun-devel less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036557" comment="java-1_5_0-sun-jdbc less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036558" comment="java-1_5_0-sun-plugin less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036559" comment="java-1_5_0-sun-src less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036560" comment="java-1_5_0-sun less than 1.5.0_update18-0.1"/>
		</criteria>
	</criteria>
	<!-- b1f7e8b684c510cd82f25b68ed9b4233 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036561" comment="java-1_6_0-sun-alsa less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036562" comment="java-1_6_0-sun-demo less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036563" comment="java-1_6_0-sun-devel less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036564" comment="java-1_6_0-sun-jdbc less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036565" comment="java-1_6_0-sun-plugin less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036566" comment="java-1_6_0-sun-src less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036567" comment="java-1_6_0-sun less than 1.6.0.u12-1.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1099</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1099" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1099" source="CVE"/>
	<description>
	Integer signedness error in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via crafted glyph descriptions in a Type1 font, which bypasses a signed comparison and triggers a buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 271a01c312faa95c39337c065d2bb15b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036554" comment="java-1_5_0-sun-alsa less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036555" comment="java-1_5_0-sun-demo less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036556" comment="java-1_5_0-sun-devel less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036557" comment="java-1_5_0-sun-jdbc less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036558" comment="java-1_5_0-sun-plugin less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036559" comment="java-1_5_0-sun-src less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036560" comment="java-1_5_0-sun less than 1.5.0_update18-0.1"/>
		</criteria>
	</criteria>
	<!-- b1f7e8b684c510cd82f25b68ed9b4233 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036561" comment="java-1_6_0-sun-alsa less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036562" comment="java-1_6_0-sun-demo less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036563" comment="java-1_6_0-sun-devel less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036564" comment="java-1_6_0-sun-jdbc less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036565" comment="java-1_6_0-sun-plugin less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036566" comment="java-1_6_0-sun-src less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036567" comment="java-1_6_0-sun less than 1.6.0.u12-1.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1100</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1100" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1100" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allow remote attackers to cause a denial of service (disk consumption) via vectors related to temporary font files and (1) "limits on Font creation," aka CR 6522586, and (2) another unspecified vector, aka CR 6632886.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 271a01c312faa95c39337c065d2bb15b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036554" comment="java-1_5_0-sun-alsa less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036555" comment="java-1_5_0-sun-demo less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036556" comment="java-1_5_0-sun-devel less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036557" comment="java-1_5_0-sun-jdbc less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036558" comment="java-1_5_0-sun-plugin less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036559" comment="java-1_5_0-sun-src less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036560" comment="java-1_5_0-sun less than 1.5.0_update18-0.1"/>
		</criteria>
	</criteria>
	<!-- b1f7e8b684c510cd82f25b68ed9b4233 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036561" comment="java-1_6_0-sun-alsa less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036562" comment="java-1_6_0-sun-demo less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036563" comment="java-1_6_0-sun-devel less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036564" comment="java-1_6_0-sun-jdbc less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036565" comment="java-1_6_0-sun-plugin less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036566" comment="java-1_6_0-sun-src less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036567" comment="java-1_6_0-sun less than 1.6.0.u12-1.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1101</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1101" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1101" source="CVE"/>
	<description>
	Unspecified vulnerability in the lightweight HTTP server implementation in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier allows remote attackers to cause a denial of service (probably resource consumption) for a JAX-WS service endpoint via a connection without any data, which triggers a file descriptor "leak."
	</description>
 </metadata>
<!-- b1f7e8b684c510cd82f25b68ed9b4233 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036561" comment="java-1_6_0-sun-alsa less than 1.6.0.u12-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036562" comment="java-1_6_0-sun-demo less than 1.6.0.u12-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036563" comment="java-1_6_0-sun-devel less than 1.6.0.u12-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036564" comment="java-1_6_0-sun-jdbc less than 1.6.0.u12-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036565" comment="java-1_6_0-sun-plugin less than 1.6.0.u12-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036566" comment="java-1_6_0-sun-src less than 1.6.0.u12-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036567" comment="java-1_6_0-sun less than 1.6.0.u12-1.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1102</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1102" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1102" source="CVE"/>
	<description>
	Unspecified vulnerability in the Virtual Machine in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier allows remote attackers to access files and execute arbitrary code via unknown vectors related to "code generation."
	</description>
 </metadata>
<!-- b1f7e8b684c510cd82f25b68ed9b4233 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036561" comment="java-1_6_0-sun-alsa less than 1.6.0.u12-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036562" comment="java-1_6_0-sun-demo less than 1.6.0.u12-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036563" comment="java-1_6_0-sun-devel less than 1.6.0.u12-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036564" comment="java-1_6_0-sun-jdbc less than 1.6.0.u12-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036565" comment="java-1_6_0-sun-plugin less than 1.6.0.u12-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036566" comment="java-1_6_0-sun-src less than 1.6.0.u12-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036567" comment="java-1_6_0-sun less than 1.6.0.u12-1.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1103</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1103" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1103" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; 1.4.2_19 and earlier; and 1.3.1_24 and earlier allows remote attackers to access files and execute arbitrary code via unknown vectors related to "deserializing applets," aka CR 6646860.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 271a01c312faa95c39337c065d2bb15b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036554" comment="java-1_5_0-sun-alsa less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036555" comment="java-1_5_0-sun-demo less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036556" comment="java-1_5_0-sun-devel less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036557" comment="java-1_5_0-sun-jdbc less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036558" comment="java-1_5_0-sun-plugin less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036559" comment="java-1_5_0-sun-src less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036560" comment="java-1_5_0-sun less than 1.5.0_update18-0.1"/>
		</criteria>
	</criteria>
	<!-- b1f7e8b684c510cd82f25b68ed9b4233 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036561" comment="java-1_6_0-sun-alsa less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036562" comment="java-1_6_0-sun-demo less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036563" comment="java-1_6_0-sun-devel less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036564" comment="java-1_6_0-sun-jdbc less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036565" comment="java-1_6_0-sun-plugin less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036566" comment="java-1_6_0-sun-src less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036567" comment="java-1_6_0-sun less than 1.6.0.u12-1.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1104</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1104" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1104" source="CVE"/>
	<description>
	The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; and 1.4.2_19 and earlier does not prevent Javascript that is loaded from the localhost from connecting to other ports on the system, which allows user-assisted attackers to bypass intended access restrictions via LiveConnect, aka CR 6724331.  NOTE: this vulnerability can be leveraged with separate cross-site scripting (XSS) vulnerabilities for remote attack vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 271a01c312faa95c39337c065d2bb15b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036554" comment="java-1_5_0-sun-alsa less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036555" comment="java-1_5_0-sun-demo less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036556" comment="java-1_5_0-sun-devel less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036557" comment="java-1_5_0-sun-jdbc less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036558" comment="java-1_5_0-sun-plugin less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036559" comment="java-1_5_0-sun-src less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036560" comment="java-1_5_0-sun less than 1.5.0_update18-0.1"/>
		</criteria>
	</criteria>
	<!-- b1f7e8b684c510cd82f25b68ed9b4233 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036561" comment="java-1_6_0-sun-alsa less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036562" comment="java-1_6_0-sun-demo less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036563" comment="java-1_6_0-sun-devel less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036564" comment="java-1_6_0-sun-jdbc less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036565" comment="java-1_6_0-sun-plugin less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036566" comment="java-1_6_0-sun-src less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036567" comment="java-1_6_0-sun less than 1.6.0.u12-1.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1105</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1105" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1105" source="CVE"/>
	<description>
	The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12, 11, and 10 allows user-assisted remote attackers to cause a trusted applet to run in an older JRE version, which can be used to exploit vulnerabilities in that older version, aka CR 6706490.
	</description>
 </metadata>
<!-- b1f7e8b684c510cd82f25b68ed9b4233 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036561" comment="java-1_6_0-sun-alsa less than 1.6.0.u12-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036562" comment="java-1_6_0-sun-demo less than 1.6.0.u12-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036563" comment="java-1_6_0-sun-devel less than 1.6.0.u12-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036564" comment="java-1_6_0-sun-jdbc less than 1.6.0.u12-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036565" comment="java-1_6_0-sun-plugin less than 1.6.0.u12-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036566" comment="java-1_6_0-sun-src less than 1.6.0.u12-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036567" comment="java-1_6_0-sun less than 1.6.0.u12-1.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1106</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1106" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1106" source="CVE"/>
	<description>
	The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12, 11, and 10 does not properly parse crossdomain.xml files, which allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unknown vectors, aka CR 6798948.
	</description>
 </metadata>
<!-- b1f7e8b684c510cd82f25b68ed9b4233 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036561" comment="java-1_6_0-sun-alsa less than 1.6.0.u12-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036562" comment="java-1_6_0-sun-demo less than 1.6.0.u12-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036563" comment="java-1_6_0-sun-devel less than 1.6.0.u12-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036564" comment="java-1_6_0-sun-jdbc less than 1.6.0.u12-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036565" comment="java-1_6_0-sun-plugin less than 1.6.0.u12-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036566" comment="java-1_6_0-sun-src less than 1.6.0.u12-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036567" comment="java-1_6_0-sun less than 1.6.0.u12-1.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1107</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1107" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1107" source="CVE"/>
	<description>
	The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier, and 5.0 Update 17 and earlier, allows remote attackers to trick a user into trusting a signed applet via unknown vectors that misrepresent the security warning dialog, related to a "Swing JLabel HTML parsing vulnerability," aka CR 6782871.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 271a01c312faa95c39337c065d2bb15b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036554" comment="java-1_5_0-sun-alsa less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036555" comment="java-1_5_0-sun-demo less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036556" comment="java-1_5_0-sun-devel less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036557" comment="java-1_5_0-sun-jdbc less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036558" comment="java-1_5_0-sun-plugin less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036559" comment="java-1_5_0-sun-src less than 1.5.0_update18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036560" comment="java-1_5_0-sun less than 1.5.0_update18-0.1"/>
		</criteria>
	</criteria>
	<!-- b1f7e8b684c510cd82f25b68ed9b4233 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036561" comment="java-1_6_0-sun-alsa less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036562" comment="java-1_6_0-sun-demo less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036563" comment="java-1_6_0-sun-devel less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036564" comment="java-1_6_0-sun-jdbc less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036565" comment="java-1_6_0-sun-plugin less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036566" comment="java-1_6_0-sun-src less than 1.6.0.u12-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036567" comment="java-1_6_0-sun less than 1.6.0.u12-1.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1148</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1148" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1148" source="CVE"/>
	<description>
	Directory traversal vulnerability in bs_disp_as_mime_type.php in the BLOB streaming feature in phpMyAdmin before 3.1.3.1 allows remote attackers to read arbitrary files via directory traversal sequences in the file_path parameter ($filename variable).
	</description>
 </metadata>
<!-- 7bfb1591b46511c2c1e1e9bbcc7ff625 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036568" comment="phpMyAdmin less than 2.11.9.5-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1149</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1149" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1149" source="CVE"/>
	<description>
	CRLF injection vulnerability in bs_disp_as_mime_type.php in the BLOB streaming feature in phpMyAdmin before 3.1.3.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the (1) c_type and possibly (2) file_type parameters.
	</description>
 </metadata>
<!-- 7bfb1591b46511c2c1e1e9bbcc7ff625 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036568" comment="phpMyAdmin less than 2.11.9.5-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1150</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1150" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1150" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in the export page (display_export.lib.php) in phpMyAdmin 2.11.x before 2.11.9.5 and 3.x before 3.1.3.1 allow remote attackers to inject arbitrary web script or HTML via the pma_db_filename_template cookie.
	</description>
 </metadata>
<!-- 7bfb1591b46511c2c1e1e9bbcc7ff625 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036568" comment="phpMyAdmin less than 2.11.9.5-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1151</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1151" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1151" source="CVE"/>
	<description>
	Static code injection vulnerability in setup.php in phpMyAdmin 2.11.x before 2.11.9.5 and 3.x before 3.1.3.1 allows remote attackers to inject arbitrary PHP code into a configuration file via the save action.
	</description>
 </metadata>
<!-- 7bfb1591b46511c2c1e1e9bbcc7ff625 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036568" comment="phpMyAdmin less than 2.11.9.5-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1169</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1169" source="CVE"/>
	<description>
	The txMozillaXSLTProcessor::TransformToDoc function in Mozilla Firefox before 3.0.8 and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XML file with a crafted XSLT transform.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 468dcee6ae0a6b23da4670fc11618a60 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036327" comment="MozillaFirefox-translations less than 2.0.0.21post-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036328" comment="MozillaFirefox less than 2.0.0.21post-0.1"/>
		</criteria>
	</criteria>
	<!-- cb58df3a93b69014571b008c271b64f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036329" comment="seamonkey-dom-inspector less than 1.1.16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036330" comment="seamonkey-irc less than 1.1.16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036331" comment="seamonkey-mail less than 1.1.16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036332" comment="seamonkey-spellchecker less than 1.1.16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036333" comment="seamonkey-venkman less than 1.1.16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036334" comment="seamonkey less than 1.1.16-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1171</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1171" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1171" source="CVE"/>
	<description>
	The TeX filter in Moodle 1.6 before 1.6.9+, 1.7 before 1.7.7+, 1.8 before 1.8.9, and 1.9 before 1.9.5 allows user-assisted attackers to read arbitrary files via an input command in a "$$" sequence, which causes LaTeX to include the contents of the file.
	</description>
 </metadata>
<!-- 4448ba0610a42bfa66aa701e40e695ef -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036569" comment="moodle-af less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036570" comment="moodle-ar less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036571" comment="moodle-be less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036572" comment="moodle-bg less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036573" comment="moodle-bs less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036574" comment="moodle-ca less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036575" comment="moodle-cs less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036576" comment="moodle-da less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036577" comment="moodle-de less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036578" comment="moodle-de_du less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036579" comment="moodle-el less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036580" comment="moodle-es less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036581" comment="moodle-et less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036582" comment="moodle-eu less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036583" comment="moodle-fa less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036584" comment="moodle-fi less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036585" comment="moodle-fr less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036586" comment="moodle-ga less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036587" comment="moodle-gl less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036588" comment="moodle-he less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036589" comment="moodle-hi less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036590" comment="moodle-hr less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036591" comment="moodle-hu less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036592" comment="moodle-id less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036593" comment="moodle-is less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036594" comment="moodle-it less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036595" comment="moodle-ja less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036596" comment="moodle-ka less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036597" comment="moodle-km less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036598" comment="moodle-kn less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036599" comment="moodle-ko less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036600" comment="moodle-lt less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036601" comment="moodle-lv less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036602" comment="moodle-mi_tn less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036603" comment="moodle-ms less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036604" comment="moodle-nl less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036605" comment="moodle-nn less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036606" comment="moodle-no less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036607" comment="moodle-pl less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036608" comment="moodle-pt less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036609" comment="moodle-ro less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036610" comment="moodle-ru less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036611" comment="moodle-sk less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036612" comment="moodle-sl less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036613" comment="moodle-so less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036614" comment="moodle-sq less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036615" comment="moodle-sr less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036616" comment="moodle-sv less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036617" comment="moodle-th less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036618" comment="moodle-tl less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036619" comment="moodle-tr less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036620" comment="moodle-uk less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036621" comment="moodle-vi less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036622" comment="moodle-zh_cn less than 1.8.2-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036623" comment="moodle less than 1.8.2-17.14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1179</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1179" source="CVE"/>
	<description>
	Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 314eb7d2c76d9970da1d2e6e807a4e6b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036344" comment="poppler-devel less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036345" comment="poppler-doc less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036346" comment="poppler-glib less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036347" comment="poppler-qt4 less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036348" comment="poppler-qt less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036349" comment="poppler-tools less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036350" comment="poppler less than 0.5.4-101.6"/>
		</criteria>
	</criteria>
	<!-- 804311da028672eacbbeec641420fa47 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036351" comment="kdegraphics3-3D less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036352" comment="kdegraphics3-devel less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036353" comment="kdegraphics3-extra less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036354" comment="kdegraphics3-fax less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036355" comment="kdegraphics3-imaging less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036356" comment="kdegraphics3-kamera less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036357" comment="kdegraphics3-pdf less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036358" comment="kdegraphics3-postscript less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036359" comment="kdegraphics3-scan less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036360" comment="kdegraphics3-tex less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036361" comment="kdegraphics3 less than 3.5.7-60.7"/>
		</criteria>
	</criteria>
	<!-- d6aae2a6659ba7f7c8504daf6e33cedc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036362" comment="xpdf-tools less than 3.02-19.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036363" comment="xpdf less than 3.02-19.8"/>
		</criteria>
	</criteria>
	<!-- f184201908e91477cabdc65eec900094 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036364" comment="cups-client less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036365" comment="cups-devel less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036366" comment="cups-libs-32bit less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036367" comment="cups-libs-64bit less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036368" comment="cups-libs less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036369" comment="cups less than 1.2.12-22.21"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1180</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1180" source="CVE"/>
	<description>
	The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file that triggers a free of invalid data.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 314eb7d2c76d9970da1d2e6e807a4e6b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036344" comment="poppler-devel less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036345" comment="poppler-doc less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036346" comment="poppler-glib less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036347" comment="poppler-qt4 less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036348" comment="poppler-qt less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036349" comment="poppler-tools less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036350" comment="poppler less than 0.5.4-101.6"/>
		</criteria>
	</criteria>
	<!-- 804311da028672eacbbeec641420fa47 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036351" comment="kdegraphics3-3D less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036352" comment="kdegraphics3-devel less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036353" comment="kdegraphics3-extra less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036354" comment="kdegraphics3-fax less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036355" comment="kdegraphics3-imaging less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036356" comment="kdegraphics3-kamera less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036357" comment="kdegraphics3-pdf less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036358" comment="kdegraphics3-postscript less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036359" comment="kdegraphics3-scan less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036360" comment="kdegraphics3-tex less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036361" comment="kdegraphics3 less than 3.5.7-60.7"/>
		</criteria>
	</criteria>
	<!-- d6aae2a6659ba7f7c8504daf6e33cedc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036362" comment="xpdf-tools less than 3.02-19.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036363" comment="xpdf less than 3.02-19.8"/>
		</criteria>
	</criteria>
	<!-- f184201908e91477cabdc65eec900094 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036364" comment="cups-client less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036365" comment="cups-devel less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036366" comment="cups-libs-32bit less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036367" comment="cups-libs-64bit less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036368" comment="cups-libs less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036369" comment="cups less than 1.2.12-22.21"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1181</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1181" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1181" source="CVE"/>
	<description>
	The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers a NULL pointer dereference.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 314eb7d2c76d9970da1d2e6e807a4e6b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036344" comment="poppler-devel less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036345" comment="poppler-doc less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036346" comment="poppler-glib less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036347" comment="poppler-qt4 less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036348" comment="poppler-qt less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036349" comment="poppler-tools less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036350" comment="poppler less than 0.5.4-101.6"/>
		</criteria>
	</criteria>
	<!-- 804311da028672eacbbeec641420fa47 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036351" comment="kdegraphics3-3D less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036352" comment="kdegraphics3-devel less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036353" comment="kdegraphics3-extra less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036354" comment="kdegraphics3-fax less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036355" comment="kdegraphics3-imaging less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036356" comment="kdegraphics3-kamera less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036357" comment="kdegraphics3-pdf less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036358" comment="kdegraphics3-postscript less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036359" comment="kdegraphics3-scan less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036360" comment="kdegraphics3-tex less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036361" comment="kdegraphics3 less than 3.5.7-60.7"/>
		</criteria>
	</criteria>
	<!-- d6aae2a6659ba7f7c8504daf6e33cedc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036362" comment="xpdf-tools less than 3.02-19.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036363" comment="xpdf less than 3.02-19.8"/>
		</criteria>
	</criteria>
	<!-- f184201908e91477cabdc65eec900094 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036364" comment="cups-client less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036365" comment="cups-devel less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036366" comment="cups-libs-32bit less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036367" comment="cups-libs-64bit less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036368" comment="cups-libs less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036369" comment="cups less than 1.2.12-22.21"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1182</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1182" source="CVE"/>
	<description>
	Multiple buffer overflows in the JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allow remote attackers to execute arbitrary code via a crafted PDF file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 314eb7d2c76d9970da1d2e6e807a4e6b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036344" comment="poppler-devel less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036345" comment="poppler-doc less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036346" comment="poppler-glib less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036347" comment="poppler-qt4 less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036348" comment="poppler-qt less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036349" comment="poppler-tools less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036350" comment="poppler less than 0.5.4-101.6"/>
		</criteria>
	</criteria>
	<!-- 804311da028672eacbbeec641420fa47 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036351" comment="kdegraphics3-3D less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036352" comment="kdegraphics3-devel less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036353" comment="kdegraphics3-extra less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036354" comment="kdegraphics3-fax less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036355" comment="kdegraphics3-imaging less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036356" comment="kdegraphics3-kamera less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036357" comment="kdegraphics3-pdf less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036358" comment="kdegraphics3-postscript less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036359" comment="kdegraphics3-scan less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036360" comment="kdegraphics3-tex less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036361" comment="kdegraphics3 less than 3.5.7-60.7"/>
		</criteria>
	</criteria>
	<!-- d6aae2a6659ba7f7c8504daf6e33cedc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036362" comment="xpdf-tools less than 3.02-19.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036363" comment="xpdf less than 3.02-19.8"/>
		</criteria>
	</criteria>
	<!-- f184201908e91477cabdc65eec900094 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036364" comment="cups-client less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036365" comment="cups-devel less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036366" comment="cups-libs-32bit less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036367" comment="cups-libs-64bit less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036368" comment="cups-libs less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036369" comment="cups less than 1.2.12-22.21"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1183</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1183" source="CVE"/>
	<description>
	The JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (infinite loop and hang) via a crafted PDF file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 314eb7d2c76d9970da1d2e6e807a4e6b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036344" comment="poppler-devel less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036345" comment="poppler-doc less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036346" comment="poppler-glib less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036347" comment="poppler-qt4 less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036348" comment="poppler-qt less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036349" comment="poppler-tools less than 0.5.4-101.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036350" comment="poppler less than 0.5.4-101.6"/>
		</criteria>
	</criteria>
	<!-- 804311da028672eacbbeec641420fa47 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036351" comment="kdegraphics3-3D less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036352" comment="kdegraphics3-devel less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036353" comment="kdegraphics3-extra less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036354" comment="kdegraphics3-fax less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036355" comment="kdegraphics3-imaging less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036356" comment="kdegraphics3-kamera less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036357" comment="kdegraphics3-pdf less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036358" comment="kdegraphics3-postscript less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036359" comment="kdegraphics3-scan less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036360" comment="kdegraphics3-tex less than 3.5.7-60.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036361" comment="kdegraphics3 less than 3.5.7-60.7"/>
		</criteria>
	</criteria>
	<!-- d6aae2a6659ba7f7c8504daf6e33cedc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036362" comment="xpdf-tools less than 3.02-19.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036363" comment="xpdf less than 3.02-19.8"/>
		</criteria>
	</criteria>
	<!-- f184201908e91477cabdc65eec900094 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036364" comment="cups-client less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036365" comment="cups-devel less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036366" comment="cups-libs-32bit less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036367" comment="cups-libs-64bit less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036368" comment="cups-libs less than 1.2.12-22.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036369" comment="cups less than 1.2.12-22.21"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1185</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1185" source="CVE"/>
	<description>
	udev before 1.4.1 does not verify whether a NETLINK message originates from kernel space, which allows local users to gain privileges by sending a NETLINK message from user space.
	</description>
 </metadata>
<!-- d740755926641b68adc21863744e2258 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036624" comment="libvolume_id-devel less than 114-19.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036625" comment="libvolume_id less than 114-19.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036626" comment="udev less than 114-19.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1194</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1194" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1194" source="CVE"/>
	<description>
	Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long document.location value in Firefox.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5a573a9051f013b865d54393922a35ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053601" comment="MozillaFirefox-translations less than 3.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053602" comment="MozillaFirefox less than 3.0.12-0.1"/>
		</criteria>
	</criteria>
	<!-- 6c371e128c76aa3610afd400e700e0ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053601" comment="MozillaFirefox-translations less than 3.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053602" comment="MozillaFirefox less than 3.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053603" comment="mozilla-xulrunner190-32bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053604" comment="mozilla-xulrunner190-64bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053605" comment="mozilla-xulrunner190-devel less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053606" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053607" comment="mozilla-xulrunner190-gnomevfs-64bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053608" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053609" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053610" comment="mozilla-xulrunner190-translations-64bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053611" comment="mozilla-xulrunner190-translations less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053612" comment="mozilla-xulrunner190 less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053615" comment="python-xpcom190 less than 1.9.0.12-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1195</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1195" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1195" source="CVE"/>
	<description>
	The Apache HTTP Server 2.2.11 and earlier 2.2 versions does not properly handle Options=IncludesNOEXEC in the AllowOverride directive, which allows local users to gain privileges by configuring (1) Options Includes, (2) Options +Includes, or (3) Options +IncludesNOEXEC in a .htaccess file, and then inserting an exec element in a .shtml file.
	</description>
 </metadata>
<!-- 0683ec2df667efa4b179f003d0da49d3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055719" comment="apache2-devel less than 2.2.4-70.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055720" comment="apache2-doc less than 2.2.4-70.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055721" comment="apache2-example-pages less than 2.2.4-70.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055722" comment="apache2-prefork less than 2.2.4-70.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055723" comment="apache2-utils less than 2.2.4-70.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055724" comment="apache2-worker less than 2.2.4-70.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055725" comment="apache2 less than 2.2.4-70.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1210</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1210" source="CVE"/>
	<description>
	Format string vulnerability in the PROFINET/DCP (PN-DCP) dissector in Wireshark 1.0.6 and earlier allows remote attackers to execute arbitrary code via a PN-DCP packet with format string specifiers in the station name.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- ef3e619e4955be6ea79c741d39c2e0c1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036627" comment="wireshark-devel less than 0.99.6-31.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036628" comment="wireshark less than 0.99.6-31.18"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1234</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1234" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1234" source="CVE"/>
	<description>
	Opera 9.64 allows remote attackers to cause a denial of service (application crash) via an XML document containing a long series of start-tags with no corresponding end-tags.  NOTE: it was later reported that 9.52 is also affected.
	</description>
 </metadata>
<!-- a897914e6fa37f606b823ac101036941 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054536" comment="opera less than 10.00-6.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1241</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1241" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1241" source="CVE"/>
	<description>
	Unspecified vulnerability in ClamAV before 0.95 allows remote attackers to bypass detection of malware via a modified RAR archive.
	</description>
 </metadata>
<!-- 948121c661973e0f48957c2eceb4541a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036295" comment="clamav-db less than 0.95-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036296" comment="clamav less than 0.95-0.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1252</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1252" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1252" source="CVE"/>
	<description>
	Stack-based buffer overflow in the crypto_recv function in ntp_crypto.c in ntpd in NTP before 4.2.4p7 and 4.2.5 before 4.2.5p74, when OpenSSL and autokey are enabled, allows remote attackers to execute arbitrary code via a crafted packet containing an extension field.
	</description>
 </metadata>
<!-- 9e0b235bbce45733bc5c57a1598dac4d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036370" comment="xntp-doc less than 4.2.4p3-25.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036371" comment="xntp less than 4.2.4p3-25.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1255</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1255" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1255" source="CVE"/>
	<description>
	The process_stat function in (1) Memcached before 1.2.8 and (2) MemcacheDB 1.2.0 discloses (a) the contents of /proc/self/maps in response to a stats maps command and (b) memory-allocation statistics in response to a stats malloc command, which allows remote attackers to obtain sensitive information such as the locations of memory regions, and defeat ASLR protection, by sending a command to the daemon's TCP port.
	</description>
 </metadata>
<!-- d817c4c810a64ac81c63c4303c942f8b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053770" comment="memcached less than 1.2.2-11.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1265</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1265" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1265" source="CVE"/>
	<description>
	Integer overflow in rose_sendmsg (sys/net/af_rose.c) in the Linux kernel 2.6.24.4, and other versions before 2.6.30-rc1, might allow remote attackers to obtain sensitive information via a large length value, which causes "garbage" memory to be sent.
	</description>
 </metadata>
<!-- b36aaab84a5618e58a83fd28deda41c5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035966" comment="kernel-bigsmp less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035967" comment="kernel-debug less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035968" comment="kernel-default less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035969" comment="kernel-kdump less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035970" comment="kernel-ppc64 less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035971" comment="kernel-source less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035972" comment="kernel-syms less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035973" comment="kernel-xen less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035974" comment="kernel-xenpae less than 2.6.22.19-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1266</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1266" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1266" source="CVE"/>
	<description>
	Unspecified vulnerability in Wireshark before 1.0.7-0.1-1 has unknown impact and attack vectors.
	</description>
 </metadata>
<!-- ef3e619e4955be6ea79c741d39c2e0c1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036627" comment="wireshark-devel less than 0.99.6-31.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036628" comment="wireshark less than 0.99.6-31.18"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1267</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1267" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1267" source="CVE"/>
	<description>
	Unspecified vulnerability in the LDAP dissector in Wireshark 0.99.2 through 1.0.6, when running on Windows, allows remote attackers to cause a denial of service (crash) via unknown attack vectors.
	</description>
 </metadata>
<!-- ef3e619e4955be6ea79c741d39c2e0c1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036627" comment="wireshark-devel less than 0.99.6-31.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036628" comment="wireshark less than 0.99.6-31.18"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1268</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1268" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1268" source="CVE"/>
	<description>
	The Check Point High-Availability Protocol (CPHAP) dissector in Wireshark 0.9.6 through 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted FWHA_MY_STATE packet.
	</description>
 </metadata>
<!-- ef3e619e4955be6ea79c741d39c2e0c1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036627" comment="wireshark-devel less than 0.99.6-31.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036628" comment="wireshark less than 0.99.6-31.18"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1269</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1269" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1269" source="CVE"/>
	<description>
	Unspecified vulnerability in Wireshark 0.99.6 through 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted Tektronix .rf5 file.
	</description>
 </metadata>
<!-- ef3e619e4955be6ea79c741d39c2e0c1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036627" comment="wireshark-devel less than 0.99.6-31.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036628" comment="wireshark less than 0.99.6-31.18"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1270</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1270" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1270" source="CVE"/>
	<description>
	libclamav/untar.c in ClamAV before 0.95 allows remote attackers to cause a denial of service (infinite loop) via a crafted TAR file that causes (1) clamd and (2) clamscan to hang.
	</description>
 </metadata>
<!-- 948121c661973e0f48957c2eceb4541a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036295" comment="clamav-db less than 0.95-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036296" comment="clamav less than 0.95-0.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1271</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1271" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1271" source="CVE"/>
	<description>
	The JSON_parser function (ext/json/JSON_parser.c) in PHP 5.2.x before 5.2.9 allows remote attackers to cause a denial of service (segmentation fault) via a malformed string to the json_decode API function.
	</description>
 </metadata>
<!-- 3291c2ef45434af34802ca073998445d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036143" comment="apache2-mod_php5 less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036144" comment="php5-bcmath less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036145" comment="php5-bz2 less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036146" comment="php5-calendar less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036147" comment="php5-ctype less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036148" comment="php5-curl less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036149" comment="php5-dba less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036150" comment="php5-dbase less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036151" comment="php5-devel less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036152" comment="php5-dom less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036153" comment="php5-exif less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036154" comment="php5-fastcgi less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036155" comment="php5-ftp less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036156" comment="php5-gd less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036157" comment="php5-gettext less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036158" comment="php5-gmp less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036159" comment="php5-hash less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036160" comment="php5-iconv less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036161" comment="php5-imap less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036162" comment="php5-json less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036163" comment="php5-ldap less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036164" comment="php5-mbstring less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036165" comment="php5-mcrypt less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036166" comment="php5-mhash less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036167" comment="php5-mysql less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036168" comment="php5-ncurses less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036169" comment="php5-odbc less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036170" comment="php5-openssl less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036171" comment="php5-pcntl less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036172" comment="php5-pdo less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036173" comment="php5-pear less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036174" comment="php5-pgsql less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036175" comment="php5-posix less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036176" comment="php5-pspell less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036177" comment="php5-readline less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036178" comment="php5-shmop less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036179" comment="php5-snmp less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036180" comment="php5-soap less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036181" comment="php5-sockets less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036182" comment="php5-sqlite less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036183" comment="php5-suhosin less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036184" comment="php5-sysvmsg less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036185" comment="php5-sysvsem less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036186" comment="php5-sysvshm less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036187" comment="php5-tidy less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036188" comment="php5-tokenizer less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036189" comment="php5-wddx less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036190" comment="php5-xmlreader less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036191" comment="php5-xmlrpc less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036192" comment="php5-xmlwriter less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036193" comment="php5-xsl less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036194" comment="php5-zip less than 5.2.9-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036195" comment="php5-zlib less than 5.2.9-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1274</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1274" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1274" source="CVE"/>
	<description>
	Integer overflow in the qt_error parse_trak_atom function in demuxers/demux_qt.c in xine-lib 1.1.16.2 and earlier allows remote attackers to execute arbitrary code via a Quicktime movie file with a large count value in an STTS atom, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- c26700d0cd14acf9657636d8b8c6c0f1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036629" comment="xine-devel less than 1.1.8-14.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036630" comment="xine-extra less than 1.1.8-14.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036631" comment="xine-lib-32bit less than 1.1.8-14.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036632" comment="xine-lib-64bit less than 1.1.8-14.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036633" comment="xine-lib less than 1.1.8-14.16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1297</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1297" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1297" source="CVE"/>
	<description>
	iscsi_discovery in open-iscsi in SUSE openSUSE 10.3 through 11.1 and SUSE Linux Enterprise (SLE) 10 SP2 and 11 allows local users to overwrite arbitrary files via a symlink attack on an unspecified temporary file that has a predictable name.
	</description>
 </metadata>
<!-- 8aff10152745aafe128363463ebb5010 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054852" comment="open-iscsi less than 2.0.866-15.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1302</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1302" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1302" source="CVE"/>
	<description>
	The browser engine in Mozilla Firefox 3.x before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors related to (1) nsAsyncInstantiateEvent::Run, (2) nsStyleContext::Destroy, (3) nsComputedDOMStyle::GetWidth, (4) the xslt_attributeset_ImportSameName.html test case for the XSLT stylesheet compiler, (5) nsXULDocument::SynchronizeBroadcastListener, (6) IsBindingAncestor, (7) PL_DHashTableOperate and nsEditor::EndUpdateViewBatch, and (8) gfxSkipCharsIterator::SetOffsets, and other vectors.
	</description>
 </metadata>
<!-- d260689f030c1d3973b79f15a1fc4928 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053244" comment="MozillaThunderbird-devel less than 2.0.0.22-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053245" comment="MozillaThunderbird-translations less than 2.0.0.22-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053246" comment="MozillaThunderbird less than 2.0.0.22-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1303</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1303" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1303" source="CVE"/>
	<description>
	The browser engine in Mozilla Firefox before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors related to nsSVGElement::BindToTree.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- cb58df3a93b69014571b008c271b64f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036329" comment="seamonkey-dom-inspector less than 1.1.16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036330" comment="seamonkey-irc less than 1.1.16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036331" comment="seamonkey-mail less than 1.1.16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036332" comment="seamonkey-spellchecker less than 1.1.16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036333" comment="seamonkey-venkman less than 1.1.16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036334" comment="seamonkey less than 1.1.16-1.1"/>
		</criteria>
	</criteria>
	<!-- d260689f030c1d3973b79f15a1fc4928 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053244" comment="MozillaThunderbird-devel less than 2.0.0.22-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053245" comment="MozillaThunderbird-translations less than 2.0.0.22-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053246" comment="MozillaThunderbird less than 2.0.0.22-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1304</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1304" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1304" source="CVE"/>
	<description>
	The JavaScript engine in Mozilla Firefox 3.x before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors involving (1) js_FindPropertyHelper, related to the definitions of Math and Date; and (2) js_CheckRedeclaration.
	</description>
 </metadata>
<!-- d260689f030c1d3973b79f15a1fc4928 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053244" comment="MozillaThunderbird-devel less than 2.0.0.22-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053245" comment="MozillaThunderbird-translations less than 2.0.0.22-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053246" comment="MozillaThunderbird less than 2.0.0.22-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1305</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1305" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1305" source="CVE"/>
	<description>
	The JavaScript engine in Mozilla Firefox before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors involving JSOP_DEFVAR and properties that lack the JSPROP_PERMANENT attribute.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- cb58df3a93b69014571b008c271b64f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036329" comment="seamonkey-dom-inspector less than 1.1.16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036330" comment="seamonkey-irc less than 1.1.16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036331" comment="seamonkey-mail less than 1.1.16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036332" comment="seamonkey-spellchecker less than 1.1.16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036333" comment="seamonkey-venkman less than 1.1.16-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036334" comment="seamonkey less than 1.1.16-1.1"/>
		</criteria>
	</criteria>
	<!-- d260689f030c1d3973b79f15a1fc4928 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053244" comment="MozillaThunderbird-devel less than 2.0.0.22-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053245" comment="MozillaThunderbird-translations less than 2.0.0.22-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053246" comment="MozillaThunderbird less than 2.0.0.22-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1307</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1307" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1307" source="CVE"/>
	<description>
	The view-source: URI implementation in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey does not properly implement the Same Origin Policy, which allows remote attackers to (1) bypass crossdomain.xml restrictions and connect to arbitrary web sites via a Flash file; (2) read, create, or modify Local Shared Objects via a Flash file; or (3) bypass unspecified restrictions and render content via vectors involving a jar: URI.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 658e1defc8ffc1599dd6698f8b3cf423 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055392" comment="seamonkey-dom-inspector less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055393" comment="seamonkey-irc less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055394" comment="seamonkey-mail less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055395" comment="seamonkey-spellchecker less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055396" comment="seamonkey-venkman less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055397" comment="seamonkey less than 1.1.18-0.1"/>
		</criteria>
	</criteria>
	<!-- d260689f030c1d3973b79f15a1fc4928 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053244" comment="MozillaThunderbird-devel less than 2.0.0.22-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053245" comment="MozillaThunderbird-translations less than 2.0.0.22-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053246" comment="MozillaThunderbird less than 2.0.0.22-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1311</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1311" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.9 and SeaMonkey before 1.1.17 allow user-assisted remote attackers to obtain sensitive information via a web page with an embedded frame, which causes POST data from an outer page to be sent to the inner frame's URL during a SAVEMODE_FILEONLY save of the inner frame.
	</description>
 </metadata>
<!-- 658e1defc8ffc1599dd6698f8b3cf423 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055392" comment="seamonkey-dom-inspector less than 1.1.18-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055393" comment="seamonkey-irc less than 1.1.18-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055394" comment="seamonkey-mail less than 1.1.18-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055395" comment="seamonkey-spellchecker less than 1.1.18-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055396" comment="seamonkey-venkman less than 1.1.18-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055397" comment="seamonkey less than 1.1.18-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1337</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1337" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1337" source="CVE"/>
	<description>
	The exit_notify function in kernel/exit.c in the Linux kernel before 2.6.30-rc1 does not restrict exit signals when the CAP_KILL capability is held, which allows local users to send an arbitrary signal to a process by running a program that modifies the exit_signal field and then uses an exec system call to launch a setuid application.
	</description>
 </metadata>
<!-- b36aaab84a5618e58a83fd28deda41c5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035966" comment="kernel-bigsmp less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035967" comment="kernel-debug less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035968" comment="kernel-default less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035969" comment="kernel-kdump less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035970" comment="kernel-ppc64 less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035971" comment="kernel-source less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035972" comment="kernel-syms less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035973" comment="kernel-xen less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035974" comment="kernel-xenpae less than 2.6.22.19-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1341</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1341" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1341" source="CVE"/>
	<description>
	Memory leak in the dequote_bytea function in quote.c in the DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module before 2.0.0 for Perl allows context-dependent attackers to cause a denial of service (memory consumption) by fetching data with BYTEA columns.
	</description>
 </metadata>
<!-- 1af0be7953f693b75af34b78a7cf8ca3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036493" comment="perl-DBD-Pg less than 1.49-76.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1364</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1364" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1364" source="CVE"/>
	<description>
	Use-after-free vulnerability in the embedded GD library in libwmf 0.2.8.4 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted WMF file.
	</description>
 </metadata>
<!-- 5e643f8e17ec2f8a91e6fe4b345c1bdb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036634" comment="libwmf-devel less than 0.2.8.4-92.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036635" comment="libwmf-gnome less than 0.2.8.4-92.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036636" comment="libwmf less than 0.2.8.4-92.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1371</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1371" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1371" source="CVE"/>
	<description>
	The CLI_ISCONTAINED macro in libclamav/others.h in ClamAV before 0.95.1 allows remote attackers to cause a denial of service (application crash) via a malformed file with UPack encoding.
	</description>
 </metadata>
<!-- 97b200c6344514e54644f97928645c7e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036637" comment="clamav-db less than 0.95.1-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036638" comment="clamav less than 0.95.1-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1372</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1372" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1372" source="CVE"/>
	<description>
	Stack-based buffer overflow in the cli_url_canon function in libclamav/phishcheck.c in ClamAV before 0.95.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted URL.
	</description>
 </metadata>
<!-- 97b200c6344514e54644f97928645c7e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036637" comment="clamav-db less than 0.95.1-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036638" comment="clamav less than 0.95.1-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1373</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1373" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1373" source="CVE"/>
	<description>
	Buffer overflow in the XMPP SOCKS5 bytestream server in Pidgin (formerly Gaim) before 2.5.6 allows remote authenticated users to execute arbitrary code via vectors involving an outbound XMPP file transfer.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 5851417abd01784c735315de38bc7a61 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053461" comment="finch-devel less than 2.3.1-26.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053462" comment="finch less than 2.3.1-26.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053463" comment="libpurple-devel less than 2.3.1-26.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053464" comment="libpurple-meanwhile less than 2.3.1-26.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053465" comment="libpurple-mono less than 2.3.1-26.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053466" comment="libpurple less than 2.3.1-26.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053467" comment="pidgin-devel less than 2.3.1-26.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053468" comment="pidgin less than 2.3.1-26.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1375</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1375" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1375" source="CVE"/>
	<description>
	The PurpleCircBuffer implementation in Pidgin (formerly Gaim) before 2.5.6 does not properly maintain a certain buffer, which allows remote attackers to cause a denial of service (memory corruption and application crash) via vectors involving the (1) XMPP or (2) Sametime protocol.
	</description>
 </metadata>
<!-- 5851417abd01784c735315de38bc7a61 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053461" comment="finch-devel less than 2.3.1-26.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053462" comment="finch less than 2.3.1-26.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053463" comment="libpurple-devel less than 2.3.1-26.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053464" comment="libpurple-meanwhile less than 2.3.1-26.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053465" comment="libpurple-mono less than 2.3.1-26.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053466" comment="libpurple less than 2.3.1-26.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053467" comment="pidgin-devel less than 2.3.1-26.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053468" comment="pidgin less than 2.3.1-26.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1376</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1376" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1376" source="CVE"/>
	<description>
	Multiple integer overflows in the msn_slplink_process_msg functions in the MSN protocol handler in (1) libpurple/protocols/msn/slplink.c and (2) libpurple/protocols/msnp9/slplink.c in Pidgin (formerly Gaim) before 2.5.6 on 32-bit platforms allow remote attackers to execute arbitrary code via a malformed SLP message with a crafted offset value, leading to buffer overflows.  NOTE: this issue exists because of an incomplete fix for CVE-2008-2927.
	</description>
 </metadata>
<!-- 5851417abd01784c735315de38bc7a61 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053461" comment="finch-devel less than 2.3.1-26.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053462" comment="finch less than 2.3.1-26.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053463" comment="libpurple-devel less than 2.3.1-26.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053464" comment="libpurple-meanwhile less than 2.3.1-26.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053465" comment="libpurple-mono less than 2.3.1-26.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053466" comment="libpurple less than 2.3.1-26.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053467" comment="pidgin-devel less than 2.3.1-26.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053468" comment="pidgin less than 2.3.1-26.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1377</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1377" source="CVE"/>
	<description>
	The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allows remote attackers to cause a denial of service (memory consumption) via a large series of "future epoch" DTLS records that are buffered in a queue, aka "DTLS record buffer limitation bug."
	</description>
 </metadata>
<!-- c41e30e42fd96b19a8dc51a1a5bee76d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036639" comment="libopenssl-devel less than 0.9.8e-45.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036640" comment="libopenssl0_9_8-32bit less than 0.9.8e-45.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036641" comment="libopenssl0_9_8-64bit less than 0.9.8e-45.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036642" comment="libopenssl0_9_8 less than 0.9.8e-45.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036643" comment="openssl-certs less than 0.9.8e-45.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036644" comment="openssl-doc less than 0.9.8e-45.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036645" comment="openssl less than 0.9.8e-45.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1378</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1378" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1378" source="CVE"/>
	<description>
	Multiple memory leaks in the dtls1_process_out_of_seq_message function in ssl/d1_both.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allow remote attackers to cause a denial of service (memory consumption) via DTLS records that (1) are duplicates or (2) have sequence numbers much greater than current sequence numbers, aka "DTLS fragment handling memory leak."
	</description>
 </metadata>
<!-- c41e30e42fd96b19a8dc51a1a5bee76d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036639" comment="libopenssl-devel less than 0.9.8e-45.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036640" comment="libopenssl0_9_8-32bit less than 0.9.8e-45.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036641" comment="libopenssl0_9_8-64bit less than 0.9.8e-45.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036642" comment="libopenssl0_9_8 less than 0.9.8e-45.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036643" comment="openssl-certs less than 0.9.8e-45.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036644" comment="openssl-doc less than 0.9.8e-45.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036645" comment="openssl less than 0.9.8e-45.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1379</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1379" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1379" source="CVE"/>
	<description>
	Use-after-free vulnerability in the dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL 1.0.0 Beta 2 allows remote attackers to cause a denial of service (openssl s_client crash) and possibly have unspecified other impact via a DTLS packet, as demonstrated by a packet from a server that uses a crafted server certificate.
	</description>
 </metadata>
<!-- c41e30e42fd96b19a8dc51a1a5bee76d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036639" comment="libopenssl-devel less than 0.9.8e-45.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036640" comment="libopenssl0_9_8-32bit less than 0.9.8e-45.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036641" comment="libopenssl0_9_8-64bit less than 0.9.8e-45.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036642" comment="libopenssl0_9_8 less than 0.9.8e-45.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036643" comment="openssl-certs less than 0.9.8e-45.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036644" comment="openssl-doc less than 0.9.8e-45.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036645" comment="openssl less than 0.9.8e-45.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1381</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1381" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1381" source="CVE"/>
	<description>
	The map_yp_alias function in functions/imap_general.php in SquirrelMail before 1.4.19-1 on Debian GNU/Linux, and possibly other operating systems and versions, allows remote attackers to execute arbitrary commands via shell metacharacters in a username string that is used by the ypmatch program.  NOTE: this issue exists because of an incomplete fix for CVE-2009-1579.
	</description>
 </metadata>
<!-- 9b536a21ecde8de1b8dcfbec1d619a05 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054312" comment="squirrelmail less than 1.4.20-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1386</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1386" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1386" source="CVE"/>
	<description>
	ssl/s3_pkt.c in OpenSSL before 0.9.8i allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a DTLS ChangeCipherSpec packet that occurs before ClientHello.
	</description>
 </metadata>
<!-- d61b958f83fd5574bef883709c573315 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036646" comment="libopenssl-devel less than 0.9.8e-45.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036647" comment="libopenssl0_9_8-32bit less than 0.9.8e-45.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036648" comment="libopenssl0_9_8-64bit less than 0.9.8e-45.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036649" comment="libopenssl0_9_8 less than 0.9.8e-45.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036650" comment="openssl-certs less than 0.9.8e-45.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036651" comment="openssl-doc less than 0.9.8e-45.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036652" comment="openssl less than 0.9.8e-45.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1387</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1387" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1387" source="CVE"/>
	<description>
	The dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL before 1.0.0 Beta 2 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence DTLS handshake message, related to a "fragment bug."
	</description>
 </metadata>
<!-- d61b958f83fd5574bef883709c573315 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036646" comment="libopenssl-devel less than 0.9.8e-45.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036647" comment="libopenssl0_9_8-32bit less than 0.9.8e-45.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036648" comment="libopenssl0_9_8-64bit less than 0.9.8e-45.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036649" comment="libopenssl0_9_8 less than 0.9.8e-45.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036650" comment="openssl-certs less than 0.9.8e-45.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036651" comment="openssl-doc less than 0.9.8e-45.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036652" comment="openssl less than 0.9.8e-45.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1389</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1389" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1389" source="CVE"/>
	<description>
	Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.
	</description>
 </metadata>
<!-- 82fe92100e56a9a9db21ff031e1cafb5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054123" comment="kernel-bigsmp less than 2.6.22.19-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054124" comment="kernel-debug less than 2.6.22.19-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054125" comment="kernel-default less than 2.6.22.19-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054126" comment="kernel-kdump less than 2.6.22.19-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054127" comment="kernel-ppc64 less than 2.6.22.19-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054128" comment="kernel-source less than 2.6.22.19-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054129" comment="kernel-syms less than 2.6.22.19-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054130" comment="kernel-xen less than 2.6.22.19-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054131" comment="kernel-xenpae less than 2.6.22.19-0.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1391</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1391" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1391" source="CVE"/>
	<description>
	Off-by-one error in the inflate function in Zlib.xs in Compress::Raw::Zlib Perl module before 2.017, as used in AMaViS, SpamAssassin, and possibly other products, allows context-dependent attackers to cause a denial of service (hang or crash) via a crafted zlib compressed stream that triggers a heap-based buffer overflow, as exploited in the wild by Trojan.Downloader-71014 in June 2009.
	</description>
 </metadata>
<!-- f8c3f5dca31386c8795c693d50206abf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036653" comment="perl-Compress-Raw-Zlib less than 2.005-17.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1392</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1392" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1392" source="CVE"/>
	<description>
	The browser engine in Mozilla Firefox 3 before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) nsEventStateManager::GetContentState and nsNativeTheme::CheckBooleanAttr; (2) UnhookTextRunFromFrames and ClearAllTextRunReferences; (3) nsTextFrame::ClearTextRun; (4) IsPercentageAware; (5) PL_DHashTableFinish; (6) nsListBoxBodyFrame::GetNextItemBox; (7) AtomTableClearEntry, related to the atom table, DOM mutation events, and Unicode surrogates; (8) nsHTMLEditor::HideResizers; and (9) nsWindow::SetCursor, related to changing the cursor; and other vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 658e1defc8ffc1599dd6698f8b3cf423 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055392" comment="seamonkey-dom-inspector less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055393" comment="seamonkey-irc less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055394" comment="seamonkey-mail less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055395" comment="seamonkey-spellchecker less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055396" comment="seamonkey-venkman less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055397" comment="seamonkey less than 1.1.18-0.1"/>
		</criteria>
	</criteria>
	<!-- d260689f030c1d3973b79f15a1fc4928 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053244" comment="MozillaThunderbird-devel less than 2.0.0.22-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053245" comment="MozillaThunderbird-translations less than 2.0.0.22-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053246" comment="MozillaThunderbird less than 2.0.0.22-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1438</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1438" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1438" source="CVE"/>
	<description>
	Integer overflow in the CSoundFile::ReadMed function (src/load_med.cpp) in libmodplug before 0.8.6, as used in gstreamer-plugins, TTPlayer, and other products, allows context-dependent attackers to execute arbitrary code via a MED file with a crafted (1) song comment or (2) song name, which triggers a heap-based buffer overflow, as exploited in the wild in August 2008.
	</description>
 </metadata>
<!-- c992ffab4c1b4c81f933d39a0f4a0e28 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053082" comment="gstreamer010-plugins-bad-devel less than 0.10.5-36.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053083" comment="gstreamer010-plugins-bad-doc less than 0.10.5-36.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053084" comment="gstreamer010-plugins-bad less than 0.10.5-36.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1439</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1439" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1439" source="CVE"/>
	<description>
	Buffer overflow in fs/cifs/connect.c in CIFS in the Linux kernel 2.6.29 and earlier allows remote attackers to cause a denial of service (crash) via a long nativeFileSystem field in a Tree Connect response to an SMB mount request.
	</description>
 </metadata>
<!-- b36aaab84a5618e58a83fd28deda41c5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035966" comment="kernel-bigsmp less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035967" comment="kernel-debug less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035968" comment="kernel-default less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035969" comment="kernel-kdump less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035970" comment="kernel-ppc64 less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035971" comment="kernel-source less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035972" comment="kernel-syms less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035973" comment="kernel-xen less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035974" comment="kernel-xenpae less than 2.6.22.19-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1492</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1492" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1492" source="CVE"/>
	<description>
	The getAnnots Doc method in the JavaScript API in Adobe Reader and Acrobat 9.1, 8.1.4, 7.1.1, and earlier allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a PDF file that contains an annotation, and has an OpenAction entry with JavaScript code that calls this method with crafted integer arguments.
	</description>
 </metadata>
<!-- 76b96b9394686be822cb258a0faef047 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036654" comment="acroread less than 8.1.5-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1493</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1493" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1493" source="CVE"/>
	<description>
	The customDictionaryOpen spell method in the JavaScript API in Adobe Reader 9.1, 8.1.4, 7.1.1, and earlier on Linux and UNIX allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a PDF file that triggers a call to this method with a long string in the second argument.
	</description>
 </metadata>
<!-- 76b96b9394686be822cb258a0faef047 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036654" comment="acroread less than 8.1.5-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1494</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1494" source="CVE"/>
	<description>
	The process_stat function in Memcached 1.2.8 discloses memory-allocation statistics in response to a stats malloc command, which allows remote attackers to obtain potentially sensitive information by sending this command to the daemon's TCP port.
	</description>
 </metadata>
<!-- d817c4c810a64ac81c63c4303c942f8b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053770" comment="memcached less than 1.2.2-11.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1572</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1572" source="CVE"/>
	<description>
	The BGP daemon (bgpd) in Quagga 0.99.11 and earlier allows remote attackers to cause a denial of service (crash) via an AS path containing ASN elements whose string representation is longer than expected, which triggers an assert error.
	</description>
 </metadata>
<!-- 49e1cf3866b6fbe62620c98d4c7f2588 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036655" comment="quagga-devel less than 0.99.7-37.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036656" comment="quagga less than 0.99.7-37.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1574</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1574" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1574" source="CVE"/>
	<description>
	racoon/isakmp_frag.c in ipsec-tools before 0.7.2 allows remote attackers to cause a denial of service (crash) via crafted fragmented packets without a payload, which triggers a NULL pointer dereference.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5789fc55c6b3a2d97a1266c6ad652bec -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036657" comment="novell-ipsec-tools-devel less than 0.6.3-114.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036658" comment="novell-ipsec-tools less than 0.6.3-114.6"/>
		</criteria>
	</criteria>
	<!-- a84ed7e216dfb1c7df1a83a7b2871a07 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036659" comment="ipsec-tools less than 0.6.5-104.5"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1578</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1578" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1578" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail before 1.4.18 and NaSMail before 1.7 allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) certain encrypted strings in e-mail headers, related to contrib/decrypt_headers.php; (2) PHP_SELF; and (3) the query string (aka QUERY_STRING).
	</description>
 </metadata>
<!-- 830e70628eaf14d97b4f6764db767a23 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036660" comment="squirrelmail less than 1.4.18-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1579</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1579" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1579" source="CVE"/>
	<description>
	The map_yp_alias function in functions/imap_general.php in SquirrelMail before 1.4.18 and NaSMail before 1.7 allows remote attackers to execute arbitrary commands via shell metacharacters in a username string that is used by the ypmatch program.
	</description>
 </metadata>
<!-- 830e70628eaf14d97b4f6764db767a23 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036660" comment="squirrelmail less than 1.4.18-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1580</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1580" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1580" source="CVE"/>
	<description>
	Session fixation vulnerability in SquirrelMail before 1.4.18 allows remote attackers to hijack web sessions via a crafted cookie.
	</description>
 </metadata>
<!-- 830e70628eaf14d97b4f6764db767a23 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036660" comment="squirrelmail less than 1.4.18-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1581</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1581" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1581" source="CVE"/>
	<description>
	functions/mime.php in SquirrelMail before 1.4.18 does not protect the application's content from Cascading Style Sheets (CSS) positioning in HTML e-mail messages, which allows remote attackers to spoof the user interface, and conduct cross-site scripting (XSS) and phishing attacks, via a crafted message.
	</description>
 </metadata>
<!-- 830e70628eaf14d97b4f6764db767a23 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036660" comment="squirrelmail less than 1.4.18-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1630</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1630" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1630" source="CVE"/>
	<description>
	The nfs_permission function in fs/nfs/dir.c in the NFS client implementation in the Linux kernel 2.6.29.3 and earlier, when atomic_open is available, does not check execute (aka EXEC or MAY_EXEC) permission bits, which allows local users to bypass permissions and execute files, as demonstrated by files on an NFSv4 fileserver.
	</description>
 </metadata>
<!-- 82fe92100e56a9a9db21ff031e1cafb5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054123" comment="kernel-bigsmp less than 2.6.22.19-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054124" comment="kernel-debug less than 2.6.22.19-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054125" comment="kernel-default less than 2.6.22.19-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054126" comment="kernel-kdump less than 2.6.22.19-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054127" comment="kernel-ppc64 less than 2.6.22.19-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054128" comment="kernel-source less than 2.6.22.19-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054129" comment="kernel-syms less than 2.6.22.19-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054130" comment="kernel-xen less than 2.6.22.19-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054131" comment="kernel-xenpae less than 2.6.22.19-0.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1632</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1632" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1632" source="CVE"/>
	<description>
	Multiple memory leaks in Ipsec-tools before 0.7.2 allow remote attackers to cause a denial of service (memory consumption) via vectors involving (1) signature verification during user authentication with X.509 certificates, related to the eay_check_x509sign function in src/racoon/crypto_openssl.c; and (2) the NAT-Traversal (aka NAT-T) keepalive implementation, related to src/racoon/nattraversal.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5789fc55c6b3a2d97a1266c6ad652bec -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036657" comment="novell-ipsec-tools-devel less than 0.6.3-114.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036658" comment="novell-ipsec-tools less than 0.6.3-114.6"/>
		</criteria>
	</criteria>
	<!-- a84ed7e216dfb1c7df1a83a7b2871a07 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036659" comment="ipsec-tools less than 0.6.5-104.5"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1720</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1720" source="CVE"/>
	<description>
	Multiple integer overflows in OpenEXR 1.2.2 and 1.6.1 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors that trigger heap-based buffer overflows, related to (1) the Imf::PreviewImage::PreviewImage function and (2) compressor constructors.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 35b048fa90c255ea27fbdf0d85ea0f36 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054500" comment="OpenEXR-32bit less than 1.4.0a-36.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054501" comment="OpenEXR-64bit less than 1.4.0a-36.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054502" comment="OpenEXR-devel less than 1.4.0a-36.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054503" comment="OpenEXR less than 1.4.0a-36.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1721</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1721" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1721" source="CVE"/>
	<description>
	The decompression implementation in the Imf::hufUncompress function in OpenEXR 1.2.2 and 1.6.1 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger a free of an uninitialized pointer.
	</description>
 </metadata>
<!-- 35b048fa90c255ea27fbdf0d85ea0f36 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054500" comment="OpenEXR-32bit less than 1.4.0a-36.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054501" comment="OpenEXR-64bit less than 1.4.0a-36.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054502" comment="OpenEXR-devel less than 1.4.0a-36.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054503" comment="OpenEXR less than 1.4.0a-36.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1788</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1788" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1788" source="CVE"/>
	<description>
	Heap-based buffer overflow in voc_read_header in libsndfile 1.0.15 through 1.0.19, as used in Winamp 5.552 and possibly other media programs, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a VOC file with an invalid header value.
	</description>
 </metadata>
<!-- f7e6fe6715fa75f03d61051b49d8f61c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053469" comment="libsndfile-32bit less than 1.0.17-81.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053470" comment="libsndfile-64bit less than 1.0.17-81.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053471" comment="libsndfile-devel less than 1.0.17-81.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053472" comment="libsndfile-octave less than 1.0.17-81.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053473" comment="libsndfile-progs less than 1.0.17-81.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053474" comment="libsndfile less than 1.0.17-81.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1791</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1791" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1791" source="CVE"/>
	<description>
	Heap-based buffer overflow in aiff_read_header in libsndfile 1.0.15 through 1.0.19, as used in Winamp 5.552 and possibly other media programs, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an AIFF file with an invalid header value.
	</description>
 </metadata>
<!-- f7e6fe6715fa75f03d61051b49d8f61c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053469" comment="libsndfile-32bit less than 1.0.17-81.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053470" comment="libsndfile-64bit less than 1.0.17-81.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053471" comment="libsndfile-devel less than 1.0.17-81.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053472" comment="libsndfile-octave less than 1.0.17-81.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053473" comment="libsndfile-progs less than 1.0.17-81.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053474" comment="libsndfile less than 1.0.17-81.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1829</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1829" source="CVE"/>
	<description>
	Unspecified vulnerability in the PCNFSD dissector in Wireshark 0.8.20 through 1.0.7 allows remote attackers to cause a denial of service (crash) via crafted PCNFSD packets.
	</description>
 </metadata>
<!-- ef3e619e4955be6ea79c741d39c2e0c1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036627" comment="wireshark-devel less than 0.99.6-31.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036628" comment="wireshark less than 0.99.6-31.18"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1832</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1832" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1832" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors involving "double frame construction."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 658e1defc8ffc1599dd6698f8b3cf423 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055392" comment="seamonkey-dom-inspector less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055393" comment="seamonkey-irc less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055394" comment="seamonkey-mail less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055395" comment="seamonkey-spellchecker less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055396" comment="seamonkey-venkman less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055397" comment="seamonkey less than 1.1.18-0.1"/>
		</criteria>
	</criteria>
	<!-- d260689f030c1d3973b79f15a1fc4928 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053244" comment="MozillaThunderbird-devel less than 2.0.0.22-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053245" comment="MozillaThunderbird-translations less than 2.0.0.22-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053246" comment="MozillaThunderbird less than 2.0.0.22-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1833</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1833" source="CVE"/>
	<description>
	The JavaScript engine in Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) js_LeaveSharpObject, (2) ParseXMLSource, and (3) a certain assertion in jsinterp.c; and other vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 658e1defc8ffc1599dd6698f8b3cf423 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055392" comment="seamonkey-dom-inspector less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055393" comment="seamonkey-irc less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055394" comment="seamonkey-mail less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055395" comment="seamonkey-spellchecker less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055396" comment="seamonkey-venkman less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055397" comment="seamonkey less than 1.1.18-0.1"/>
		</criteria>
	</criteria>
	<!-- d260689f030c1d3973b79f15a1fc4928 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053244" comment="MozillaThunderbird-devel less than 2.0.0.22-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053245" comment="MozillaThunderbird-translations less than 2.0.0.22-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053246" comment="MozillaThunderbird less than 2.0.0.22-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1835</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1835" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.11 and SeaMonkey before 1.1.17 associate local documents with external domain names located after the file:// substring in a URL, which allows user-assisted remote attackers to read arbitrary cookies via a crafted HTML document, as demonstrated by a URL with file://example.com/C:/ at the beginning.
	</description>
 </metadata>
<!-- 658e1defc8ffc1599dd6698f8b3cf423 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055392" comment="seamonkey-dom-inspector less than 1.1.18-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055393" comment="seamonkey-irc less than 1.1.18-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055394" comment="seamonkey-mail less than 1.1.18-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055395" comment="seamonkey-spellchecker less than 1.1.18-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055396" comment="seamonkey-venkman less than 1.1.18-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055397" comment="seamonkey less than 1.1.18-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1836</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1836" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 use the HTTP Host header to determine the context of a document provided in a non-200 CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 658e1defc8ffc1599dd6698f8b3cf423 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055392" comment="seamonkey-dom-inspector less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055393" comment="seamonkey-irc less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055394" comment="seamonkey-mail less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055395" comment="seamonkey-spellchecker less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055396" comment="seamonkey-venkman less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055397" comment="seamonkey less than 1.1.18-0.1"/>
		</criteria>
	</criteria>
	<!-- d260689f030c1d3973b79f15a1fc4928 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053244" comment="MozillaThunderbird-devel less than 2.0.0.22-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053245" comment="MozillaThunderbird-translations less than 2.0.0.22-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053246" comment="MozillaThunderbird less than 2.0.0.22-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1838</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1838" source="CVE"/>
	<description>
	The garbage-collection implementation in Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 sets an element's owner document to null in unspecified circumstances, which allows remote attackers to execute arbitrary JavaScript with chrome privileges via a crafted event handler, related to an incorrect context for this event handler.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 658e1defc8ffc1599dd6698f8b3cf423 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055392" comment="seamonkey-dom-inspector less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055393" comment="seamonkey-irc less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055394" comment="seamonkey-mail less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055395" comment="seamonkey-spellchecker less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055396" comment="seamonkey-venkman less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055397" comment="seamonkey less than 1.1.18-0.1"/>
		</criteria>
	</criteria>
	<!-- d260689f030c1d3973b79f15a1fc4928 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053244" comment="MozillaThunderbird-devel less than 2.0.0.22-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053245" comment="MozillaThunderbird-translations less than 2.0.0.22-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053246" comment="MozillaThunderbird less than 2.0.0.22-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1841</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1841" source="CVE"/>
	<description>
	js/src/xpconnect/src/xpcwrappedjsclass.cpp in Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 allows remote attackers to execute arbitrary web script with the privileges of a chrome object, as demonstrated by the browser sidebar and the FeedWriter.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 658e1defc8ffc1599dd6698f8b3cf423 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055392" comment="seamonkey-dom-inspector less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055393" comment="seamonkey-irc less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055394" comment="seamonkey-mail less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055395" comment="seamonkey-spellchecker less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055396" comment="seamonkey-venkman less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055397" comment="seamonkey less than 1.1.18-0.1"/>
		</criteria>
	</criteria>
	<!-- d260689f030c1d3973b79f15a1fc4928 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053244" comment="MozillaThunderbird-devel less than 2.0.0.22-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053245" comment="MozillaThunderbird-translations less than 2.0.0.22-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053246" comment="MozillaThunderbird less than 2.0.0.22-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1855</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1855" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1855" source="CVE"/>
	<description>
	Stack-based buffer overflow in Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 might allow attackers to execute arbitrary code via a PDF file containing a malformed U3D model file with a crafted extension block.
	</description>
 </metadata>
<!-- 8cb28f685e1443f37a38c6b45f183d74 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036379" comment="acroread less than 8.1.6-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1856</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1856" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1856" source="CVE"/>
	<description>
	Integer overflow in Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 allows attackers to cause a denial of service or possibly execute arbitrary code via a PDF file containing unspecified parameters to the FlateDecode filter, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 8cb28f685e1443f37a38c6b45f183d74 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036379" comment="acroread less than 8.1.6-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1857</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1857" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1857" source="CVE"/>
	<description>
	Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 allow attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a PDF document with a crafted TrueType font.
	</description>
 </metadata>
<!-- 8cb28f685e1443f37a38c6b45f183d74 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036379" comment="acroread less than 8.1.6-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1858</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1858" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1858" source="CVE"/>
	<description>
	The JBIG2 filter in Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 might allow remote attackers to execute arbitrary code via unspecified vectors that trigger memory corruption.
	</description>
 </metadata>
<!-- 8cb28f685e1443f37a38c6b45f183d74 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036379" comment="acroread less than 8.1.6-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1859</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1859" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1859" source="CVE"/>
	<description>
	Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 might allow attackers to execute arbitrary code via unspecified vectors that trigger memory corruption.
	</description>
 </metadata>
<!-- 8cb28f685e1443f37a38c6b45f183d74 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036379" comment="acroread less than 8.1.6-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1861</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1861" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1861" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 might allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PDF file with a JPX (aka JPEG2000) stream that triggers heap memory corruption.
	</description>
 </metadata>
<!-- 8cb28f685e1443f37a38c6b45f183d74 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036379" comment="acroread less than 8.1.6-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1862</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1862" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1862" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x through 9.1.2, and Adobe Flash Player 9.x through 9.0.159.0 and 10.x through 10.0.22.87, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via (1) a crafted Flash application in a .pdf file or (2) a crafted .swf file, related to authplay.dll, as exploited in the wild in July 2009.
	</description>
 </metadata>
<!-- 90d1e006eeffa0e68e97d94151105e3b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053690" comment="flash-player less than 9.0.246.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1863</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1863" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1863" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.246.0 and 10.x before 10.0.32.18, and Adobe AIR before 1.5.2, allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors, related to a "privilege escalation vulnerability."
	</description>
 </metadata>
<!-- 90d1e006eeffa0e68e97d94151105e3b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053690" comment="flash-player less than 9.0.246.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1864</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1864" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1864" source="CVE"/>
	<description>
	Heap-based buffer overflow in Adobe Flash Player before 9.0.246.0 and 10.x before 10.0.32.18, and Adobe AIR before 1.5.2, allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 90d1e006eeffa0e68e97d94151105e3b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053690" comment="flash-player less than 9.0.246.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1865</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1865" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1865" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.246.0 and 10.x before 10.0.32.18, and Adobe AIR before 1.5.2, allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors, related to a "null pointer vulnerability."
	</description>
 </metadata>
<!-- 90d1e006eeffa0e68e97d94151105e3b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053690" comment="flash-player less than 9.0.246.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1866</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1866" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1866" source="CVE"/>
	<description>
	Stack-based buffer overflow in Adobe Flash Player before 9.0.246.0 and 10.x before 10.0.32.18, and Adobe AIR before 1.5.2, allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 90d1e006eeffa0e68e97d94151105e3b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053690" comment="flash-player less than 9.0.246.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1867</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1867" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1867" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.246.0 and 10.x before 10.0.32.18, and Adobe AIR before 1.5.2, allows attackers to trick a user into (1) selecting a link or (2) completing a dialog, related to a "clickjacking vulnerability."
	</description>
 </metadata>
<!-- 90d1e006eeffa0e68e97d94151105e3b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053690" comment="flash-player less than 9.0.246.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1868</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1868" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1868" source="CVE"/>
	<description>
	Heap-based buffer overflow in Adobe Flash Player before 9.0.246.0 and 10.x before 10.0.32.18, and Adobe AIR before 1.5.2, allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors involving URL parsing.
	</description>
 </metadata>
<!-- 90d1e006eeffa0e68e97d94151105e3b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053690" comment="flash-player less than 9.0.246.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1869</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1869" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1869" source="CVE"/>
	<description>
	Integer overflow in the ActionScript Virtual Machine 2 (AVM2) abcFile parser in Adobe Flash Player before 9.0.246.0 and 10.x before 10.0.32.18, and Adobe AIR before 1.5.2, allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an AVM2 file with a large intrf_count value that triggers a dereference of an out-of-bounds pointer.
	</description>
 </metadata>
<!-- 90d1e006eeffa0e68e97d94151105e3b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053690" comment="flash-player less than 9.0.246.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1870</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1870" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1870" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.246.0 and 10.x before 10.0.32.18, and Adobe AIR before 1.5.2, allows attackers to obtain sensitive information via vectors involving saving an SWF file to a hard drive, related to a "local sandbox vulnerability."
	</description>
 </metadata>
<!-- 90d1e006eeffa0e68e97d94151105e3b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053690" comment="flash-player less than 9.0.246.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1882</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1882" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1882" source="CVE"/>
	<description>
	Integer overflow in the XMakeImage function in magick/xwindow.c in ImageMagick 6.5.2-8, and GraphicsMagick, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF file, which triggers a buffer overflow.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 333adfbae730f95489647f5c7256dfd1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036661" comment="ImageMagick-devel less than 6.3.5.10-2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036662" comment="ImageMagick-extra less than 6.3.5.10-2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036663" comment="ImageMagick less than 6.3.5.10-2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036664" comment="libMagick++-devel less than 6.3.5.10-2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036665" comment="libMagick++10 less than 6.3.5.10-2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036666" comment="libMagick10 less than 6.3.5.10-2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036667" comment="libWand10 less than 6.3.5.10-2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036668" comment="perl-PerlMagick less than 6.3.5.10-2.4"/>
		</criteria>
	</criteria>
	<!-- 3fad66d7b016dccb95e514b0780d56c6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036669" comment="GraphicsMagick-devel less than 1.1.8-20.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036670" comment="GraphicsMagick less than 1.1.8-20.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036671" comment="libGraphicsMagick++-devel less than 1.1.8-20.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036672" comment="libGraphicsMagick++1 less than 1.1.8-20.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036673" comment="libGraphicsMagick1 less than 1.1.8-20.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036674" comment="libGraphicsMagickWand0 less than 1.1.8-20.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036675" comment="perl-GraphicsMagick less than 1.1.8-20.8"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1885</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1885" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1885" source="CVE"/>
	<description>
	Stack consumption vulnerability in validators/DTD/DTDScanner.cpp in Apache Xerces C++ 2.7.0 and 2.8.0 allows context-dependent attackers to cause a denial of service (application crash) via vectors involving nested parentheses and invalid byte values in "simply nested DTD structures," as demonstrated by the Codenomicon XML fuzzing framework.
	</description>
 </metadata>
<!-- b189c841c2708c538b283e8120b72e4c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054055" comment="Xerces-c less than 2.7.0-75.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054056" comment="libXerces-c-27 less than 2.7.0-75.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054057" comment="libXerces-c-devel less than 2.7.0-75.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1889</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1889" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1889" source="CVE"/>
	<description>
	The OSCAR protocol implementation in Pidgin before 2.5.8 misinterprets the ICQWebMessage message type as the ICQSMS message type, which allows remote attackers to cause a denial of service (application crash) via a crafted ICQ web message that triggers allocation of a large amount of memory.
	</description>
 </metadata>
<!-- 5851417abd01784c735315de38bc7a61 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053461" comment="finch-devel less than 2.3.1-26.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053462" comment="finch less than 2.3.1-26.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053463" comment="libpurple-devel less than 2.3.1-26.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053464" comment="libpurple-meanwhile less than 2.3.1-26.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053465" comment="libpurple-mono less than 2.3.1-26.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053466" comment="libpurple less than 2.3.1-26.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053467" comment="pidgin-devel less than 2.3.1-26.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053468" comment="pidgin less than 2.3.1-26.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1890</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1890" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1890" source="CVE"/>
	<description>
	The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which allows remote attackers to cause a denial of service (CPU consumption) via crafted requests.
	</description>
 </metadata>
<!-- 0683ec2df667efa4b179f003d0da49d3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055719" comment="apache2-devel less than 2.2.4-70.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055720" comment="apache2-doc less than 2.2.4-70.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055721" comment="apache2-example-pages less than 2.2.4-70.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055722" comment="apache2-prefork less than 2.2.4-70.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055723" comment="apache2-utils less than 2.2.4-70.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055724" comment="apache2-worker less than 2.2.4-70.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055725" comment="apache2 less than 2.2.4-70.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1891</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1891" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1891" source="CVE"/>
	<description>
	The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).
	</description>
 </metadata>
<!-- 0683ec2df667efa4b179f003d0da49d3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055719" comment="apache2-devel less than 2.2.4-70.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055720" comment="apache2-doc less than 2.2.4-70.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055721" comment="apache2-example-pages less than 2.2.4-70.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055722" comment="apache2-prefork less than 2.2.4-70.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055723" comment="apache2-utils less than 2.2.4-70.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055724" comment="apache2-worker less than 2.2.4-70.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055725" comment="apache2 less than 2.2.4-70.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1904</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1904" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1904" source="CVE"/>
	<description>
	The BigDecimal library in Ruby 1.8.6 before p369 and 1.8.7 before p173 allows context-dependent attackers to cause a denial of service (application crash) via a string argument that represents a large number, as demonstrated by an attempted conversion to the Float data type.
	</description>
 </metadata>
<!-- c147c81633c8cf23c7022e50919e2209 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053195" comment="ruby-devel less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053196" comment="ruby-doc-html less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053197" comment="ruby-doc-ri less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053198" comment="ruby-examples less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053199" comment="ruby-test-suite less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053200" comment="ruby-tk less than 1.8.6.p369-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053201" comment="ruby less than 1.8.6.p369-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1932</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1932" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1932" source="CVE"/>
	<description>
	Multiple integer overflows in the (1) user_info_callback, (2) user_endrow_callback, and (3) gst_pngdec_task functions (ext/libpng/gstpngdec.c) in GStreamer Good Plug-ins (aka gst-plugins-good or gstreamer-plugins-good) 0.10.15 allow remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted PNG file, which triggers a buffer overflow.
	</description>
 </metadata>
<!-- 8dfb776f0bc8748b6d963d3f148e8b71 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053085" comment="gstreamer010-plugins-good-doc less than 0.10.6-41.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053086" comment="gstreamer010-plugins-good-extra less than 0.10.6-41.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053087" comment="gstreamer010-plugins-good less than 0.10.6-41.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1955</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1955" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1955" source="CVE"/>
	<description>
	The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn modules in the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, as demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564.
	</description>
 </metadata>
<!-- 9d2407b0352245ff49a54784986b83a9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053396" comment="libapr-util1-64bit less than 1.2.8-68.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053397" comment="libapr-util1-dbd-mysql less than 1.2.8-68.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053398" comment="libapr-util1-dbd-pgsql less than 1.2.8-68.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053399" comment="libapr-util1-dbd-sqlite3 less than 1.2.8-68.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053400" comment="libapr-util1-devel-64bit less than 1.2.8-68.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053401" comment="libapr-util1-devel less than 1.2.8-68.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053402" comment="libapr-util1 less than 1.2.8-68.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1956</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1956" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1956" source="CVE"/>
	<description>
	Off-by-one error in the apr_brigade_vprintf function in Apache APR-util before 1.3.5 on big-endian platforms allows remote attackers to obtain sensitive information or cause a denial of service (application crash) via crafted input.
	</description>
 </metadata>
<!-- 9d2407b0352245ff49a54784986b83a9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053396" comment="libapr-util1-64bit less than 1.2.8-68.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053397" comment="libapr-util1-dbd-mysql less than 1.2.8-68.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053398" comment="libapr-util1-dbd-pgsql less than 1.2.8-68.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053399" comment="libapr-util1-dbd-sqlite3 less than 1.2.8-68.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053400" comment="libapr-util1-devel-64bit less than 1.2.8-68.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053401" comment="libapr-util1-devel less than 1.2.8-68.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053402" comment="libapr-util1 less than 1.2.8-68.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1959</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1959" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1959" source="CVE"/>
	<description>
	Off-by-one error in the event_wallops function in fe-common/irc/fe-events.c in irssi 0.8.13 allows remote IRC servers to cause a denial of service (crash) via an empty command, which triggers a one-byte buffer under-read and a one-byte buffer underflow.
	</description>
 </metadata>
<!-- f3604ddb60d424b576ba6c072aa717d6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036676" comment="irssi-devel less than 0.8.11-19.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036677" comment="irssi less than 0.8.11-19.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1961</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1961" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1961" source="CVE"/>
	<description>
	The inode double locking code in fs/ocfs2/file.c in the Linux kernel 2.6.30 before 2.6.30-rc3, 2.6.27 before 2.6.27.24, 2.6.29 before 2.6.29.4, and possibly other versions down to 2.6.19 allows local users to cause a denial of service (prevention of file creation and removal) via a series of splice system calls that trigger a deadlock between the generic_file_splice_write, splice_from_pipe, and ocfs2_file_splice_write functions.
	</description>
 </metadata>
<!-- b36aaab84a5618e58a83fd28deda41c5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035966" comment="kernel-bigsmp less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035967" comment="kernel-debug less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035968" comment="kernel-default less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035969" comment="kernel-kdump less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035970" comment="kernel-ppc64 less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035971" comment="kernel-source less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035972" comment="kernel-syms less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035973" comment="kernel-xen less than 2.6.22.19-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035974" comment="kernel-xenpae less than 2.6.22.19-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2028</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2028" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2028" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 have unknown impact and attack vectors, related to "Adobe internally discovered issues."
	</description>
 </metadata>
<!-- 8cb28f685e1443f37a38c6b45f183d74 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036379" comment="acroread less than 8.1.6-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2042</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2042" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2042" source="CVE"/>
	<description>
	libpng before 1.2.37 does not properly parse 1-bit interlaced images with width values that are not divisible by 8, which causes libpng to include uninitialized bits in certain rows of a PNG file and might allow remote attackers to read portions of sensitive memory via "out-of-bounds pixels" in the file.
	</description>
 </metadata>
<!-- d16b891a9fef9a1a9aa901802163911d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053362" comment="libpng-32bit less than 1.2.18-15.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053363" comment="libpng-64bit less than 1.2.18-15.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053364" comment="libpng-devel-32bit less than 1.2.18-15.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053365" comment="libpng-devel-64bit less than 1.2.18-15.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053366" comment="libpng-devel less than 1.2.18-15.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053367" comment="libpng less than 1.2.18-15.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2059</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2059" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2059" source="CVE"/>
	<description>
	Opera, possibly before 9.25, uses the HTTP Host header to determine the context of a document provided in a (1) 4xx or (2) 5xx CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.
	</description>
 </metadata>
<!-- a897914e6fa37f606b823ac101036941 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054536" comment="opera less than 10.00-6.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2063</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2063" source="CVE"/>
	<description>
	Opera, possibly before 9.25, processes a 3xx HTTP CONNECT response before a successful SSL handshake, which allows man-in-the-middle attackers to execute arbitrary web script, in an https site's context, by modifying this CONNECT response to specify a 302 redirect to an arbitrary https web site.
	</description>
 </metadata>
<!-- a897914e6fa37f606b823ac101036941 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054536" comment="opera less than 10.00-6.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2067</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2067" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2067" source="CVE"/>
	<description>
	Opera detects http content in https web pages only when the top-level frame uses https, which allows man-in-the-middle attackers to execute arbitrary web script, in an https site's context, by modifying an http page to include an https iframe that references a script file on an http site, related to "HTTP-Intended-but-HTTPS-Loadable (HPIHSL) pages."
	</description>
 </metadata>
<!-- a897914e6fa37f606b823ac101036941 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054536" comment="opera less than 10.00-6.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2070</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2070" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2070" source="CVE"/>
	<description>
	Opera displays a cached certificate for a (1) 4xx or (2) 5xx CONNECT response page returned by a proxy server, which allows man-in-the-middle attackers to spoof an arbitrary https site by letting a browser obtain a valid certificate from this site during one request, and then sending the browser a crafted 502 response page upon a subsequent request.
	</description>
 </metadata>
<!-- a897914e6fa37f606b823ac101036941 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054536" comment="opera less than 10.00-6.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2185</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2185" source="CVE"/>
	<description>
	The ASN.1 parser (pluto/asn1.c, libstrongswan/asn1/asn1.c, libstrongswan/asn1/asn1_parser.c) in (a) strongSwan 2.8 before 2.8.10, 4.2 before 4.2.16, and 4.3 before 4.3.2; and (b) openSwan 2.6 before 2.6.22 and 2.4 before 2.4.15 allows remote attackers to cause a denial of service (pluto IKE daemon crash) via an X.509 certificate with (1) crafted Relative Distinguished Names (RDNs), (2) a crafted UTCTIME string, or (3) a crafted GENERALIZEDTIME string.
	</description>
 </metadata>
<!-- 3eacdd0910e6c07c6cb58e85f0f3db95 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053447" comment="openswan-doc less than 2.4.7-64.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053448" comment="openswan less than 2.4.7-64.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2210</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2210" source="CVE"/>
	<description>
	Mozilla Thunderbird before 2.0.0.22 and SeaMonkey before 1.1.17 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a multipart/alternative e-mail message containing a text/enhanced part that triggers access to an incorrect object type.
	</description>
 </metadata>
<!-- 658e1defc8ffc1599dd6698f8b3cf423 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055392" comment="seamonkey-dom-inspector less than 1.1.18-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055393" comment="seamonkey-irc less than 1.1.18-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055394" comment="seamonkey-mail less than 1.1.18-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055395" comment="seamonkey-spellchecker less than 1.1.18-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055396" comment="seamonkey-venkman less than 1.1.18-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055397" comment="seamonkey less than 1.1.18-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2285</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2285" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2285" source="CVE"/>
	<description>
	Buffer underflow in the LZWDecodeCompat function in libtiff 3.8.2 allows context-dependent attackers to cause a denial of service (crash) via a crafted TIFF image, a different vulnerability than CVE-2008-2327.
	</description>
 </metadata>
<!-- 5b4a523091e76df85478773259387569 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053730" comment="libtiff3-32bit less than 3.8.2-68.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053731" comment="libtiff3-64bit less than 3.8.2-68.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053732" comment="libtiff3 less than 3.8.2-68.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2288</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2288" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2288" source="CVE"/>
	<description>
	statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters.
	</description>
 </metadata>
<!-- 779ccaf748aa6e39c79b69c4f88607fb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053640" comment="nagios-www less than 2.9-48.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053641" comment="nagios less than 2.9-48.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2347</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2347" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2347" source="CVE"/>
	<description>
	Multiple integer overflows in inter-color spaces conversion tools in libtiff 3.8 through 3.8.2, 3.9, and 4.0 allow context-dependent attackers to execute arbitrary code via a TIFF image with large (1) width and (2) height values, which triggers a heap-based buffer overflow in the (a) cvt_whole_image function in tiff2rgba and (b) tiffcvt function in rgb2ycbcr.
	</description>
 </metadata>
<!-- 0a5af65bd5d0ed02ca80c38c5e984ec2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054058" comment="libtiff-devel-32bit less than 3.8.2-68.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054059" comment="libtiff-devel-64bit less than 3.8.2-68.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054060" comment="libtiff-devel less than 3.8.2-68.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054061" comment="libtiff3-32bit less than 3.8.2-68.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054062" comment="libtiff3-64bit less than 3.8.2-68.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054063" comment="libtiff3 less than 3.8.2-68.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054064" comment="tiff less than 3.8.2-68.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2395</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2395" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2395" source="CVE"/>
	<description>
	SQL injection vulnerability in the K2 (com_k2) component 1.0.1 Beta and earlier for Joomla! allows remote attackers to execute arbitrary SQL commands via the category parameter in an itemlist action to index.php.
	</description>
 </metadata>
<!-- 90d1e006eeffa0e68e97d94151105e3b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053690" comment="flash-player less than 9.0.246.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2404</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2404" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2404" source="CVE"/>
	<description>
	Heap-based buffer overflow in a regular-expression parser in Mozilla Network Security Services (NSS) before 3.12.3, as used in Firefox, Thunderbird, SeaMonkey, Evolution, Pidgin, and AOL Instant Messenger (AIM), allows remote SSL servers to cause a denial of service (application crash) or possibly execute arbitrary code via a long domain name in the subject's Common Name (CN) field of an X.509 certificate, related to the cert_TestHostName function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 658e1defc8ffc1599dd6698f8b3cf423 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055392" comment="seamonkey-dom-inspector less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055393" comment="seamonkey-irc less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055394" comment="seamonkey-mail less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055395" comment="seamonkey-spellchecker less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055396" comment="seamonkey-venkman less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055397" comment="seamonkey less than 1.1.18-0.1"/>
		</criteria>
	</criteria>
	<!-- 88998311a68eccd713940ec61168d250 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053961" comment="libfreebl3-32bit less than 3.12.3.1-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053962" comment="libfreebl3-64bit less than 3.12.3.1-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053963" comment="libfreebl3 less than 3.12.3.1-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054853" comment="mozilla-nspr-32bit less than 4.7.1-46.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054854" comment="mozilla-nspr-64bit less than 4.7.1-46.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054855" comment="mozilla-nspr-devel less than 4.7.1-46.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054856" comment="mozilla-nspr less than 4.7.1-46.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053964" comment="mozilla-nss-32bit less than 3.12.3.1-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053965" comment="mozilla-nss-64bit less than 3.12.3.1-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053966" comment="mozilla-nss-devel less than 3.12.3.1-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053967" comment="mozilla-nss-tools less than 3.12.3.1-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053968" comment="mozilla-nss less than 3.12.3.1-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2406</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2406" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2406" source="CVE"/>
	<description>
	Stack-based buffer overflow in the parse_tag_11_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to not ensuring that the key signature length in a Tag 11 packet is compatible with the key signature buffer size.
	</description>
 </metadata>
<!-- 82fe92100e56a9a9db21ff031e1cafb5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054123" comment="kernel-bigsmp less than 2.6.22.19-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054124" comment="kernel-debug less than 2.6.22.19-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054125" comment="kernel-default less than 2.6.22.19-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054126" comment="kernel-kdump less than 2.6.22.19-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054127" comment="kernel-ppc64 less than 2.6.22.19-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054128" comment="kernel-source less than 2.6.22.19-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054129" comment="kernel-syms less than 2.6.22.19-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054130" comment="kernel-xen less than 2.6.22.19-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054131" comment="kernel-xenpae less than 2.6.22.19-0.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2407</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2407" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2407" source="CVE"/>
	<description>
	Heap-based buffer overflow in the parse_tag_3_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to a large encrypted key size in a Tag 3 packet.
	</description>
 </metadata>
<!-- 82fe92100e56a9a9db21ff031e1cafb5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054123" comment="kernel-bigsmp less than 2.6.22.19-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054124" comment="kernel-debug less than 2.6.22.19-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054125" comment="kernel-default less than 2.6.22.19-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054126" comment="kernel-kdump less than 2.6.22.19-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054127" comment="kernel-ppc64 less than 2.6.22.19-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054128" comment="kernel-source less than 2.6.22.19-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054129" comment="kernel-syms less than 2.6.22.19-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054130" comment="kernel-xen less than 2.6.22.19-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054131" comment="kernel-xenpae less than 2.6.22.19-0.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2408</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2408" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2408" source="CVE"/>
	<description>
	Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2d6da5b45c1cb52d53132d6454cd0eee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054917" comment="mutt less than 1.5.16-36.2"/>
	</criteria>
	<!-- 61e8a7944bfbd369b915673c77e34371 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055782" comment="neon-32bit less than 0.26.4-17.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055783" comment="neon-64bit less than 0.26.4-17.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055784" comment="neon-devel less than 0.26.4-17.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055785" comment="neon less than 0.26.4-17.2"/>
		</criteria>
	</criteria>
	<!-- 658e1defc8ffc1599dd6698f8b3cf423 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055392" comment="seamonkey-dom-inspector less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055393" comment="seamonkey-irc less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055394" comment="seamonkey-mail less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055395" comment="seamonkey-spellchecker less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055396" comment="seamonkey-venkman less than 1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055397" comment="seamonkey less than 1.1.18-0.1"/>
		</criteria>
	</criteria>
	<!-- 88998311a68eccd713940ec61168d250 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053961" comment="libfreebl3-32bit less than 3.12.3.1-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053962" comment="libfreebl3-64bit less than 3.12.3.1-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053963" comment="libfreebl3 less than 3.12.3.1-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054853" comment="mozilla-nspr-32bit less than 4.7.1-46.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054854" comment="mozilla-nspr-64bit less than 4.7.1-46.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054855" comment="mozilla-nspr-devel less than 4.7.1-46.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054856" comment="mozilla-nspr less than 4.7.1-46.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053964" comment="mozilla-nss-32bit less than 3.12.3.1-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053965" comment="mozilla-nss-64bit less than 3.12.3.1-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053966" comment="mozilla-nss-devel less than 3.12.3.1-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053967" comment="mozilla-nss-tools less than 3.12.3.1-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053968" comment="mozilla-nss less than 3.12.3.1-1.1"/>
		</criteria>
	</criteria>
	<!-- b10a2a9334d9b8d94955c5dd39341957 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054857" comment="MozillaThunderbird-devel less than 2.0.0.23-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054858" comment="MozillaThunderbird-translations less than 2.0.0.23-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054859" comment="MozillaThunderbird less than 2.0.0.23-0.1"/>
		</criteria>
	</criteria>
	<!-- bc27de2ca066dbc73291508df81e8022 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054918" comment="openldap2-back-meta less than 2.3.37-7.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054919" comment="openldap2-back-perl less than 2.3.37-7.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054920" comment="openldap2-client-32bit less than 2.3.37-20.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054921" comment="openldap2-client-64bit less than 2.3.37-20.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054922" comment="openldap2-client less than 2.3.37-20.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054923" comment="openldap2-devel-32bit less than 2.3.37-20.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054924" comment="openldap2-devel-64bit less than 2.3.37-20.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054925" comment="openldap2-devel less than 2.3.37-20.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054926" comment="openldap2 less than 2.3.37-7.11"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2411</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2411" source="CVE"/>
	<description>
	Multiple integer overflows in the libsvn_delta library in Subversion before 1.5.7, and 1.6.x before 1.6.4, allow remote authenticated users and remote Subversion servers to execute arbitrary code via an svndiff stream with large windows that trigger a heap-based buffer overflow, a related issue to CVE-2009-2412.
	</description>
 </metadata>
<!-- ae2bbb2b4986f6568bb1908fa4bc6cc0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053831" comment="subversion-devel less than 1.4.4-30.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053832" comment="subversion-perl less than 1.4.4-30.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053833" comment="subversion-python less than 1.4.4-30.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053834" comment="subversion-server less than 1.4.4-30.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053835" comment="subversion-tools less than 1.4.4-30.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053836" comment="subversion less than 1.4.4-30.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2412</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2412" source="CVE"/>
	<description>
	Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- e5367e007c9fcb0acf4d2437c235d48e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055506" comment="libapr-util1-64bit less than 1.2.8-68.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055507" comment="libapr-util1-dbd-mysql less than 1.2.8-68.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055508" comment="libapr-util1-dbd-pgsql less than 1.2.8-68.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055509" comment="libapr-util1-dbd-sqlite3 less than 1.2.8-68.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055510" comment="libapr-util1-devel-64bit less than 1.2.8-68.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055511" comment="libapr-util1-devel less than 1.2.8-68.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055512" comment="libapr-util1 less than 1.2.8-68.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055513" comment="libapr1-64bit less than 1.2.9-9.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055514" comment="libapr1-devel-64bit less than 1.2.9-9.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055515" comment="libapr1-devel less than 1.2.9-9.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055516" comment="libapr1 less than 1.2.9-9.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2414</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2414" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2414" source="CVE"/>
	<description>
	Stack consumption vulnerability in libxml2 2.5.10, 2.6.16, 2.6.26, 2.6.27, and 2.6.32, and libxml 1.8.17, allows context-dependent attackers to cause a denial of service (application crash) via a large depth of element declarations in a DTD, related to a function recursion, as demonstrated by the Codenomicon XML fuzzing framework.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 52967c863368f15f7e08c1d3d7ffa498 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053788" comment="libxml2-32bit less than 2.6.30-4.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053789" comment="libxml2-64bit less than 2.6.30-4.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053790" comment="libxml2-devel-32bit less than 2.6.30-4.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053791" comment="libxml2-devel-64bit less than 2.6.30-4.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053792" comment="libxml2-devel less than 2.6.30-4.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053793" comment="libxml2 less than 2.6.30-4.13"/>
		</criteria>
	</criteria>
	<!-- e40be77af2d03aeb1e404e9f87be5d58 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054817" comment="libxml-32bit less than 1.8.17-450.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054818" comment="libxml-64bit less than 1.8.17-450.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054819" comment="libxml-devel less than 1.8.17-450.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054820" comment="libxml less than 1.8.17-450.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2415</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2415" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2415" source="CVE"/>
	<description>
	Multiple integer overflows in memcached 1.1.12 and 1.2.2 allow remote attackers to execute arbitrary code via vectors involving length attributes that trigger heap-based buffer overflows.
	</description>
 </metadata>
<!-- d817c4c810a64ac81c63c4303c942f8b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053770" comment="memcached less than 1.2.2-11.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2416</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2416" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2416" source="CVE"/>
	<description>
	Multiple use-after-free vulnerabilities in libxml2 2.5.10, 2.6.16, 2.6.26, 2.6.27, and 2.6.32, and libxml 1.8.17, allow context-dependent attackers to cause a denial of service (application crash) via crafted (1) Notation or (2) Enumeration attribute types in an XML file, as demonstrated by the Codenomicon XML fuzzing framework.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 52967c863368f15f7e08c1d3d7ffa498 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053788" comment="libxml2-32bit less than 2.6.30-4.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053789" comment="libxml2-64bit less than 2.6.30-4.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053790" comment="libxml2-devel-32bit less than 2.6.30-4.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053791" comment="libxml2-devel-64bit less than 2.6.30-4.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053792" comment="libxml2-devel less than 2.6.30-4.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053793" comment="libxml2 less than 2.6.30-4.13"/>
		</criteria>
	</criteria>
	<!-- e40be77af2d03aeb1e404e9f87be5d58 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054817" comment="libxml-32bit less than 1.8.17-450.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054818" comment="libxml-64bit less than 1.8.17-450.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054819" comment="libxml-devel less than 1.8.17-450.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054820" comment="libxml less than 1.8.17-450.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2417</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2417" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2417" source="CVE"/>
	<description>
	lib/ssluse.c in cURL and libcurl 7.4 through 7.19.5, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3cc9012067a7f4d656e1320cfb5d605d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053907" comment="libcurl3 less than 7.15.5-34.2"/>
	</criteria>
	<!-- d9fcbb2657cc43b738cfdba55a7e5c72 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053908" comment="libcurl2-32bit less than 7.11.0-32.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053909" comment="libcurl2-64bit less than 7.11.0-32.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053910" comment="libcurl2 less than 7.11.0-32.2"/>
		</criteria>
	</criteria>
	<!-- e45125b9ecda8788f5d94e3c0022985d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053911" comment="curl-ca-bundle less than 7.16.4-16.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053912" comment="curl less than 7.16.4-16.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053913" comment="libcurl-devel less than 7.16.4-16.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053914" comment="libcurl4-32bit less than 7.16.4-16.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053915" comment="libcurl4-64bit less than 7.16.4-16.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053916" comment="libcurl4 less than 7.16.4-16.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2446</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2446" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2446" source="CVE"/>
	<description>
	Multiple format string vulnerabilities in the dispatch_command function in libmysqld/sql_parse.cc in mysqld in MySQL 4.0.0 through 5.0.83 allow remote authenticated users to cause a denial of service (daemon crash) and possibly have unspecified other impact via format string specifiers in a database name in a (1) COM_CREATE_DB or (2) COM_DROP_DB request.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 00f6af27c9453ea91d6031df5dac835c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054299" comment="libmysqlclient-devel less than 5.0.45-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054300" comment="libmysqlclient15-32bit less than 5.0.45-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054301" comment="libmysqlclient15-64bit less than 5.0.45-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054302" comment="libmysqlclient15 less than 5.0.45-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054303" comment="libmysqlclient_r15-32bit less than 5.0.45-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054304" comment="libmysqlclient_r15-64bit less than 5.0.45-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054305" comment="libmysqlclient_r15 less than 5.0.45-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054306" comment="mysql-Max less than 5.0.45-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054307" comment="mysql-bench less than 5.0.45-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054308" comment="mysql-client less than 5.0.45-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054309" comment="mysql-debug less than 5.0.45-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054310" comment="mysql-tools less than 5.0.45-22.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054311" comment="mysql less than 5.0.45-22.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2462</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2462" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2462" source="CVE"/>
	<description>
	The browser engine in Mozilla Firefox before 3.0.12 and Thunderbird allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) the frame chain and synchronous events, (2) a SetMayHaveFrame assertion and nsCSSFrameConstructor::CreateFloatingLetterFrame, (3) nsCSSFrameConstructor::ConstructFrame, (4) the child list and initial reflow, (5) GetLastSpecialSibling, (6) nsFrameManager::GetPrimaryFrameFor and MathML, (7) nsFrame::GetBoxAscent, (8) nsCSSFrameConstructor::AdjustParentFrame, (9) nsDOMOfflineResourceList, and (10) nsContentUtils::ComparePosition.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5a573a9051f013b865d54393922a35ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053601" comment="MozillaFirefox-translations less than 3.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053602" comment="MozillaFirefox less than 3.0.12-0.1"/>
		</criteria>
	</criteria>
	<!-- 6c371e128c76aa3610afd400e700e0ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053601" comment="MozillaFirefox-translations less than 3.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053602" comment="MozillaFirefox less than 3.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053603" comment="mozilla-xulrunner190-32bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053604" comment="mozilla-xulrunner190-64bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053605" comment="mozilla-xulrunner190-devel less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053606" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053607" comment="mozilla-xulrunner190-gnomevfs-64bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053608" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053609" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053610" comment="mozilla-xulrunner190-translations-64bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053611" comment="mozilla-xulrunner190-translations less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053612" comment="mozilla-xulrunner190 less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053615" comment="python-xpcom190 less than 1.9.0.12-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2463</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2463" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2463" source="CVE"/>
	<description>
	Multiple integer overflows in the (1) PL_Base64Decode and (2) PL_Base64Encode functions in nsprpub/lib/libc/src/base64.c in Mozilla Firefox before 3.0.12, Thunderbird before 2.0.0.24, and SeaMonkey before 1.1.19 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors that trigger buffer overflows.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5a573a9051f013b865d54393922a35ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053601" comment="MozillaFirefox-translations less than 3.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053602" comment="MozillaFirefox less than 3.0.12-0.1"/>
		</criteria>
	</criteria>
	<!-- 6c371e128c76aa3610afd400e700e0ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053601" comment="MozillaFirefox-translations less than 3.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053602" comment="MozillaFirefox less than 3.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053603" comment="mozilla-xulrunner190-32bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053604" comment="mozilla-xulrunner190-64bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053605" comment="mozilla-xulrunner190-devel less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053606" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053607" comment="mozilla-xulrunner190-gnomevfs-64bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053608" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053609" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053610" comment="mozilla-xulrunner190-translations-64bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053611" comment="mozilla-xulrunner190-translations less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053612" comment="mozilla-xulrunner190 less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053615" comment="python-xpcom190 less than 1.9.0.12-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2464</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2464" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2464" source="CVE"/>
	<description>
	The nsXULTemplateQueryProcessorRDF::CheckIsSeparator function in Mozilla Firefox before 3.0.12, SeaMonkey 2.0a1pre, and Thunderbird allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to loading multiple RDF files in a XUL tree element.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5a573a9051f013b865d54393922a35ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053601" comment="MozillaFirefox-translations less than 3.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053602" comment="MozillaFirefox less than 3.0.12-0.1"/>
		</criteria>
	</criteria>
	<!-- 6c371e128c76aa3610afd400e700e0ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053601" comment="MozillaFirefox-translations less than 3.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053602" comment="MozillaFirefox less than 3.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053603" comment="mozilla-xulrunner190-32bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053604" comment="mozilla-xulrunner190-64bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053605" comment="mozilla-xulrunner190-devel less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053606" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053607" comment="mozilla-xulrunner190-gnomevfs-64bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053608" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053609" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053610" comment="mozilla-xulrunner190-translations-64bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053611" comment="mozilla-xulrunner190-translations less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053612" comment="mozilla-xulrunner190 less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053615" comment="python-xpcom190 less than 1.9.0.12-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2465</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2465" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2465" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.12 and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or execute arbitrary code via vectors involving double frame construction, related to (1) nsHTMLContentSink.cpp, (2) nsXMLContentSink.cpp, and (3) nsPresShell.cpp, and the nsSubDocumentFrame::Reflow function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5a573a9051f013b865d54393922a35ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053601" comment="MozillaFirefox-translations less than 3.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053602" comment="MozillaFirefox less than 3.0.12-0.1"/>
		</criteria>
	</criteria>
	<!-- 6c371e128c76aa3610afd400e700e0ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053601" comment="MozillaFirefox-translations less than 3.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053602" comment="MozillaFirefox less than 3.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053603" comment="mozilla-xulrunner190-32bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053604" comment="mozilla-xulrunner190-64bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053605" comment="mozilla-xulrunner190-devel less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053606" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053607" comment="mozilla-xulrunner190-gnomevfs-64bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053608" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053609" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053610" comment="mozilla-xulrunner190-translations-64bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053611" comment="mozilla-xulrunner190-translations less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053612" comment="mozilla-xulrunner190 less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053615" comment="python-xpcom190 less than 1.9.0.12-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2466</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2466" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2466" source="CVE"/>
	<description>
	The JavaScript engine in Mozilla Firefox before 3.0.12 and Thunderbird allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) nsDOMClassInfo.cpp, (2) JS_HashTableRawLookup, and (3) MirrorWrappedNativeParent and js_LockGCThingRT.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5a573a9051f013b865d54393922a35ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053601" comment="MozillaFirefox-translations less than 3.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053602" comment="MozillaFirefox less than 3.0.12-0.1"/>
		</criteria>
	</criteria>
	<!-- 6c371e128c76aa3610afd400e700e0ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053601" comment="MozillaFirefox-translations less than 3.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053602" comment="MozillaFirefox less than 3.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053603" comment="mozilla-xulrunner190-32bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053604" comment="mozilla-xulrunner190-64bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053605" comment="mozilla-xulrunner190-devel less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053606" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053607" comment="mozilla-xulrunner190-gnomevfs-64bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053608" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053609" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053610" comment="mozilla-xulrunner190-translations-64bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053611" comment="mozilla-xulrunner190-translations less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053612" comment="mozilla-xulrunner190 less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053615" comment="python-xpcom190 less than 1.9.0.12-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2467</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2467" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2467" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.12 and 3.5 before 3.5.1 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a Flash object, a slow script dialog, and the unloading of the Flash plugin, which triggers attempted use of a deleted object.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5a573a9051f013b865d54393922a35ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053601" comment="MozillaFirefox-translations less than 3.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053602" comment="MozillaFirefox less than 3.0.12-0.1"/>
		</criteria>
	</criteria>
	<!-- 6c371e128c76aa3610afd400e700e0ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053601" comment="MozillaFirefox-translations less than 3.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053602" comment="MozillaFirefox less than 3.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053603" comment="mozilla-xulrunner190-32bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053604" comment="mozilla-xulrunner190-64bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053605" comment="mozilla-xulrunner190-devel less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053606" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053607" comment="mozilla-xulrunner190-gnomevfs-64bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053608" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053609" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053610" comment="mozilla-xulrunner190-translations-64bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053611" comment="mozilla-xulrunner190-translations less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053612" comment="mozilla-xulrunner190 less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053615" comment="python-xpcom190 less than 1.9.0.12-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2469</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2469" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2469" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.12 does not properly handle an SVG element that has a property with a watch function and an __defineSetter__ function, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted document, related to a certain pointer misinterpretation.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5a573a9051f013b865d54393922a35ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053601" comment="MozillaFirefox-translations less than 3.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053602" comment="MozillaFirefox less than 3.0.12-0.1"/>
		</criteria>
	</criteria>
	<!-- 6c371e128c76aa3610afd400e700e0ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053601" comment="MozillaFirefox-translations less than 3.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053602" comment="MozillaFirefox less than 3.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053603" comment="mozilla-xulrunner190-32bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053604" comment="mozilla-xulrunner190-64bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053605" comment="mozilla-xulrunner190-devel less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053606" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053607" comment="mozilla-xulrunner190-gnomevfs-64bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053608" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053609" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053610" comment="mozilla-xulrunner190-translations-64bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053611" comment="mozilla-xulrunner190-translations less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053612" comment="mozilla-xulrunner190 less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053615" comment="python-xpcom190 less than 1.9.0.12-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2471</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2471" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2471" source="CVE"/>
	<description>
	The setTimeout function in Mozilla Firefox before 3.0.12 does not properly preserve object wrapping, which allows remote attackers to execute arbitrary JavaScript with chrome privileges via a crafted call, related to XPCNativeWrapper.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5a573a9051f013b865d54393922a35ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053601" comment="MozillaFirefox-translations less than 3.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053602" comment="MozillaFirefox less than 3.0.12-0.1"/>
		</criteria>
	</criteria>
	<!-- 6c371e128c76aa3610afd400e700e0ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053601" comment="MozillaFirefox-translations less than 3.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053602" comment="MozillaFirefox less than 3.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053603" comment="mozilla-xulrunner190-32bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053604" comment="mozilla-xulrunner190-64bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053605" comment="mozilla-xulrunner190-devel less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053606" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053607" comment="mozilla-xulrunner190-gnomevfs-64bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053608" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053609" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053610" comment="mozilla-xulrunner190-translations-64bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053611" comment="mozilla-xulrunner190-translations less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053612" comment="mozilla-xulrunner190 less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053615" comment="python-xpcom190 less than 1.9.0.12-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2472</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2472" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2472" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.12 does not always use XPCCrossOriginWrapper when required during object construction, which allows remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via a crafted document, related to a "cross origin wrapper bypass."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5a573a9051f013b865d54393922a35ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053601" comment="MozillaFirefox-translations less than 3.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053602" comment="MozillaFirefox less than 3.0.12-0.1"/>
		</criteria>
	</criteria>
	<!-- 6c371e128c76aa3610afd400e700e0ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053601" comment="MozillaFirefox-translations less than 3.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053602" comment="MozillaFirefox less than 3.0.12-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053603" comment="mozilla-xulrunner190-32bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053604" comment="mozilla-xulrunner190-64bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053605" comment="mozilla-xulrunner190-devel less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053606" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053607" comment="mozilla-xulrunner190-gnomevfs-64bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053608" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053609" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053610" comment="mozilla-xulrunner190-translations-64bit less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053611" comment="mozilla-xulrunner190-translations less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053612" comment="mozilla-xulrunner190 less than 1.9.0.12-1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053615" comment="python-xpcom190 less than 1.9.0.12-1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2473</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2473" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2473" source="CVE"/>
	<description>
	neon before 0.28.6, when expat is used, does not properly detect recursion during entity expansion, which allows context-dependent attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity references, a similar issue to CVE-2003-1564.
	</description>
 </metadata>
<!-- 61e8a7944bfbd369b915673c77e34371 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055782" comment="neon-32bit less than 0.26.4-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055783" comment="neon-64bit less than 0.26.4-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055784" comment="neon-devel less than 0.26.4-17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055785" comment="neon less than 0.26.4-17.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2475</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2475" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2475" source="CVE"/>
	<description>
	Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, might allow context-dependent attackers to obtain sensitive information via vectors involving static variables that are declared without the final keyword, related to (1) LayoutQueue, (2) Cursor.predefined, (3) AccessibleResourceBundle.getContents, (4) ImageReaderSpi.STANDARD_INPUT_TYPE, (5) ImageWriterSpi.STANDARD_OUTPUT_TYPE, (6) the imageio plugins, (7) DnsContext.debug, (8) RmfFileReader/StandardMidiFileWriter.types, (9) AbstractSaslImpl.logger, (10) Synth.Region.uiToRegionMap/lowerCaseNameMap, (11) the Introspector class and a cache of BeanInfo, and (12) JAX-WS, a different vulnerability than CVE-2009-2673.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a9f7f45946944bd6e787c0152af4bc32 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053743" comment="java-1_6_0-sun-alsa less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053744" comment="java-1_6_0-sun-demo less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053745" comment="java-1_6_0-sun-devel less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053746" comment="java-1_6_0-sun-jdbc less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053747" comment="java-1_6_0-sun-plugin less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053748" comment="java-1_6_0-sun-src less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053749" comment="java-1_6_0-sun less than 1.6.0.u15-0.1"/>
		</criteria>
	</criteria>
	<!-- fb3a26f625b309b047dda33b7f65a7fc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053750" comment="java-1_5_0-sun-alsa less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053751" comment="java-1_5_0-sun-demo less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053752" comment="java-1_5_0-sun-devel less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053753" comment="java-1_5_0-sun-jdbc less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053754" comment="java-1_5_0-sun-plugin less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053755" comment="java-1_5_0-sun-src less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053756" comment="java-1_5_0-sun less than 1.5.0_update20-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2476</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2476" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2476" source="CVE"/>
	<description>
	The Java Management Extensions (JMX) implementation in Sun Java SE 6 before Update 15, and OpenJDK, does not properly enforce OpenType checks, which allows context-dependent attackers to bypass intended access restrictions by leveraging finalizer resurrection to obtain a reference to a privileged object.
	</description>
 </metadata>
<!-- a9f7f45946944bd6e787c0152af4bc32 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053743" comment="java-1_6_0-sun-alsa less than 1.6.0.u15-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053744" comment="java-1_6_0-sun-demo less than 1.6.0.u15-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053745" comment="java-1_6_0-sun-devel less than 1.6.0.u15-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053746" comment="java-1_6_0-sun-jdbc less than 1.6.0.u15-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053747" comment="java-1_6_0-sun-plugin less than 1.6.0.u15-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053748" comment="java-1_6_0-sun-src less than 1.6.0.u15-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053749" comment="java-1_6_0-sun less than 1.6.0.u15-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2493</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2493" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2493" source="CVE"/>
	<description>
	The Active Template Library (ATL) in Microsoft Visual Studio .NET 2003 SP1, Visual Studio 2005 SP1 and 2008 Gold and SP1, and Visual C++ 2005 SP1 and 2008 Gold and SP1; and Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2; does not properly restrict use of OleLoadFromStream in instantiating objects from data streams, which allows remote attackers to execute arbitrary code via a crafted HTML document with an ATL (1) component or (2) control, related to ATL headers and bypassing security policies, aka "ATL COM Initialization Vulnerability."
	</description>
 </metadata>
<!-- 90d1e006eeffa0e68e97d94151105e3b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053690" comment="flash-player less than 9.0.246.0-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2562</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2562" source="CVE"/>
	<description>
	Unspecified vulnerability in the AFS dissector in Wireshark 0.9.2 through 1.2.0 allows remote attackers to cause a denial of service (crash) via unknown vectors.
	</description>
 </metadata>
<!-- 91a6f977f69fd5e485d5026e78bde299 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054504" comment="wireshark-devel less than 0.99.6-31.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054505" comment="wireshark less than 0.99.6-31.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2564</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2564" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2564" source="CVE"/>
	<description>
	NOS Microsystems getPlus Download Manager, as used in Adobe Reader 1.6.2.36 and possibly other versions, Corel getPlus Download Manager before 1.5.0.48, and possibly other products, installs NOS\bin\getPlus_HelperSvc.exe with insecure permissions (Everyone:Full Control), which allows local users to gain SYSTEM privileges by replacing getPlus_HelperSvc.exe with a Trojan horse program, as demonstrated by use of getPlus Download Manager within Adobe Reader. NOTE: within Adobe Reader, the scope of this issue is limited because the program is deleted and the associated service is not automatically launched after a successful installation and reboot.
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055718" comment="acroread less than 8.1.7-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2625</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2625" source="CVE"/>
	<description>
	XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.
	</description>
 </metadata>
<!-- cddc4c67c5e717923e57de74681f253e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054313" comment="xerces-j2-demo less than 2.8.1-85.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054314" comment="xerces-j2-javadoc-apis less than 2.8.1-85.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054315" comment="xerces-j2-javadoc-dom3 less than 2.8.1-85.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054316" comment="xerces-j2-javadoc-impl less than 2.8.1-85.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054317" comment="xerces-j2-javadoc-other less than 2.8.1-85.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054318" comment="xerces-j2-javadoc-xni less than 2.8.1-85.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054319" comment="xerces-j2-scripts less than 2.8.1-85.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054320" comment="xerces-j2-xml-apis less than 2.8.1-85.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054321" comment="xerces-j2-xml-resolver less than 2.8.1-85.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054322" comment="xerces-j2 less than 2.8.1-85.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2632</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2632" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2632" source="CVE"/>
	<description>
	Buffer overflow in the SIEVE script component (sieve/script.c), as used in cyrus-imapd in Cyrus IMAP Server 2.2.13 and 2.3.14, and Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, allows local users to execute arbitrary code and read or modify arbitrary messages via a crafted SIEVE script, related to the incorrect use of the sizeof operator for determining buffer length, combined with an integer signedness error.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4c6fb0616c0f857515d6214e8a743afd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055135" comment="dovecot-devel less than 1.0.5-6.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055136" comment="dovecot less than 1.0.5-6.6"/>
		</criteria>
	</criteria>
	<!-- 755ce4d6ccf40fc2aaaf95a0beac23df -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054927" comment="cyrus-imapd-devel less than 2.3.8-51.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054928" comment="cyrus-imapd less than 2.3.8-51.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054929" comment="perl-Cyrus-IMAP less than 2.3.8-51.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054930" comment="perl-Cyrus-SIEVE-managesieve less than 2.3.8-51.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2654</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2654" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.13, and 3.5.x before 3.5.2, allows remote attackers to spoof the address bar, and possibly conduct phishing attacks, via a crafted web page that calls window.open with an invalid character in the URL, makes document.write calls to the resulting object, and then calls the stop method during the loading of the error page.
	</description>
 </metadata>
<!-- 203960e47792969351a0b2600b4300c4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054860" comment="MozillaFirefox-translations less than 3.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054861" comment="MozillaFirefox less than 3.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054862" comment="mozilla-xulrunner190-32bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054863" comment="mozilla-xulrunner190-64bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054864" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054865" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054866" comment="mozilla-xulrunner190-gnomevfs-64bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054867" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054868" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054869" comment="mozilla-xulrunner190-translations-64bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054870" comment="mozilla-xulrunner190-translations less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054871" comment="mozilla-xulrunner190 less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054872" comment="python-xpcom190 less than 1.9.0.14-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2661</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2661" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2661" source="CVE"/>
	<description>
	The asn1_length function in strongSwan 2.8 before 2.8.11, 4.2 before 4.2.17, and 4.3 before 4.3.3 does not properly handle X.509 certificates with crafted Relative Distinguished Names (RDNs), which allows remote attackers to cause a denial of service (pluto IKE daemon crash) via malformed ASN.1 data.  NOTE: this is due to an incomplete fix for CVE-2009-2185.
	</description>
 </metadata>
<!-- 1538fd78cacfab3671959251b90700ae -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054931" comment="openswan-doc less than 2.4.7-64.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054932" comment="openswan less than 2.4.7-64.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2662</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2662" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2662" source="CVE"/>
	<description>
	The browser engine in Mozilla Firefox 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the TraceRecorder::snapshot function in js/src/jstracer.cpp, and unspecified other vectors.
	</description>
 </metadata>
<!-- 203960e47792969351a0b2600b4300c4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054860" comment="MozillaFirefox-translations less than 3.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054861" comment="MozillaFirefox less than 3.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054862" comment="mozilla-xulrunner190-32bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054863" comment="mozilla-xulrunner190-64bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054864" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054865" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054866" comment="mozilla-xulrunner190-gnomevfs-64bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054867" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054868" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054869" comment="mozilla-xulrunner190-translations-64bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054870" comment="mozilla-xulrunner190-translations less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054871" comment="mozilla-xulrunner190 less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054872" comment="python-xpcom190 less than 1.9.0.14-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2663</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2663" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2663" source="CVE"/>
	<description>
	libvorbis before r16182, as used in Mozilla Firefox 3.5.x before 3.5.2 and other products, allows context-dependent attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted .ogg file.
	</description>
 </metadata>
<!-- 203960e47792969351a0b2600b4300c4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054860" comment="MozillaFirefox-translations less than 3.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054861" comment="MozillaFirefox less than 3.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054862" comment="mozilla-xulrunner190-32bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054863" comment="mozilla-xulrunner190-64bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054864" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054865" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054866" comment="mozilla-xulrunner190-gnomevfs-64bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054867" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054868" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054869" comment="mozilla-xulrunner190-translations-64bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054870" comment="mozilla-xulrunner190-translations less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054871" comment="mozilla-xulrunner190 less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054872" comment="python-xpcom190 less than 1.9.0.14-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2664</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2664" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2664" source="CVE"/>
	<description>
	The js_watch_set function in js/src/jsdbgapi.cpp in the JavaScript engine in Mozilla Firefox before 3.0.12 allows remote attackers to cause a denial of service (assertion failure and application exit) or possibly execute arbitrary code via a crafted .js file, related to a "memory safety bug." NOTE: this was originally reported as affecting versions before 3.0.13.
	</description>
 </metadata>
<!-- 203960e47792969351a0b2600b4300c4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054860" comment="MozillaFirefox-translations less than 3.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054861" comment="MozillaFirefox less than 3.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054862" comment="mozilla-xulrunner190-32bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054863" comment="mozilla-xulrunner190-64bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054864" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054865" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054866" comment="mozilla-xulrunner190-gnomevfs-64bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054867" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054868" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054869" comment="mozilla-xulrunner190-translations-64bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054870" comment="mozilla-xulrunner190-translations less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054871" comment="mozilla-xulrunner190 less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054872" comment="python-xpcom190 less than 1.9.0.14-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2666</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2666" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2666" source="CVE"/>
	<description>
	socket.c in fetchmail before 6.3.11 does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
	</description>
 </metadata>
<!-- fb167fbbc414765fe96c2fd6c188d65f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053794" comment="fetchmail less than 6.3.8-57.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053795" comment="fetchmailconf less than 6.3.8-57.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2670</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2670" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2670" source="CVE"/>
	<description>
	The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a9f7f45946944bd6e787c0152af4bc32 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053743" comment="java-1_6_0-sun-alsa less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053744" comment="java-1_6_0-sun-demo less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053745" comment="java-1_6_0-sun-devel less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053746" comment="java-1_6_0-sun-jdbc less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053747" comment="java-1_6_0-sun-plugin less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053748" comment="java-1_6_0-sun-src less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053749" comment="java-1_6_0-sun less than 1.6.0.u15-0.1"/>
		</criteria>
	</criteria>
	<!-- fb3a26f625b309b047dda33b7f65a7fc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053750" comment="java-1_5_0-sun-alsa less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053751" comment="java-1_5_0-sun-demo less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053752" comment="java-1_5_0-sun-devel less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053753" comment="java-1_5_0-sun-jdbc less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053754" comment="java-1_5_0-sun-plugin less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053755" comment="java-1_5_0-sun-src less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053756" comment="java-1_5_0-sun less than 1.5.0_update20-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2671</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2671" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2671" source="CVE"/>
	<description>
	The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a9f7f45946944bd6e787c0152af4bc32 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053743" comment="java-1_6_0-sun-alsa less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053744" comment="java-1_6_0-sun-demo less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053745" comment="java-1_6_0-sun-devel less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053746" comment="java-1_6_0-sun-jdbc less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053747" comment="java-1_6_0-sun-plugin less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053748" comment="java-1_6_0-sun-src less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053749" comment="java-1_6_0-sun less than 1.6.0.u15-0.1"/>
		</criteria>
	</criteria>
	<!-- fb3a26f625b309b047dda33b7f65a7fc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053750" comment="java-1_5_0-sun-alsa less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053751" comment="java-1_5_0-sun-demo less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053752" comment="java-1_5_0-sun-devel less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053753" comment="java-1_5_0-sun-jdbc less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053754" comment="java-1_5_0-sun-plugin less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053755" comment="java-1_5_0-sun-src less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053756" comment="java-1_5_0-sun less than 1.5.0_update20-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2672</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2672" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2672" source="CVE"/>
	<description>
	The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a9f7f45946944bd6e787c0152af4bc32 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053743" comment="java-1_6_0-sun-alsa less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053744" comment="java-1_6_0-sun-demo less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053745" comment="java-1_6_0-sun-devel less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053746" comment="java-1_6_0-sun-jdbc less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053747" comment="java-1_6_0-sun-plugin less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053748" comment="java-1_6_0-sun-src less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053749" comment="java-1_6_0-sun less than 1.6.0.u15-0.1"/>
		</criteria>
	</criteria>
	<!-- fb3a26f625b309b047dda33b7f65a7fc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053750" comment="java-1_5_0-sun-alsa less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053751" comment="java-1_5_0-sun-demo less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053752" comment="java-1_5_0-sun-devel less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053753" comment="java-1_5_0-sun-jdbc less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053754" comment="java-1_5_0-sun-plugin less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053755" comment="java-1_5_0-sun-src less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053756" comment="java-1_5_0-sun less than 1.5.0_update20-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2673</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2673" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2673" source="CVE"/>
	<description>
	The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a9f7f45946944bd6e787c0152af4bc32 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053743" comment="java-1_6_0-sun-alsa less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053744" comment="java-1_6_0-sun-demo less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053745" comment="java-1_6_0-sun-devel less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053746" comment="java-1_6_0-sun-jdbc less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053747" comment="java-1_6_0-sun-plugin less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053748" comment="java-1_6_0-sun-src less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053749" comment="java-1_6_0-sun less than 1.6.0.u15-0.1"/>
		</criteria>
	</criteria>
	<!-- fb3a26f625b309b047dda33b7f65a7fc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053750" comment="java-1_5_0-sun-alsa less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053751" comment="java-1_5_0-sun-demo less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053752" comment="java-1_5_0-sun-devel less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053753" comment="java-1_5_0-sun-jdbc less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053754" comment="java-1_5_0-sun-plugin less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053755" comment="java-1_5_0-sun-src less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053756" comment="java-1_5_0-sun less than 1.5.0_update20-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2674</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2674" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2674" source="CVE"/>
	<description>
	Integer overflow in javaws.exe in Sun Java Web Start in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 allows context-dependent attackers to execute arbitrary code via a crafted JPEG image that is not properly handled during display to a splash screen, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a9f7f45946944bd6e787c0152af4bc32 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053743" comment="java-1_6_0-sun-alsa less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053744" comment="java-1_6_0-sun-demo less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053745" comment="java-1_6_0-sun-devel less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053746" comment="java-1_6_0-sun-jdbc less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053747" comment="java-1_6_0-sun-plugin less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053748" comment="java-1_6_0-sun-src less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053749" comment="java-1_6_0-sun less than 1.6.0.u15-0.1"/>
		</criteria>
	</criteria>
	<!-- fb3a26f625b309b047dda33b7f65a7fc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053750" comment="java-1_5_0-sun-alsa less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053751" comment="java-1_5_0-sun-demo less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053752" comment="java-1_5_0-sun-devel less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053753" comment="java-1_5_0-sun-jdbc less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053754" comment="java-1_5_0-sun-plugin less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053755" comment="java-1_5_0-sun-src less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053756" comment="java-1_5_0-sun less than 1.5.0_update20-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2675</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2675" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2675" source="CVE"/>
	<description>
	Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a9f7f45946944bd6e787c0152af4bc32 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053743" comment="java-1_6_0-sun-alsa less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053744" comment="java-1_6_0-sun-demo less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053745" comment="java-1_6_0-sun-devel less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053746" comment="java-1_6_0-sun-jdbc less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053747" comment="java-1_6_0-sun-plugin less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053748" comment="java-1_6_0-sun-src less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053749" comment="java-1_6_0-sun less than 1.6.0.u15-0.1"/>
		</criteria>
	</criteria>
	<!-- fb3a26f625b309b047dda33b7f65a7fc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053750" comment="java-1_5_0-sun-alsa less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053751" comment="java-1_5_0-sun-demo less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053752" comment="java-1_5_0-sun-devel less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053753" comment="java-1_5_0-sun-jdbc less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053754" comment="java-1_5_0-sun-plugin less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053755" comment="java-1_5_0-sun-src less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053756" comment="java-1_5_0-sun less than 1.5.0_update20-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2676</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2676" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2676" source="CVE"/>
	<description>
	Unspecified vulnerability in JNLPAppletlauncher in Sun Java SE, and SE for Business, in JDK and JRE 6 Update 14 and earlier and JDK and JRE 5.0 Update 19 and earlier; and Java SE for Business in SDK and JRE 1.4.2_21 and earlier; allows remote attackers to create or modify arbitrary files via vectors involving an untrusted Java applet that accesses an old version of JNLPAppletLauncher.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a9f7f45946944bd6e787c0152af4bc32 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053743" comment="java-1_6_0-sun-alsa less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053744" comment="java-1_6_0-sun-demo less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053745" comment="java-1_6_0-sun-devel less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053746" comment="java-1_6_0-sun-jdbc less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053747" comment="java-1_6_0-sun-plugin less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053748" comment="java-1_6_0-sun-src less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053749" comment="java-1_6_0-sun less than 1.6.0.u15-0.1"/>
		</criteria>
	</criteria>
	<!-- fb3a26f625b309b047dda33b7f65a7fc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053750" comment="java-1_5_0-sun-alsa less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053751" comment="java-1_5_0-sun-demo less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053752" comment="java-1_5_0-sun-devel less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053753" comment="java-1_5_0-sun-jdbc less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053754" comment="java-1_5_0-sun-plugin less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053755" comment="java-1_5_0-sun-src less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053756" comment="java-1_5_0-sun less than 1.5.0_update20-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2687</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2687" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2687" source="CVE"/>
	<description>
	The exif_read_data function in the Exif module in PHP before 5.2.10 allows remote attackers to cause a denial of service (crash) via a malformed JPEG image with invalid offset fields, a different issue than CVE-2005-3353.
	</description>
 </metadata>
<!-- cef8c37e542688ee2ca3e259a02c041f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055189" comment="apache2-mod_php5 less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055190" comment="php5-bcmath less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055191" comment="php5-bz2 less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055192" comment="php5-calendar less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055193" comment="php5-ctype less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055194" comment="php5-curl less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055195" comment="php5-dba less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055196" comment="php5-dbase less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055197" comment="php5-devel less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055198" comment="php5-dom less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055199" comment="php5-exif less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055200" comment="php5-fastcgi less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055201" comment="php5-ftp less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055202" comment="php5-gd less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055203" comment="php5-gettext less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055204" comment="php5-gmp less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055205" comment="php5-hash less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055206" comment="php5-iconv less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055207" comment="php5-imap less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055208" comment="php5-json less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055209" comment="php5-ldap less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055210" comment="php5-mbstring less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055211" comment="php5-mcrypt less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055212" comment="php5-mhash less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055213" comment="php5-mysql less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055214" comment="php5-ncurses less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055215" comment="php5-odbc less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055216" comment="php5-openssl less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055217" comment="php5-pcntl less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055218" comment="php5-pdo less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055219" comment="php5-pear less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055220" comment="php5-pgsql less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055221" comment="php5-posix less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055222" comment="php5-pspell less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055223" comment="php5-readline less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055224" comment="php5-shmop less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055225" comment="php5-snmp less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055226" comment="php5-soap less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055227" comment="php5-sockets less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055228" comment="php5-sqlite less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055229" comment="php5-suhosin less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055230" comment="php5-sysvmsg less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055231" comment="php5-sysvsem less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055232" comment="php5-sysvshm less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055233" comment="php5-tidy less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055234" comment="php5-tokenizer less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055235" comment="php5-wddx less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055236" comment="php5-xmlreader less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055237" comment="php5-xmlrpc less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055238" comment="php5-xmlwriter less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055239" comment="php5-xsl less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055240" comment="php5-zip less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055241" comment="php5-zlib less than 5.2.11-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2688</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2688" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2688" source="CVE"/>
	<description>
	Multiple integer overflows in glyphs-eimage.c in XEmacs 21.4.22, when running on Windows, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via (1) the tiff_instantiate function processing a crafted TIFF file, (2) the png_instantiate function processing a crafted PNG file, and (3) the jpeg_instantiate function processing a crafted JPEG file, all which trigger a heap-based buffer overflow.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
	</description>
 </metadata>
<!-- e6ee4ec015c33dd7280fb4997105605a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054262" comment="xemacs-el less than 21.5.28.20070807-24.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054263" comment="xemacs-info less than 21.5.28.20070807-24.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054264" comment="xemacs less than 21.5.28.20070807-24.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2689</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2689" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2689" source="CVE"/>
	<description>
	JDK13Services.getProviders in Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, grants full privileges to instances of unspecified object types, which allows context-dependent attackers to bypass intended access restrictions via an untrusted (1) applet or (2) application.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a9f7f45946944bd6e787c0152af4bc32 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053743" comment="java-1_6_0-sun-alsa less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053744" comment="java-1_6_0-sun-demo less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053745" comment="java-1_6_0-sun-devel less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053746" comment="java-1_6_0-sun-jdbc less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053747" comment="java-1_6_0-sun-plugin less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053748" comment="java-1_6_0-sun-src less than 1.6.0.u15-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053749" comment="java-1_6_0-sun less than 1.6.0.u15-0.1"/>
		</criteria>
	</criteria>
	<!-- fb3a26f625b309b047dda33b7f65a7fc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053750" comment="java-1_5_0-sun-alsa less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053751" comment="java-1_5_0-sun-demo less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053752" comment="java-1_5_0-sun-devel less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053753" comment="java-1_5_0-sun-jdbc less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053754" comment="java-1_5_0-sun-plugin less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053755" comment="java-1_5_0-sun-src less than 1.5.0_update20-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053756" comment="java-1_5_0-sun less than 1.5.0_update20-0.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2690</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2690" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2690" source="CVE"/>
	<description>
	The encoder in Sun Java SE 6 before Update 15, and OpenJDK, grants read access to private variables with unspecified names, which allows context-dependent attackers to obtain sensitive information via an untrusted (1) applet or (2) application.
	</description>
 </metadata>
<!-- a9f7f45946944bd6e787c0152af4bc32 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053743" comment="java-1_6_0-sun-alsa less than 1.6.0.u15-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053744" comment="java-1_6_0-sun-demo less than 1.6.0.u15-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053745" comment="java-1_6_0-sun-devel less than 1.6.0.u15-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053746" comment="java-1_6_0-sun-jdbc less than 1.6.0.u15-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053747" comment="java-1_6_0-sun-plugin less than 1.6.0.u15-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053748" comment="java-1_6_0-sun-src less than 1.6.0.u15-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053749" comment="java-1_6_0-sun less than 1.6.0.u15-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2692</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2692" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2692" source="CVE"/>
	<description>
	The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not initialize all function pointers for socket operations in proto_ops structures, which allows local users to trigger a NULL pointer dereference and gain privileges by using mmap to map page zero, placing arbitrary code on this page, and then invoking an unavailable operation, as demonstrated by the sendpage operation (sock_sendpage function) on a PF_PPPOX socket.
	</description>
 </metadata>
<!-- 82fe92100e56a9a9db21ff031e1cafb5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054123" comment="kernel-bigsmp less than 2.6.22.19-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054124" comment="kernel-debug less than 2.6.22.19-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054125" comment="kernel-default less than 2.6.22.19-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054126" comment="kernel-kdump less than 2.6.22.19-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054127" comment="kernel-ppc64 less than 2.6.22.19-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054128" comment="kernel-source less than 2.6.22.19-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054129" comment="kernel-syms less than 2.6.22.19-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054130" comment="kernel-xen less than 2.6.22.19-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054131" comment="kernel-xenpae less than 2.6.22.19-0.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2694</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2694" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2694" source="CVE"/>
	<description>
	The msn_slplink_process_msg function in libpurple/protocols/msn/slplink.c in libpurple, as used in Pidgin (formerly Gaim) before 2.5.9 and Adium 1.3.5 and earlier, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) by sending multiple crafted SLP (aka MSNSLP) messages to trigger an overwrite of an arbitrary memory location.  NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-1376.
	</description>
 </metadata>
<!-- 06ca1d5a54f2a96ff665c2afad49154c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054443" comment="finch-devel less than 2.3.1-26.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054444" comment="finch less than 2.3.1-26.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054445" comment="libpurple-devel less than 2.3.1-26.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054446" comment="libpurple-meanwhile less than 2.3.1-26.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054447" comment="libpurple-mono less than 2.3.1-26.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054448" comment="libpurple less than 2.3.1-26.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054449" comment="pidgin-devel less than 2.3.1-26.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054450" comment="pidgin less than 2.3.1-26.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2730</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2730" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2730" source="CVE"/>
	<description>
	libgnutls in GnuTLS before 2.8.2 does not properly handle a '\0' character in a domain name in the subject's (1) Common Name (CN) or (2) Subject Alternative Name (SAN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
	</description>
 </metadata>
<!-- 012991c059eaec5ca5ff8127859c4bd5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054782" comment="gnutls-32bit less than 1.6.1-36.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054783" comment="gnutls-64bit less than 1.6.1-36.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054784" comment="gnutls-devel-32bit less than 1.6.1-36.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054785" comment="gnutls-devel-64bit less than 1.6.1-36.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054786" comment="gnutls-devel less than 1.6.1-36.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054787" comment="gnutls less than 1.6.1-36.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2813</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2813" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2813" source="CVE"/>
	<description>
	Samba 3.4 before 3.4.2, 3.3 before 3.3.8, 3.2 before 3.2.15, and 3.0.12 through 3.0.36, as used in the SMB subsystem in Apple Mac OS X 10.5.8 when Windows File Sharing is enabled, Fedora 11, and other operating systems, does not properly handle errors in resolving pathnames, which allows remote authenticated users to bypass intended sharing restrictions, and read, create, or modify files, in certain circumstances involving user accounts that lack home directories.
	</description>
 </metadata>
<!-- ed5800f3f23ff36656d08ea5801f483c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055517" comment="cifs-mount less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055518" comment="ldapsmb less than 1.34b-110.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055519" comment="libmsrpc-devel less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055520" comment="libmsrpc less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055521" comment="libsmbclient-32bit less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055522" comment="libsmbclient-64bit less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055523" comment="libsmbclient-devel less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055524" comment="libsmbclient less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055525" comment="libsmbsharemodes-devel less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055526" comment="libsmbsharemodes less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055527" comment="samba-32bit less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055528" comment="samba-64bit less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055529" comment="samba-client-32bit less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055530" comment="samba-client-64bit less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055531" comment="samba-client less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055532" comment="samba-devel less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055533" comment="samba-krb-printing less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055534" comment="samba-python less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055535" comment="samba-vscan less than 0.3.6b-181.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055536" comment="samba-winbind-32bit less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055537" comment="samba-winbind-64bit less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055538" comment="samba-winbind less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055539" comment="samba less than 3.0.32-0.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2905</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2905" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2905" source="CVE"/>
	<description>
	Heap-based buffer overflow in textbox.c in newt 0.51.5, 0.51.6, and 0.52.2 allows local users to cause a denial of service (application crash) or possibly execute arbitrary code via a request to display a crafted text dialog box.
	</description>
 </metadata>
<!-- a653de9011a155a32e8510c3e40539a7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055398" comment="newt-32bit less than 0.52.7-36.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055399" comment="newt-64bit less than 0.52.7-36.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055400" comment="newt-devel less than 0.52.7-36.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055401" comment="newt-doc less than 0.52.7-36.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055402" comment="newt-static less than 0.52.7-36.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055403" comment="newt less than 0.52.7-36.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2906</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2906" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2906" source="CVE"/>
	<description>
	smbd in Samba 3.0 before 3.0.37, 3.2 before 3.2.15, 3.3 before 3.3.8, and 3.4 before 3.4.2 allows remote authenticated users to cause a denial of service (infinite loop) via an unanticipated oplock break notification reply packet.
	</description>
 </metadata>
<!-- ed5800f3f23ff36656d08ea5801f483c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055517" comment="cifs-mount less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055518" comment="ldapsmb less than 1.34b-110.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055519" comment="libmsrpc-devel less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055520" comment="libmsrpc less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055521" comment="libsmbclient-32bit less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055522" comment="libsmbclient-64bit less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055523" comment="libsmbclient-devel less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055524" comment="libsmbclient less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055525" comment="libsmbsharemodes-devel less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055526" comment="libsmbsharemodes less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055527" comment="samba-32bit less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055528" comment="samba-64bit less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055529" comment="samba-client-32bit less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055530" comment="samba-client-64bit less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055531" comment="samba-client less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055532" comment="samba-devel less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055533" comment="samba-krb-printing less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055534" comment="samba-python less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055535" comment="samba-vscan less than 0.3.6b-181.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055536" comment="samba-winbind-32bit less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055537" comment="samba-winbind-64bit less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055538" comment="samba-winbind less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055539" comment="samba less than 3.0.32-0.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2948</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2948" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2948" source="CVE"/>
	<description>
	mount.cifs in Samba 3.0 before 3.0.37, 3.2 before 3.2.15, 3.3 before 3.3.8 and 3.4 before 3.4.2, when mount.cifs is installed suid root, does not properly enforce permissions, which allows local users to read part of the credentials file and obtain the password by specifying the path to the credentials file and using the --verbose or -v option.
	</description>
 </metadata>
<!-- ed5800f3f23ff36656d08ea5801f483c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055517" comment="cifs-mount less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055518" comment="ldapsmb less than 1.34b-110.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055519" comment="libmsrpc-devel less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055520" comment="libmsrpc less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055521" comment="libsmbclient-32bit less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055522" comment="libsmbclient-64bit less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055523" comment="libsmbclient-devel less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055524" comment="libsmbclient less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055525" comment="libsmbsharemodes-devel less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055526" comment="libsmbsharemodes less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055527" comment="samba-32bit less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055528" comment="samba-64bit less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055529" comment="samba-client-32bit less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055530" comment="samba-client-64bit less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055531" comment="samba-client less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055532" comment="samba-devel less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055533" comment="samba-krb-printing less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055534" comment="samba-python less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055535" comment="samba-vscan less than 0.3.6b-181.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055536" comment="samba-winbind-32bit less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055537" comment="samba-winbind-64bit less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055538" comment="samba-winbind less than 3.0.32-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055539" comment="samba less than 3.0.32-0.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2957</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2957" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2957" source="CVE"/>
	<description>
	Heap-based buffer overflow in the tftp_request function in tftp.c in dnsmasq before 2.50, when --enable-tftp is used, might allow remote attackers to execute arbitrary code via a long filename in a TFTP packet, as demonstrated by a read (aka RRQ) request.
	</description>
 </metadata>
<!-- eb674d821667b79bb118be56e3f659e7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054821" comment="dnsmasq less than 2.45-0.3"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2958</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2958" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2958" source="CVE"/>
	<description>
	The tftp_request function in tftp.c in dnsmasq before 2.50, when --enable-tftp is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a TFTP read (aka RRQ) request with a malformed blksize option.
	</description>
 </metadata>
<!-- eb674d821667b79bb118be56e3f659e7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054821" comment="dnsmasq less than 2.45-0.3"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2979</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2979" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2979" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.2, 8.x before 8.1.7, and possibly 7.x through 7.1.4 do not properly perform XMP-XML entity expansion, which allows remote attackers to cause a denial of service via a crafted document.
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055718" comment="acroread less than 8.1.7-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2980</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2980" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2980" source="CVE"/>
	<description>
	Integer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allows attackers to cause a denial of service or possibly execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055718" comment="acroread less than 8.1.7-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2981</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2981" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2981" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 do not properly validate input, which might allow attackers to bypass intended Trust Manager restrictions via unspecified vectors.
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055718" comment="acroread less than 8.1.7-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2982</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2982" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2982" source="CVE"/>
	<description>
	An unspecified certificate in Adobe Reader and Acrobat 9.x before 9.2, 8.x before 8.1.7, and possibly 7.x through 7.1.4 might allow remote attackers to conduct a "social engineering attack" via unknown vectors.
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055718" comment="acroread less than 8.1.7-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2983</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2983" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2983" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.2, 8.x before 8.1.7, and possibly 7.x through 7.1.4 allow attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055718" comment="acroread less than 8.1.7-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2985</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2985" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2985" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allow attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2009-2996.
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055718" comment="acroread less than 8.1.7-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2986</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2986" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2986" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 might allow attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055718" comment="acroread less than 8.1.7-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2988</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2988" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2988" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 do not properly validate input, which allows attackers to cause a denial of service via unspecified vectors.
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055718" comment="acroread less than 8.1.7-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2990</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2990" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2990" source="CVE"/>
	<description>
	Array index error in Adobe Reader and Acrobat 9.x before 9.2, 8.x before 8.1.7, and possibly 7.x through 7.1.4 might allow attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055718" comment="acroread less than 8.1.7-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2991</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2991" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2991" source="CVE"/>
	<description>
	Unspecified vulnerability in the Mozilla plug-in in Adobe Reader and Acrobat 8.x before 8.1.7, and possibly 7.x before 7.1.4 and 9.x before 9.2, might allow remote attackers to execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055718" comment="acroread less than 8.1.7-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2992</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2992" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2992" source="CVE"/>
	<description>
	An unspecified ActiveX control in Adobe Reader and Acrobat 9.x before 9.2, 8.x before 8.1.7, and possibly 7.x through 7.1.4 does not properly validate input, which allows attackers to cause a denial of service via unknown vectors.
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055718" comment="acroread less than 8.1.7-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2993</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2993" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2993" source="CVE"/>
	<description>
	The JavaScript for Acrobat API in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 does not properly implement the (1) Privileged Context and (2) Safe Path restrictions for unspecified JavaScript methods, which allows remote attackers to create arbitrary files, and possibly execute arbitrary code, via the cPath parameter in a crafted PDF file.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055718" comment="acroread less than 8.1.7-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2994</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2994" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2994" source="CVE"/>
	<description>
	Buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 might allow attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055718" comment="acroread less than 8.1.7-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2996</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2996" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2996" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allow attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2009-2985.
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055718" comment="acroread less than 8.1.7-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2997</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2997" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2997" source="CVE"/>
	<description>
	Heap-based buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 might allow attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055718" comment="acroread less than 8.1.7-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2998</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2998" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2998" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 do not properly validate input, which might allow attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2009-3458.
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055718" comment="acroread less than 8.1.7-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3051</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3051" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3051" source="CVE"/>
	<description>
	Multiple format string vulnerabilities in lib/silcclient/client_entry.c in Secure Internet Live Conferencing (SILC) Toolkit before 1.1.10, and SILC Client before 1.1.8, allow remote attackers to execute arbitrary code via format string specifiers in a nickname field, related to the (1) silc_client_add_client, (2) silc_client_update_client, and (3) silc_client_nickname_format functions.
	</description>
 </metadata>
<!-- a1d993f6a0398f2c0b4e0ce65a7cf70e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054840" comment="silc-toolkit-devel less than 1.1.2-14.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054841" comment="silc-toolkit less than 1.1.2-14.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3069</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3069" source="CVE"/>
	<description>
	Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.3 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 203960e47792969351a0b2600b4300c4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054860" comment="MozillaFirefox-translations less than 3.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054861" comment="MozillaFirefox less than 3.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054862" comment="mozilla-xulrunner190-32bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054863" comment="mozilla-xulrunner190-64bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054864" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054865" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054866" comment="mozilla-xulrunner190-gnomevfs-64bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054867" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054868" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054869" comment="mozilla-xulrunner190-translations-64bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054870" comment="mozilla-xulrunner190-translations less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054871" comment="mozilla-xulrunner190 less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054872" comment="python-xpcom190 less than 1.9.0.14-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3070</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3070" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3070" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 203960e47792969351a0b2600b4300c4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054860" comment="MozillaFirefox-translations less than 3.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054861" comment="MozillaFirefox less than 3.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054862" comment="mozilla-xulrunner190-32bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054863" comment="mozilla-xulrunner190-64bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054864" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054865" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054866" comment="mozilla-xulrunner190-gnomevfs-64bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054867" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054868" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054869" comment="mozilla-xulrunner190-translations-64bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054870" comment="mozilla-xulrunner190-translations less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054871" comment="mozilla-xulrunner190 less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054872" comment="python-xpcom190 less than 1.9.0.14-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3071</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3071" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3071" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.14, and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 203960e47792969351a0b2600b4300c4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054860" comment="MozillaFirefox-translations less than 3.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054861" comment="MozillaFirefox less than 3.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054862" comment="mozilla-xulrunner190-32bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054863" comment="mozilla-xulrunner190-64bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054864" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054865" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054866" comment="mozilla-xulrunner190-gnomevfs-64bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054867" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054868" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054869" comment="mozilla-xulrunner190-translations-64bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054870" comment="mozilla-xulrunner190-translations less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054871" comment="mozilla-xulrunner190 less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054872" comment="python-xpcom190 less than 1.9.0.14-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3072</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3072" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.14 and 3.5.x before 3.5.3, Thunderbird before 2.0.0.24, and SeaMonkey before 1.1.19 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the BinHex decoder in netwerk/streamconv/converters/nsBinHexDecoder.cpp, and unknown vectors.
	</description>
 </metadata>
<!-- 203960e47792969351a0b2600b4300c4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054860" comment="MozillaFirefox-translations less than 3.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054861" comment="MozillaFirefox less than 3.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054862" comment="mozilla-xulrunner190-32bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054863" comment="mozilla-xulrunner190-64bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054864" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054865" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054866" comment="mozilla-xulrunner190-gnomevfs-64bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054867" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054868" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054869" comment="mozilla-xulrunner190-translations-64bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054870" comment="mozilla-xulrunner190-translations less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054871" comment="mozilla-xulrunner190 less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054872" comment="python-xpcom190 less than 1.9.0.14-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3073</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3073" source="CVE"/>
	<description>
	Unspecified vulnerability in the JavaScript engine in Mozilla Firefox 3.5.x before 3.5.3 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 203960e47792969351a0b2600b4300c4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054860" comment="MozillaFirefox-translations less than 3.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054861" comment="MozillaFirefox less than 3.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054862" comment="mozilla-xulrunner190-32bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054863" comment="mozilla-xulrunner190-64bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054864" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054865" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054866" comment="mozilla-xulrunner190-gnomevfs-64bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054867" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054868" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054869" comment="mozilla-xulrunner190-translations-64bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054870" comment="mozilla-xulrunner190-translations less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054871" comment="mozilla-xulrunner190 less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054872" comment="python-xpcom190 less than 1.9.0.14-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3075</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3075" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox before 3.0.14 and 3.5.x before 3.5.2, Thunderbird before 2.0.0.24, and SeaMonkey before 1.1.19 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to use of mutable strings in the js_StringReplaceHelper function in js/src/jsstr.cpp, and unknown vectors.
	</description>
 </metadata>
<!-- 203960e47792969351a0b2600b4300c4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054860" comment="MozillaFirefox-translations less than 3.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054861" comment="MozillaFirefox less than 3.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054862" comment="mozilla-xulrunner190-32bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054863" comment="mozilla-xulrunner190-64bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054864" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054865" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054866" comment="mozilla-xulrunner190-gnomevfs-64bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054867" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054868" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054869" comment="mozilla-xulrunner190-translations-64bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054870" comment="mozilla-xulrunner190-translations less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054871" comment="mozilla-xulrunner190 less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054872" comment="python-xpcom190 less than 1.9.0.14-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3076</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3076" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3076" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.14 does not properly implement certain dialogs associated with the (1) pkcs11.addmodule and (2) pkcs11.deletemodule operations, which makes it easier for remote attackers to trick a user into installing or removing an arbitrary PKCS11 module.
	</description>
 </metadata>
<!-- 203960e47792969351a0b2600b4300c4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054860" comment="MozillaFirefox-translations less than 3.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054861" comment="MozillaFirefox less than 3.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054862" comment="mozilla-xulrunner190-32bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054863" comment="mozilla-xulrunner190-64bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054864" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054865" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054866" comment="mozilla-xulrunner190-gnomevfs-64bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054867" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054868" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054869" comment="mozilla-xulrunner190-translations-64bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054870" comment="mozilla-xulrunner190-translations less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054871" comment="mozilla-xulrunner190 less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054872" comment="python-xpcom190 less than 1.9.0.14-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3077</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3077" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.14, and 3.5.x before 3.5.3, does not properly manage pointers for the columns (aka TreeColumns) of a XUL tree element, which allows remote attackers to execute arbitrary code via a crafted HTML document, related to a "dangling pointer vulnerability."
	</description>
 </metadata>
<!-- 203960e47792969351a0b2600b4300c4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054860" comment="MozillaFirefox-translations less than 3.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054861" comment="MozillaFirefox less than 3.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054862" comment="mozilla-xulrunner190-32bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054863" comment="mozilla-xulrunner190-64bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054864" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054865" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054866" comment="mozilla-xulrunner190-gnomevfs-64bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054867" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054868" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054869" comment="mozilla-xulrunner190-translations-64bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054870" comment="mozilla-xulrunner190-translations less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054871" comment="mozilla-xulrunner190 less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054872" comment="python-xpcom190 less than 1.9.0.14-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3078</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3078" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3078" source="CVE"/>
	<description>
	Visual truncation vulnerability in Mozilla Firefox before 3.0.14, and 3.5.x before 3.5.3, allows remote attackers to trigger a vertical scroll and spoof URLs via unspecified Unicode characters with a tall line-height property.
	</description>
 </metadata>
<!-- 203960e47792969351a0b2600b4300c4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054860" comment="MozillaFirefox-translations less than 3.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054861" comment="MozillaFirefox less than 3.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054862" comment="mozilla-xulrunner190-32bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054863" comment="mozilla-xulrunner190-64bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054864" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054865" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054866" comment="mozilla-xulrunner190-gnomevfs-64bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054867" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054868" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054869" comment="mozilla-xulrunner190-translations-64bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054870" comment="mozilla-xulrunner190-translations less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054871" comment="mozilla-xulrunner190 less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054872" comment="python-xpcom190 less than 1.9.0.14-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3079</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3079" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3079" source="CVE"/>
	<description>
	Unspecified vulnerability in Mozilla Firefox before 3.0.14, and 3.5.x before 3.5.3, allows remote attackers to execute arbitrary JavaScript with chrome privileges via vectors involving an object, the FeedWriter, and the BrowserFeedWriter.
	</description>
 </metadata>
<!-- 203960e47792969351a0b2600b4300c4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054860" comment="MozillaFirefox-translations less than 3.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054861" comment="MozillaFirefox less than 3.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054862" comment="mozilla-xulrunner190-32bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054863" comment="mozilla-xulrunner190-64bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054864" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054865" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054866" comment="mozilla-xulrunner190-gnomevfs-64bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054867" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054868" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054869" comment="mozilla-xulrunner190-translations-64bit less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054870" comment="mozilla-xulrunner190-translations less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054871" comment="mozilla-xulrunner190 less than 1.9.0.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054872" comment="python-xpcom190 less than 1.9.0.14-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3094</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3094" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3094" source="CVE"/>
	<description>
	The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.
	</description>
 </metadata>
<!-- 0683ec2df667efa4b179f003d0da49d3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055719" comment="apache2-devel less than 2.2.4-70.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055720" comment="apache2-doc less than 2.2.4-70.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055721" comment="apache2-example-pages less than 2.2.4-70.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055722" comment="apache2-prefork less than 2.2.4-70.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055723" comment="apache2-utils less than 2.2.4-70.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055724" comment="apache2-worker less than 2.2.4-70.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055725" comment="apache2 less than 2.2.4-70.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3095</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3095" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3095" source="CVE"/>
	<description>
	The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11.
	</description>
 </metadata>
<!-- 0683ec2df667efa4b179f003d0da49d3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055719" comment="apache2-devel less than 2.2.4-70.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055720" comment="apache2-doc less than 2.2.4-70.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055721" comment="apache2-example-pages less than 2.2.4-70.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055722" comment="apache2-prefork less than 2.2.4-70.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055723" comment="apache2-utils less than 2.2.4-70.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055724" comment="apache2-worker less than 2.2.4-70.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055725" comment="apache2 less than 2.2.4-70.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3111</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3111" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3111" source="CVE"/>
	<description>
	The rad_decode function in FreeRADIUS before 1.1.8 allows remote attackers to cause a denial of service (radiusd crash) via zero-length Tunnel-Password attributes, as demonstrated by a certain module in VulnDisco Pack Professional 7.6 through 8.11.  NOTE: this is a regression error related to CVE-2003-0967.
	</description>
 </metadata>
<!-- 31dc3f04070ff8f3231e3badc26544ed -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055110" comment="freeradius-devel less than 1.1.6-47.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055111" comment="freeradius-dialupadmin less than 1.1.6-47.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055112" comment="freeradius less than 1.1.6-47.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3229</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3229" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3229" source="CVE"/>
	<description>
	The core server component in PostgreSQL 8.4 before 8.4.1, 8.3 before 8.3.8, and 8.2 before 8.2.14 allows remote authenticated users to cause a denial of service (backend shutdown) by "re-LOAD-ing" libraries from a certain plugins directory.
	</description>
 </metadata>
<!-- 253ee9a4e425a6314b5b7ccef2446041 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055030" comment="postgresql-contrib less than 8.2.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055031" comment="postgresql-devel less than 8.2.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055032" comment="postgresql-docs less than 8.2.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055033" comment="postgresql-libs-32bit less than 8.2.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055034" comment="postgresql-libs-64bit less than 8.2.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055035" comment="postgresql-libs less than 8.2.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055036" comment="postgresql-server less than 8.2.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055037" comment="postgresql less than 8.2.14-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3230</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3230" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3230" source="CVE"/>
	<description>
	The core server component in PostgreSQL 8.4 before 8.4.1, 8.3 before 8.3.8, 8.2 before 8.2.14, 8.1 before 8.1.18, 8.0 before 8.0.22, and 7.4 before 7.4.26 does not use the appropriate privileges for the (1) RESET ROLE and (2) RESET SESSION AUTHORIZATION operations, which allows remote authenticated users to gain privileges.  NOTE: this is due to an incomplete fix for CVE-2007-6600.
	</description>
 </metadata>
<!-- 253ee9a4e425a6314b5b7ccef2446041 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055030" comment="postgresql-contrib less than 8.2.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055031" comment="postgresql-devel less than 8.2.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055032" comment="postgresql-docs less than 8.2.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055033" comment="postgresql-libs-32bit less than 8.2.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055034" comment="postgresql-libs-64bit less than 8.2.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055035" comment="postgresql-libs less than 8.2.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055036" comment="postgresql-server less than 8.2.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055037" comment="postgresql less than 8.2.14-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3231</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3231" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3231" source="CVE"/>
	<description>
	The core server component in PostgreSQL 8.3 before 8.3.8 and 8.2 before 8.2.14, when using LDAP authentication with anonymous binds, allows remote attackers to bypass authentication via an empty password.
	</description>
 </metadata>
<!-- 253ee9a4e425a6314b5b7ccef2446041 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055030" comment="postgresql-contrib less than 8.2.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055031" comment="postgresql-devel less than 8.2.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055032" comment="postgresql-docs less than 8.2.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055033" comment="postgresql-libs-32bit less than 8.2.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055034" comment="postgresql-libs-64bit less than 8.2.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055035" comment="postgresql-libs less than 8.2.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055036" comment="postgresql-server less than 8.2.14-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055037" comment="postgresql less than 8.2.14-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3235</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3235" source="CVE"/>
	<description>
	Multiple stack-based buffer overflows in the Sieve plugin in Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, as derived from Cyrus libsieve, allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SIEVE script, as demonstrated by forwarding an e-mail message to a large number of recipients, a different vulnerability than CVE-2009-2632.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4c6fb0616c0f857515d6214e8a743afd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055135" comment="dovecot-devel less than 1.0.5-6.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055136" comment="dovecot less than 1.0.5-6.6"/>
		</criteria>
	</criteria>
	<!-- 6a147d729df4754488d44340b45cae21 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055786" comment="cyrus-imapd-devel less than 2.3.8-51.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055787" comment="cyrus-imapd less than 2.3.8-51.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055788" comment="perl-Cyrus-IMAP less than 2.3.8-51.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055789" comment="perl-Cyrus-SIEVE-managesieve less than 2.3.8-51.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3241</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3241" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3241" source="CVE"/>
	<description>
	Unspecified vulnerability in the OpcUa (OPC UA) dissector in Wireshark 0.99.6 through 1.0.8 and 1.2.0 through 1.2.1 allows remote attackers to cause a denial of service (memory and CPU consumption) via malformed OPCUA Service CallRequest packets.
	</description>
 </metadata>
<!-- 8def5011086b2f9a79a320097ee88f79 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055129" comment="wireshark-devel less than 0.99.6-31.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055130" comment="wireshark less than 0.99.6-31.22"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3291</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3291" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3291" source="CVE"/>
	<description>
	The php_openssl_apply_verification_policy function in PHP before 5.2.11 does not properly perform certificate validation, which has unknown impact and attack vectors, probably related to an ability to spoof certificates.
	</description>
 </metadata>
<!-- cef8c37e542688ee2ca3e259a02c041f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055189" comment="apache2-mod_php5 less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055190" comment="php5-bcmath less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055191" comment="php5-bz2 less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055192" comment="php5-calendar less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055193" comment="php5-ctype less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055194" comment="php5-curl less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055195" comment="php5-dba less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055196" comment="php5-dbase less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055197" comment="php5-devel less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055198" comment="php5-dom less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055199" comment="php5-exif less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055200" comment="php5-fastcgi less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055201" comment="php5-ftp less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055202" comment="php5-gd less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055203" comment="php5-gettext less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055204" comment="php5-gmp less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055205" comment="php5-hash less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055206" comment="php5-iconv less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055207" comment="php5-imap less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055208" comment="php5-json less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055209" comment="php5-ldap less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055210" comment="php5-mbstring less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055211" comment="php5-mcrypt less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055212" comment="php5-mhash less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055213" comment="php5-mysql less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055214" comment="php5-ncurses less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055215" comment="php5-odbc less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055216" comment="php5-openssl less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055217" comment="php5-pcntl less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055218" comment="php5-pdo less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055219" comment="php5-pear less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055220" comment="php5-pgsql less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055221" comment="php5-posix less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055222" comment="php5-pspell less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055223" comment="php5-readline less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055224" comment="php5-shmop less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055225" comment="php5-snmp less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055226" comment="php5-soap less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055227" comment="php5-sockets less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055228" comment="php5-sqlite less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055229" comment="php5-suhosin less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055230" comment="php5-sysvmsg less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055231" comment="php5-sysvsem less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055232" comment="php5-sysvshm less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055233" comment="php5-tidy less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055234" comment="php5-tokenizer less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055235" comment="php5-wddx less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055236" comment="php5-xmlreader less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055237" comment="php5-xmlrpc less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055238" comment="php5-xmlwriter less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055239" comment="php5-xsl less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055240" comment="php5-zip less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055241" comment="php5-zlib less than 5.2.11-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3292</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3292" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3292" source="CVE"/>
	<description>
	Unspecified vulnerability in PHP before 5.2.11, and 5.3.x before 5.3.1, has unknown impact and attack vectors related to "missing sanity checks around exif processing."
	</description>
 </metadata>
<!-- cef8c37e542688ee2ca3e259a02c041f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055189" comment="apache2-mod_php5 less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055190" comment="php5-bcmath less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055191" comment="php5-bz2 less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055192" comment="php5-calendar less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055193" comment="php5-ctype less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055194" comment="php5-curl less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055195" comment="php5-dba less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055196" comment="php5-dbase less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055197" comment="php5-devel less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055198" comment="php5-dom less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055199" comment="php5-exif less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055200" comment="php5-fastcgi less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055201" comment="php5-ftp less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055202" comment="php5-gd less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055203" comment="php5-gettext less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055204" comment="php5-gmp less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055205" comment="php5-hash less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055206" comment="php5-iconv less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055207" comment="php5-imap less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055208" comment="php5-json less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055209" comment="php5-ldap less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055210" comment="php5-mbstring less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055211" comment="php5-mcrypt less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055212" comment="php5-mhash less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055213" comment="php5-mysql less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055214" comment="php5-ncurses less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055215" comment="php5-odbc less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055216" comment="php5-openssl less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055217" comment="php5-pcntl less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055218" comment="php5-pdo less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055219" comment="php5-pear less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055220" comment="php5-pgsql less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055221" comment="php5-posix less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055222" comment="php5-pspell less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055223" comment="php5-readline less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055224" comment="php5-shmop less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055225" comment="php5-snmp less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055226" comment="php5-soap less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055227" comment="php5-sockets less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055228" comment="php5-sqlite less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055229" comment="php5-suhosin less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055230" comment="php5-sysvmsg less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055231" comment="php5-sysvsem less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055232" comment="php5-sysvshm less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055233" comment="php5-tidy less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055234" comment="php5-tokenizer less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055235" comment="php5-wddx less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055236" comment="php5-xmlreader less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055237" comment="php5-xmlrpc less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055238" comment="php5-xmlwriter less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055239" comment="php5-xsl less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055240" comment="php5-zip less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055241" comment="php5-zlib less than 5.2.11-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3293</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3293" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3293" source="CVE"/>
	<description>
	Unspecified vulnerability in the imagecolortransparent function in PHP before 5.2.11 has unknown impact and attack vectors related to an incorrect "sanity check for the color index."
	</description>
 </metadata>
<!-- cef8c37e542688ee2ca3e259a02c041f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055189" comment="apache2-mod_php5 less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055190" comment="php5-bcmath less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055191" comment="php5-bz2 less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055192" comment="php5-calendar less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055193" comment="php5-ctype less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055194" comment="php5-curl less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055195" comment="php5-dba less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055196" comment="php5-dbase less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055197" comment="php5-devel less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055198" comment="php5-dom less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055199" comment="php5-exif less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055200" comment="php5-fastcgi less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055201" comment="php5-ftp less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055202" comment="php5-gd less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055203" comment="php5-gettext less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055204" comment="php5-gmp less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055205" comment="php5-hash less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055206" comment="php5-iconv less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055207" comment="php5-imap less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055208" comment="php5-json less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055209" comment="php5-ldap less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055210" comment="php5-mbstring less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055211" comment="php5-mcrypt less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055212" comment="php5-mhash less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055213" comment="php5-mysql less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055214" comment="php5-ncurses less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055215" comment="php5-odbc less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055216" comment="php5-openssl less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055217" comment="php5-pcntl less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055218" comment="php5-pdo less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055219" comment="php5-pear less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055220" comment="php5-pgsql less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055221" comment="php5-posix less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055222" comment="php5-pspell less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055223" comment="php5-readline less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055224" comment="php5-shmop less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055225" comment="php5-snmp less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055226" comment="php5-soap less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055227" comment="php5-sockets less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055228" comment="php5-sqlite less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055229" comment="php5-suhosin less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055230" comment="php5-sysvmsg less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055231" comment="php5-sysvsem less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055232" comment="php5-sysvshm less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055233" comment="php5-tidy less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055234" comment="php5-tokenizer less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055235" comment="php5-wddx less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055236" comment="php5-xmlreader less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055237" comment="php5-xmlrpc less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055238" comment="php5-xmlwriter less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055239" comment="php5-xsl less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055240" comment="php5-zip less than 5.2.11-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055241" comment="php5-zlib less than 5.2.11-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3431</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3431" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3431" source="CVE"/>
	<description>
	Stack consumption vulnerability in Adobe Reader and Acrobat 9.1.3, 9.1.2, 9.1.1, and earlier 9.x versions; 8.1.6 and earlier 8.x versions; and possibly 7.1.4 and earlier 7.x versions allows remote attackers to cause a denial of service (application crash) via a PDF file with a large number of [ (open square bracket) characters in the argument to the alert method. NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055718" comment="acroread less than 8.1.7-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3458</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3458" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 do not properly validate input, which might allow attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2009-2998.
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055718" comment="acroread less than 8.1.7-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3459</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3459" source="CVE"/>
	<description>
	Heap-based buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allows remote attackers to execute arbitrary code via a crafted PDF file that triggers memory corruption, as exploited in the wild in October 2009. NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055718" comment="acroread less than 8.1.7-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3462</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3462" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3462" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 on Unix, when Debug mode is enabled, allow attackers to execute arbitrary code via unspecified vectors, related to a "format bug."
	</description>
 </metadata>
<!-- 15ac3566b28ac3dbe9c54dd0bc6f3a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055718" comment="acroread less than 8.1.7-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3603</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3603" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3603" source="CVE"/>
	<description>
	Integer overflow in the SplashBitmap::SplashBitmap function in Xpdf 3.x before 3.02pl4 and Poppler before 0.12.1 might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.  NOTE: some of these details are obtained from third party information.  NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-1188.
	</description>
 </metadata>
<!-- ddc0dce75cdd93e43e1609da50c8406b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056068" comment="xpdf-tools less than 3.02-19.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056069" comment="xpdf less than 3.02-19.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3604</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3604" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3604" source="CVE"/>
	<description>
	The Splash::drawImage function in Splash.cc in Xpdf 2.x and 3.x before 3.02pl4, and Poppler 0.x, as used in GPdf and kdegraphics KPDF, does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF document that triggers a NULL pointer dereference or a heap-based buffer overflow.
	</description>
 </metadata>
<!-- ddc0dce75cdd93e43e1609da50c8406b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056068" comment="xpdf-tools less than 3.02-19.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056069" comment="xpdf less than 3.02-19.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3605</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3605" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3605" source="CVE"/>
	<description>
	Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/.  NOTE: this may overlap CVE-2009-0791.
	</description>
 </metadata>
<!-- ddc0dce75cdd93e43e1609da50c8406b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056068" comment="xpdf-tools less than 3.02-19.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056069" comment="xpdf less than 3.02-19.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3606</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3606" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3606" source="CVE"/>
	<description>
	Integer overflow in the PSOutputDev::doImageL1Sep function in Xpdf before 3.02pl4, and Poppler 0.x, as used in kdegraphics KPDF, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- ddc0dce75cdd93e43e1609da50c8406b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056068" comment="xpdf-tools less than 3.02-19.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056069" comment="xpdf less than 3.02-19.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3608</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3608" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3608" source="CVE"/>
	<description>
	Integer overflow in the ObjectStream::ObjectStream function in XRef.cc in Xpdf 3.x before 3.02pl4 and Poppler before 0.12.1, as used in GPdf, kdegraphics KPDF, CUPS pdftops, and teTeX, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6a0736f7e5706fc2d5d7cd8abcef788b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056238" comment="cups-client less than 1.2.12-22.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056239" comment="cups-devel less than 1.2.12-22.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056240" comment="cups-libs-32bit less than 1.2.12-22.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056241" comment="cups-libs-64bit less than 1.2.12-22.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056242" comment="cups-libs less than 1.2.12-22.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056243" comment="cups less than 1.2.12-22.26"/>
		</criteria>
	</criteria>
	<!-- ddc0dce75cdd93e43e1609da50c8406b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056068" comment="xpdf-tools less than 3.02-19.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056069" comment="xpdf less than 3.02-19.13"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3609</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3609" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3609" source="CVE"/>
	<description>
	Integer overflow in the ImageStream::ImageStream function in Stream.cc in Xpdf before 3.02pl4 and Poppler before 0.12.1, as used in GPdf, kdegraphics KPDF, and CUPS pdftops, allows remote attackers to cause a denial of service (application crash) via a crafted PDF document that triggers a NULL pointer dereference or buffer over-read.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6a0736f7e5706fc2d5d7cd8abcef788b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056238" comment="cups-client less than 1.2.12-22.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056239" comment="cups-devel less than 1.2.12-22.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056240" comment="cups-libs-32bit less than 1.2.12-22.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056241" comment="cups-libs-64bit less than 1.2.12-22.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056242" comment="cups-libs less than 1.2.12-22.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056243" comment="cups less than 1.2.12-22.26"/>
		</criteria>
	</criteria>
	<!-- ddc0dce75cdd93e43e1609da50c8406b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056068" comment="xpdf-tools less than 3.02-19.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056069" comment="xpdf less than 3.02-19.13"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3618</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3618" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3618" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in viewvc.py in ViewVC 1.0 before 1.0.9 and 1.1 before 1.1.2 allows remote attackers to inject arbitrary web script or HTML via the view parameter.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 4c67ef023be55d96ff2ab7b625418498 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055726" comment="viewvc less than 1.0.9-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3619</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3619" source="CVE"/>
	<description>
	Unspecified vulnerability in ViewVC 1.0 before 1.0.9 and 1.1 before 1.1.2 has unknown impact and remote attack vectors related to "printing illegal parameter names and values."
	</description>
 </metadata>
<!-- 4c67ef023be55d96ff2ab7b625418498 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055726" comment="viewvc less than 1.0.9-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3696</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3696" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3696" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in phpMyAdmin 2.11.x before 2.11.9.6 and 3.x before 3.2.2.1 allows remote attackers to inject arbitrary web script or HTML via a crafted name for a MySQL table.
	</description>
 </metadata>
<!-- b6916ee4a2abc8ef3dabb232d1ec37dd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055540" comment="phpMyAdmin less than 2.11.9.6-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3697</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3697" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3697" source="CVE"/>
	<description>
	SQL injection vulnerability in the PDF schema generator functionality in phpMyAdmin 2.11.x before 2.11.9.6 and 3.x before 3.2.2.1 allows remote attackers to execute arbitrary SQL commands via unspecified interface parameters.
	</description>
 </metadata>
<!-- b6916ee4a2abc8ef3dabb232d1ec37dd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055540" comment="phpMyAdmin less than 2.11.9.6-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3720</title>
	<affected family="unix">
		<platform>openSUSE 10.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3720" source="CVE"/>
	<description>
	The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.
	</description>
 </metadata>
<!-- d429e340ae88e5a9f565a801fa3f9854 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009034021" comment="suse103 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056025" comment="expat less than 2.0.1-24.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056026" comment="libexpat-devel less than 2.0.1-24.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056027" comment="libexpat1-32bit less than 2.0.1-24.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056028" comment="libexpat1-64bit less than 2.0.1-24.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056029" comment="libexpat1 less than 2.0.1-24.2"/>
	</criteria>
</criteria>
</definition>
 </definitions>
 <tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034021" version="1" comment="openSUSE-release is ==10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034022" version="1" comment="tomboy is &lt;0.8.0-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034023" version="1" comment="NX is &lt;2.1.0-35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034024" version="1" comment="seamonkey-dom-inspector is &lt;1.1.5-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034025" version="1" comment="seamonkey-irc is &lt;1.1.5-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034026" version="1" comment="seamonkey-mail is &lt;1.1.5-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034027" version="1" comment="seamonkey-spellchecker is &lt;1.1.5-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034028" version="1" comment="seamonkey-venkman is &lt;1.1.5-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034029" version="1" comment="seamonkey is &lt;1.1.5-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034030" version="1" comment="MozillaFirefox-translations is &lt;2.0.0.8-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034031" version="1" comment="MozillaFirefox is &lt;2.0.0.8-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034032" version="1" comment="perl-Tk is &lt;804.027-95.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034033" version="1" comment="tkimg is &lt;1.3-125.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034034" version="1" comment="SDL_image-32bit is &lt;1.2.6-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034035" version="1" comment="SDL_image-64bit is &lt;1.2.6-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034036" version="1" comment="SDL_image-devel is &lt;1.2.6-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034037" version="1" comment="SDL_image is &lt;1.2.6-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034038" version="1" comment="apache2-devel is &lt;2.2.4-70.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034039" version="1" comment="apache2-doc is &lt;2.2.4-70.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034040" version="1" comment="apache2-example-pages is &lt;2.2.4-70.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034041" version="1" comment="apache2-prefork is &lt;2.2.4-70.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034042" version="1" comment="apache2-utils is &lt;2.2.4-70.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034043" version="1" comment="apache2-worker is &lt;2.2.4-70.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034044" version="1" comment="apache2 is &lt;2.2.4-70.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034045" version="1" comment="kernel-bigsmp is &lt;2.6.22.12-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034046" version="1" comment="kernel-debug is &lt;2.6.22.12-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034047" version="1" comment="kernel-default is &lt;2.6.22.12-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034048" version="1" comment="kernel-kdump is &lt;2.6.22.12-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034049" version="1" comment="kernel-ppc64 is &lt;2.6.22.12-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034050" version="1" comment="kernel-source is &lt;2.6.22.12-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034051" version="1" comment="kernel-syms is &lt;2.6.22.12-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034052" version="1" comment="kernel-xen is &lt;2.6.22.12-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034053" version="1" comment="kernel-xenpae is &lt;2.6.22.12-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034054" version="1" comment="libmysqlclient-devel is &lt;5.0.45-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034055" version="1" comment="libmysqlclient15-32bit is &lt;5.0.45-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034056" version="1" comment="libmysqlclient15-64bit is &lt;5.0.45-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034057" version="1" comment="libmysqlclient15 is &lt;5.0.45-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034058" version="1" comment="libmysqlclient_r15-32bit is &lt;5.0.45-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034059" version="1" comment="libmysqlclient_r15-64bit is &lt;5.0.45-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034060" version="1" comment="libmysqlclient_r15 is &lt;5.0.45-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034061" version="1" comment="mysql-Max is &lt;5.0.45-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034062" version="1" comment="mysql-bench is &lt;5.0.45-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034063" version="1" comment="mysql-client is &lt;5.0.45-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034064" version="1" comment="mysql-debug is &lt;5.0.45-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034065" version="1" comment="mysql-tools is &lt;5.0.45-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034066" version="1" comment="mysql is &lt;5.0.45-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055718" version="1" comment="acroread is &lt;8.1.7-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034067" version="1" comment="dhcp-client is &lt;3.0.6-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034068" version="1" comment="dhcp-devel is &lt;3.0.6-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034069" version="1" comment="dhcp-relay is &lt;3.0.6-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034070" version="1" comment="dhcp-server is &lt;3.0.6-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034071" version="1" comment="dhcp is &lt;3.0.6-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031150" version="1" comment="flash-player is &lt;9.0.124.0-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034072" version="1" comment="rubygems is &lt;0.9.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034073" version="1" comment="rubygems is &lt;0.9.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034074" version="1" comment="rubygems is &lt;0.9.2-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034075" version="1" comment="xgl is &lt;git_070104-77.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034076" version="1" comment="glib2-32bit is &lt;2.14.1-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034077" version="1" comment="glib2-64bit is &lt;2.14.1-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034078" version="1" comment="glib2-devel-64bit is &lt;2.14.1-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034079" version="1" comment="glib2-devel is &lt;2.14.1-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034080" version="1" comment="glib2-doc is &lt;2.14.1-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034081" version="1" comment="glib2 is &lt;2.14.1-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034082" version="1" comment="pcre-32bit is &lt;7.2-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034083" version="1" comment="pcre-64bit is &lt;7.2-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034084" version="1" comment="pcre-devel is &lt;7.2-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034085" version="1" comment="pcre is &lt;7.2-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034086" version="1" comment="novell-ipsec-tools-devel is &lt;0.6.3-114.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034087" version="1" comment="novell-ipsec-tools is &lt;0.6.3-114.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034088" version="1" comment="tomcat55-admin-webapps is &lt;5.5.23-113.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034089" version="1" comment="tomcat55-common-lib is &lt;5.5.23-113.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034090" version="1" comment="tomcat55-jasper-javadoc is &lt;5.5.23-113.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034091" version="1" comment="tomcat55-jasper is &lt;5.5.23-113.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034092" version="1" comment="tomcat55-jsp-2_0-api-javadoc is &lt;5.5.23-113.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034093" version="1" comment="tomcat55-jsp-2_0-api is &lt;5.5.23-113.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034094" version="1" comment="tomcat55-server-lib is &lt;5.5.23-113.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034095" version="1" comment="tomcat55-servlet-2_4-api-javadoc is &lt;5.5.23-113.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034096" version="1" comment="tomcat55-servlet-2_4-api is &lt;5.5.23-113.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034097" version="1" comment="tomcat55-webapps is &lt;5.5.23-113.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034098" version="1" comment="tomcat55 is &lt;5.5.23-113.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034099" version="1" comment="apache2-mod_jk is &lt;1.2.21-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034100" version="1" comment="tomcat55-admin-webapps is &lt;5.5.23-113.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034101" version="1" comment="tomcat55-common-lib is &lt;5.5.23-113.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034102" version="1" comment="tomcat55-jasper-javadoc is &lt;5.5.23-113.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034103" version="1" comment="tomcat55-jasper is &lt;5.5.23-113.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034104" version="1" comment="tomcat55-jsp-2_0-api-javadoc is &lt;5.5.23-113.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034105" version="1" comment="tomcat55-jsp-2_0-api is &lt;5.5.23-113.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034106" version="1" comment="tomcat55-server-lib is &lt;5.5.23-113.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034107" version="1" comment="tomcat55-servlet-2_4-api-javadoc is &lt;5.5.23-113.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034108" version="1" comment="tomcat55-servlet-2_4-api is &lt;5.5.23-113.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034109" version="1" comment="tomcat55-webapps is &lt;5.5.23-113.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034110" version="1" comment="tomcat55 is &lt;5.5.23-113.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034111" version="1" comment="libmysqlclient-devel is &lt;5.0.45-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034112" version="1" comment="libmysqlclient15-32bit is &lt;5.0.45-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034113" version="1" comment="libmysqlclient15-64bit is &lt;5.0.45-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034114" version="1" comment="libmysqlclient15 is &lt;5.0.45-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034115" version="1" comment="libmysqlclient_r15-32bit is &lt;5.0.45-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034116" version="1" comment="libmysqlclient_r15-64bit is &lt;5.0.45-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034117" version="1" comment="libmysqlclient_r15 is &lt;5.0.45-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034118" version="1" comment="mysql-Max is &lt;5.0.45-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034119" version="1" comment="mysql-bench is &lt;5.0.45-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034120" version="1" comment="mysql-client is &lt;5.0.45-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034121" version="1" comment="mysql-debug is &lt;5.0.45-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034122" version="1" comment="mysql-tools is &lt;5.0.45-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034123" version="1" comment="mysql is &lt;5.0.45-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034124" version="1" comment="libnetpbm-devel is &lt;10.26.44-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034125" version="1" comment="libnetpbm10-32bit is &lt;10.26.44-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034126" version="1" comment="libnetpbm10-64bit is &lt;10.26.44-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034127" version="1" comment="libnetpbm10 is &lt;10.26.44-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034128" version="1" comment="netpbm is &lt;10.26.44-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034129" version="1" comment="liblcms-32bit is &lt;1.16-39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034130" version="1" comment="liblcms-64bit is &lt;1.16-39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034131" version="1" comment="liblcms-devel-32bit is &lt;1.16-39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034132" version="1" comment="liblcms-devel-64bit is &lt;1.16-39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034133" version="1" comment="liblcms-devel is &lt;1.16-39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034134" version="1" comment="liblcms is &lt;1.16-39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034135" version="1" comment="claws-mail-devel is &lt;2.10.0-35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034136" version="1" comment="claws-mail is &lt;2.10.0-35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034137" version="1" comment="cacti is &lt;0.8.6j-62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034138" version="1" comment="rubygem-activesupport is &lt;1.4.2-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034139" version="1" comment="kernel-bigsmp is &lt;2.6.22.16-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034140" version="1" comment="kernel-debug is &lt;2.6.22.16-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034141" version="1" comment="kernel-default is &lt;2.6.22.16-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034142" version="1" comment="kernel-kdump is &lt;2.6.22.16-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034143" version="1" comment="kernel-ppc64 is &lt;2.6.22.16-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034144" version="1" comment="kernel-rt is &lt;2.6.22.16-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034145" version="1" comment="kernel-rt_debug is &lt;2.6.22.16-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034146" version="1" comment="kernel-source is &lt;2.6.22.16-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034147" version="1" comment="kernel-syms is &lt;2.6.22.16-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034148" version="1" comment="kernel-xen is &lt;2.6.22.16-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034149" version="1" comment="kernel-xenpae is &lt;2.6.22.16-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034150" version="1" comment="kernel-bigsmp is &lt;2.6.22.16-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034151" version="1" comment="kernel-debug is &lt;2.6.22.16-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034152" version="1" comment="kernel-default is &lt;2.6.22.16-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034153" version="1" comment="kernel-kdump is &lt;2.6.22.16-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034154" version="1" comment="kernel-ppc64 is &lt;2.6.22.16-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034155" version="1" comment="kernel-rt is &lt;2.6.22.16-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034156" version="1" comment="kernel-rt_debug is &lt;2.6.22.16-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034157" version="1" comment="kernel-source is &lt;2.6.22.16-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034158" version="1" comment="kernel-syms is &lt;2.6.22.16-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034159" version="1" comment="kernel-xen is &lt;2.6.22.16-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034160" version="1" comment="kernel-xenpae is &lt;2.6.22.16-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034161" version="1" comment="xorg-x11-Xvnc is &lt;7.1-91.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034162" version="1" comment="xorg-x11-server-extra is &lt;7.2-143.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034163" version="1" comment="xorg-x11-server-sdk is &lt;7.2-143.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034164" version="1" comment="xorg-x11-server is &lt;7.2-143.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034165" version="1" comment="librpcsecgss is &lt;0.14-71.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034166" version="1" comment="t1lib-devel is &lt;5.1.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034167" version="1" comment="t1lib is &lt;5.1.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034168" version="1" comment="flash-player is &lt;9.0.115.0-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031401" version="1" comment="flash-player is &lt;9.0.151.0-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034169" version="1" comment="cups-client is &lt;1.2.12-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034170" version="1" comment="cups-devel is &lt;1.2.12-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034171" version="1" comment="cups-libs-32bit is &lt;1.2.12-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034172" version="1" comment="cups-libs-64bit is &lt;1.2.12-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034173" version="1" comment="cups-libs is &lt;1.2.12-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034174" version="1" comment="cups is &lt;1.2.12-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034175" version="1" comment="cups-client is &lt;1.2.12-22.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034176" version="1" comment="cups-devel is &lt;1.2.12-22.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034177" version="1" comment="cups-libs-32bit is &lt;1.2.12-22.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034178" version="1" comment="cups-libs-64bit is &lt;1.2.12-22.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034179" version="1" comment="cups-libs is &lt;1.2.12-22.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034180" version="1" comment="cups is &lt;1.2.12-22.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034181" version="1" comment="poppler-devel is &lt;0.5.4-101.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034182" version="1" comment="poppler-doc is &lt;0.5.4-101.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034183" version="1" comment="poppler-glib is &lt;0.5.4-101.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034184" version="1" comment="poppler-qt4 is &lt;0.5.4-101.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034185" version="1" comment="poppler-qt is &lt;0.5.4-101.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034186" version="1" comment="poppler-tools is &lt;0.5.4-101.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034187" version="1" comment="poppler is &lt;0.5.4-101.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034188" version="1" comment="koffice-database-mysql is &lt;1.6.3-51.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034189" version="1" comment="koffice-database-psql is &lt;1.6.3-51.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034190" version="1" comment="koffice-database is &lt;1.6.3-51.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034191" version="1" comment="koffice-devel is &lt;1.6.3-51.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034192" version="1" comment="koffice-extra is &lt;1.6.3-51.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034193" version="1" comment="koffice-illustration is &lt;1.6.3-51.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034194" version="1" comment="koffice-planning is &lt;1.6.3-51.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034195" version="1" comment="koffice-presentation is &lt;1.6.3-51.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034196" version="1" comment="koffice-python is &lt;1.6.3-51.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034197" version="1" comment="koffice-ruby is &lt;1.6.3-51.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034198" version="1" comment="koffice-spreadsheet is &lt;1.6.3-51.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034199" version="1" comment="koffice-wordprocessing is &lt;1.6.3-51.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034200" version="1" comment="koffice is &lt;1.6.3-51.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034201" version="1" comment="xpdf-tools is &lt;3.02-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034202" version="1" comment="xpdf is &lt;3.02-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034203" version="1" comment="fetchmail is &lt;6.3.8-57.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034204" version="1" comment="fetchmailconf is &lt;6.3.8-57.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034205" version="1" comment="xorg-x11-Xvnc is &lt;7.1-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034206" version="1" comment="xorg-x11-devel-32bit is &lt;7.2-103.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034207" version="1" comment="xorg-x11-devel-64bit is &lt;7.2-103.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034208" version="1" comment="xorg-x11-devel is &lt;7.2-103.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034209" version="1" comment="xorg-x11-doc is &lt;7.2-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034210" version="1" comment="xorg-x11-libs-32bit is &lt;7.2-103.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034211" version="1" comment="xorg-x11-libs-64bit is &lt;7.2-103.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034212" version="1" comment="xorg-x11-libs is &lt;7.2-103.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034213" version="1" comment="xorg-x11-server-extra is &lt;7.2-143.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034214" version="1" comment="xorg-x11-server-sdk is &lt;7.2-143.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034215" version="1" comment="xorg-x11-server is &lt;7.2-143.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034216" version="1" comment="xorg-x11 is &lt;7.2-135.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034217" version="1" comment="kdebase3-kdm is &lt;3.5.7-83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034218" version="1" comment="kernel-bigsmp is &lt;2.6.22.9-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034219" version="1" comment="kernel-default is &lt;2.6.22.9-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034220" version="1" comment="kernel-ppc64 is &lt;2.6.22.9-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034221" version="1" comment="kernel-source is &lt;2.6.22.9-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034222" version="1" comment="kernel-syms is &lt;2.6.22.9-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034223" version="1" comment="kernel-xen is &lt;2.6.22.9-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034224" version="1" comment="kernel-xenpae is &lt;2.6.22.9-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034225" version="1" comment="cifs-mount is &lt;3.0.26a-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034226" version="1" comment="ldapsmb is &lt;1.34b-110.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034227" version="1" comment="libmsrpc-devel is &lt;3.0.26a-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034228" version="1" comment="libmsrpc is &lt;3.0.26a-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034229" version="1" comment="libsmbclient-32bit is &lt;3.0.26a-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034230" version="1" comment="libsmbclient-64bit is &lt;3.0.26a-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034231" version="1" comment="libsmbclient-devel is &lt;3.0.26a-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034232" version="1" comment="libsmbclient is &lt;3.0.26a-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034233" version="1" comment="libsmbsharemodes-devel is &lt;3.0.26a-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034234" version="1" comment="libsmbsharemodes is &lt;3.0.26a-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034235" version="1" comment="samba-32bit is &lt;3.0.26a-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034236" version="1" comment="samba-64bit is &lt;3.0.26a-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034237" version="1" comment="samba-client-32bit is &lt;3.0.26a-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034238" version="1" comment="samba-client-64bit is &lt;3.0.26a-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034239" version="1" comment="samba-client is &lt;3.0.26a-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034240" version="1" comment="samba-devel is &lt;3.0.26a-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034241" version="1" comment="samba-doc is &lt;3.0.26a-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034242" version="1" comment="samba-krb-printing is &lt;3.0.26a-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034243" version="1" comment="samba-python is &lt;3.0.26a-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034244" version="1" comment="samba-vscan is &lt;0.3.6b-181.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034245" version="1" comment="samba-winbind-32bit is &lt;3.0.26a-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034246" version="1" comment="samba-winbind-64bit is &lt;3.0.26a-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034247" version="1" comment="samba-winbind is &lt;3.0.26a-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034248" version="1" comment="samba is &lt;3.0.26a-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034249" version="1" comment="OpenOffice_org-base is &lt;2.3.0.1.2-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034250" version="1" comment="OpenOffice_org-calc is &lt;2.3.0.1.2-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034251" version="1" comment="OpenOffice_org-devel is &lt;2.3.0.1.2-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034252" version="1" comment="OpenOffice_org-draw is &lt;2.3.0.1.2-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034253" version="1" comment="OpenOffice_org-filters is &lt;2.3.0.1.2-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034254" version="1" comment="OpenOffice_org-gnome is &lt;2.3.0.1.2-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034255" version="1" comment="OpenOffice_org-impress is &lt;2.3.0.1.2-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034256" version="1" comment="OpenOffice_org-kde is &lt;2.3.0.1.2-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034257" version="1" comment="OpenOffice_org-mailmerge is &lt;2.3.0.1.2-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034258" version="1" comment="OpenOffice_org-math is &lt;2.3.0.1.2-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034259" version="1" comment="OpenOffice_org-mono is &lt;2.3.0.1.2-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034260" version="1" comment="OpenOffice_org-officebean is &lt;2.3.0.1.2-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034261" version="1" comment="OpenOffice_org-pyuno is &lt;2.3.0.1.2-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034262" version="1" comment="OpenOffice_org-sdk-doc is &lt;2.3.0.1.2-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034263" version="1" comment="OpenOffice_org-sdk is &lt;2.3.0.1.2-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034264" version="1" comment="OpenOffice_org-testtool is &lt;2.3.0.1.2-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034265" version="1" comment="OpenOffice_org-writer is &lt;2.3.0.1.2-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034266" version="1" comment="OpenOffice_org is &lt;2.3.0.1.2-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034267" version="1" comment="flac-devel is &lt;1.2.0-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034268" version="1" comment="flac is &lt;1.2.0-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034269" version="1" comment="libFLAC++6-32bit is &lt;1.2.0-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034270" version="1" comment="libFLAC++6-64bit is &lt;1.2.0-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034271" version="1" comment="libFLAC++6 is &lt;1.2.0-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034272" version="1" comment="libFLAC8-32bit is &lt;1.2.0-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034273" version="1" comment="libFLAC8-64bit is &lt;1.2.0-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034274" version="1" comment="libFLAC8 is &lt;1.2.0-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034275" version="1" comment="lighttpd-mod_cml is &lt;1.4.18-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034276" version="1" comment="lighttpd-mod_magnet is &lt;1.4.18-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034277" version="1" comment="lighttpd-mod_mysql_vhost is &lt;1.4.18-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034278" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.18-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034279" version="1" comment="lighttpd-mod_trigger_b4_dl is &lt;1.4.18-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034280" version="1" comment="lighttpd-mod_webdav is &lt;1.4.18-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034281" version="1" comment="lighttpd is &lt;1.4.18-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034282" version="1" comment="openssh-askpass is &lt;4.6p1-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034283" version="1" comment="openssh is &lt;4.6p1-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034284" version="1" comment="postgresql-contrib is &lt;8.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034285" version="1" comment="postgresql-devel is &lt;8.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034286" version="1" comment="postgresql-docs is &lt;8.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034287" version="1" comment="postgresql-libs-32bit is &lt;8.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034288" version="1" comment="postgresql-libs-64bit is &lt;8.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034289" version="1" comment="postgresql-libs is &lt;8.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034290" version="1" comment="postgresql-plperl is &lt;8.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034291" version="1" comment="postgresql-plpython is &lt;8.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034292" version="1" comment="postgresql-pltcl is &lt;8.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034293" version="1" comment="postgresql-server is &lt;8.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034294" version="1" comment="postgresql is &lt;8.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034295" version="1" comment="OpenOffice_org-af is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034296" version="1" comment="OpenOffice_org-ar is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034297" version="1" comment="OpenOffice_org-base is &lt;2.3.0.1.2-10.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034298" version="1" comment="OpenOffice_org-be-BY is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034299" version="1" comment="OpenOffice_org-bg is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034300" version="1" comment="OpenOffice_org-ca is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034301" version="1" comment="OpenOffice_org-calc is &lt;2.3.0.1.2-10.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034302" version="1" comment="OpenOffice_org-cs is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034303" version="1" comment="OpenOffice_org-cy is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034304" version="1" comment="OpenOffice_org-da is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034305" version="1" comment="OpenOffice_org-de is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034306" version="1" comment="OpenOffice_org-devel is &lt;2.3.0.1.2-10.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034307" version="1" comment="OpenOffice_org-draw is &lt;2.3.0.1.2-10.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034308" version="1" comment="OpenOffice_org-el is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034309" version="1" comment="OpenOffice_org-en-GB is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034310" version="1" comment="OpenOffice_org-es is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034311" version="1" comment="OpenOffice_org-et is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034312" version="1" comment="OpenOffice_org-fi is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034313" version="1" comment="OpenOffice_org-filters is &lt;2.3.0.1.2-10.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034314" version="1" comment="OpenOffice_org-fr is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034315" version="1" comment="OpenOffice_org-gnome is &lt;2.3.0.1.2-10.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034316" version="1" comment="OpenOffice_org-gu-IN is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034317" version="1" comment="OpenOffice_org-hi-IN is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034318" version="1" comment="OpenOffice_org-hr is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034319" version="1" comment="OpenOffice_org-hu is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034320" version="1" comment="OpenOffice_org-impress is &lt;2.3.0.1.2-10.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034321" version="1" comment="OpenOffice_org-it is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034322" version="1" comment="OpenOffice_org-ja is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034323" version="1" comment="OpenOffice_org-kde is &lt;2.3.0.1.2-10.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034324" version="1" comment="OpenOffice_org-km is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034325" version="1" comment="OpenOffice_org-ko is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034326" version="1" comment="OpenOffice_org-lt is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034327" version="1" comment="OpenOffice_org-mailmerge is &lt;2.3.0.1.2-10.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034328" version="1" comment="OpenOffice_org-math is &lt;2.3.0.1.2-10.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034329" version="1" comment="OpenOffice_org-mk is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034330" version="1" comment="OpenOffice_org-mono is &lt;2.3.0.1.2-10.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034331" version="1" comment="OpenOffice_org-nb is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034332" version="1" comment="OpenOffice_org-nl is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034333" version="1" comment="OpenOffice_org-nn is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034334" version="1" comment="OpenOffice_org-officebean is &lt;2.3.0.1.2-10.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034335" version="1" comment="OpenOffice_org-pa-IN is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034336" version="1" comment="OpenOffice_org-pl is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034337" version="1" comment="OpenOffice_org-pt-BR is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034338" version="1" comment="OpenOffice_org-pt is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034339" version="1" comment="OpenOffice_org-pyuno is &lt;2.3.0.1.2-10.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034340" version="1" comment="OpenOffice_org-ru is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034341" version="1" comment="OpenOffice_org-rw is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034342" version="1" comment="OpenOffice_org-sdk-doc is &lt;2.3.0.1.2-10.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034343" version="1" comment="OpenOffice_org-sdk is &lt;2.3.0.1.2-10.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034344" version="1" comment="OpenOffice_org-sk is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034345" version="1" comment="OpenOffice_org-sl is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034346" version="1" comment="OpenOffice_org-sr-CS is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034347" version="1" comment="OpenOffice_org-st is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034348" version="1" comment="OpenOffice_org-sv is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034349" version="1" comment="OpenOffice_org-testtool is &lt;2.3.0.1.2-10.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034350" version="1" comment="OpenOffice_org-tr is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034351" version="1" comment="OpenOffice_org-ts is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034352" version="1" comment="OpenOffice_org-vi is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034353" version="1" comment="OpenOffice_org-writer is &lt;2.3.0.1.2-10.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034354" version="1" comment="OpenOffice_org-xh is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034355" version="1" comment="OpenOffice_org-zh-CN is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034356" version="1" comment="OpenOffice_org-zh-TW is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034357" version="1" comment="OpenOffice_org-zu is &lt;2.3.0.1.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034358" version="1" comment="OpenOffice_org is &lt;2.3.0.1.2-10.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034359" version="1" comment="icu-data is &lt;3.6-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034360" version="1" comment="icu is &lt;3.6-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034361" version="1" comment="libicu-32bit is &lt;3.6-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034362" version="1" comment="libicu-64bit is &lt;3.6-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034363" version="1" comment="libicu-devel-32bit is &lt;3.6-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034364" version="1" comment="libicu-devel-64bit is &lt;3.6-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034365" version="1" comment="libicu-devel is &lt;3.6-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034366" version="1" comment="libicu-doc is &lt;3.6-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034367" version="1" comment="libicu is &lt;3.6-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034368" version="1" comment="epiphany-devel is &lt;2.20.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034369" version="1" comment="epiphany-doc is &lt;2.20.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034370" version="1" comment="epiphany-extensions is &lt;2.20.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034371" version="1" comment="epiphany is &lt;2.20.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034372" version="1" comment="mozilla-xulrunner181-32bit is &lt;1.8.1.13-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034373" version="1" comment="mozilla-xulrunner181-64bit is &lt;1.8.1.13-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034374" version="1" comment="mozilla-xulrunner181-devel is &lt;1.8.1.13-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034375" version="1" comment="mozilla-xulrunner181-l10n is &lt;1.8.1.13-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034376" version="1" comment="mozilla-xulrunner181 is &lt;1.8.1.13-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034377" version="1" comment="MozillaFirefox-translations is &lt;2.0.0.13-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034378" version="1" comment="MozillaFirefox is &lt;2.0.0.13-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034379" version="1" comment="seamonkey-dom-inspector is &lt;1.1.9-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034380" version="1" comment="seamonkey-irc is &lt;1.1.9-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034381" version="1" comment="seamonkey-mail is &lt;1.1.9-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034382" version="1" comment="seamonkey-spellchecker is &lt;1.1.9-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034383" version="1" comment="seamonkey-venkman is &lt;1.1.9-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034384" version="1" comment="seamonkey is &lt;1.1.9-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034385" version="1" comment="opal-devel is &lt;2.2.8-60.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034386" version="1" comment="opal is &lt;2.2.8-60.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034387" version="1" comment="python-32bit is &lt;2.5.1-39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034388" version="1" comment="python-64bit is &lt;2.5.1-39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034389" version="1" comment="python-curses is &lt;2.5.1-39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034390" version="1" comment="python-demo is &lt;2.5.1-39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034391" version="1" comment="python-devel is &lt;2.5.1-39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034392" version="1" comment="python-gdbm is &lt;2.5.1-39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034393" version="1" comment="python-idle is &lt;2.5.1-39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034394" version="1" comment="python-tk is &lt;2.5.1-39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034395" version="1" comment="python-xml is &lt;2.5.1-39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034396" version="1" comment="python is &lt;2.5.1-39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034397" version="1" comment="GraphicsMagick-devel is &lt;1.1.8-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034398" version="1" comment="GraphicsMagick is &lt;1.1.8-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034399" version="1" comment="libGraphicsMagick++-devel is &lt;1.1.8-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034400" version="1" comment="libGraphicsMagick++1 is &lt;1.1.8-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034401" version="1" comment="libGraphicsMagick1 is &lt;1.1.8-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034402" version="1" comment="libGraphicsMagickWand0 is &lt;1.1.8-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034403" version="1" comment="perl-GraphicsMagick is &lt;1.1.8-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034404" version="1" comment="libopenssl-devel is &lt;0.9.8e-45.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034405" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8e-45.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034406" version="1" comment="libopenssl0_9_8-64bit is &lt;0.9.8e-45.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034407" version="1" comment="libopenssl0_9_8 is &lt;0.9.8e-45.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034408" version="1" comment="openssl-certs is &lt;0.9.8e-45.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034409" version="1" comment="openssl-doc is &lt;0.9.8e-45.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034410" version="1" comment="openssl is &lt;0.9.8e-45.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034411" version="1" comment="libpurple-devel is &lt;2.1.1-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034412" version="1" comment="libpurple is &lt;2.1.1-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034413" version="1" comment="apache2-devel is &lt;2.2.4-70.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034414" version="1" comment="apache2-doc is &lt;2.2.4-70.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034415" version="1" comment="apache2-example-pages is &lt;2.2.4-70.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034416" version="1" comment="apache2-prefork is &lt;2.2.4-70.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034417" version="1" comment="apache2-utils is &lt;2.2.4-70.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034418" version="1" comment="apache2-worker is &lt;2.2.4-70.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034419" version="1" comment="apache2 is &lt;2.2.4-70.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034420" version="1" comment="perl-32bit is &lt;5.8.8-76.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034421" version="1" comment="perl-64bit is &lt;5.8.8-76.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034422" version="1" comment="perl-base is &lt;5.8.8-76.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034423" version="1" comment="perl is &lt;5.8.8-76.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034424" version="1" comment="libopenssl-devel is &lt;0.9.8e-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034425" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8e-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034426" version="1" comment="libopenssl0_9_8-64bit is &lt;0.9.8e-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034427" version="1" comment="libopenssl0_9_8 is &lt;0.9.8e-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034428" version="1" comment="openssl-certs is &lt;0.9.8e-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034429" version="1" comment="openssl-doc is &lt;0.9.8e-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034430" version="1" comment="openssl is &lt;0.9.8e-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034431" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034432" version="1" comment="compat-openssl097g-64bit is &lt;0.9.7g-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034433" version="1" comment="compat-openssl097g is &lt;0.9.7g-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034434" version="1" comment="tk-32bit is &lt;8.4.15-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034435" version="1" comment="tk-64bit is &lt;8.4.15-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034436" version="1" comment="tk-devel is &lt;8.4.15-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034437" version="1" comment="tk is &lt;8.4.15-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034438" version="1" comment="ruby-devel is &lt;1.8.6.p36-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034439" version="1" comment="ruby-doc-html is &lt;1.8.6.p36-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034440" version="1" comment="ruby-doc-ri is &lt;1.8.6.p36-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034441" version="1" comment="ruby-examples is &lt;1.8.6.p36-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034442" version="1" comment="ruby-test-suite is &lt;1.8.6.p36-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034443" version="1" comment="ruby-tk is &lt;1.8.6.p36-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034444" version="1" comment="ruby is &lt;1.8.6.p36-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034445" version="1" comment="util-linux is &lt;2.12r+2.13rc2+git20070725-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034446" version="1" comment="nagios-plugins-extras is &lt;1.4.9-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034447" version="1" comment="nagios-plugins is &lt;1.4.9-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034448" version="1" comment="hugin is &lt;0.6.99.4-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034449" version="1" comment="hplip-hpijs is &lt;2.7.7-37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034450" version="1" comment="hplip is &lt;2.7.7-37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034451" version="1" comment="java-1_5_0-sun-alsa is &lt;1.5.0_update13-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034452" version="1" comment="java-1_5_0-sun-demo is &lt;1.5.0_update13-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034453" version="1" comment="java-1_5_0-sun-devel is &lt;1.5.0_update13-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034454" version="1" comment="java-1_5_0-sun-jdbc is &lt;1.5.0_update13-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034455" version="1" comment="java-1_5_0-sun-plugin is &lt;1.5.0_update13-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034456" version="1" comment="java-1_5_0-sun-src is &lt;1.5.0_update13-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034457" version="1" comment="java-1_5_0-sun is &lt;1.5.0_update13-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034458" version="1" comment="java-1_6_0-sun-alsa is &lt;1.6.0.u3-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034459" version="1" comment="java-1_6_0-sun-demo is &lt;1.6.0.u3-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034460" version="1" comment="java-1_6_0-sun-devel is &lt;1.6.0.u3-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034461" version="1" comment="java-1_6_0-sun-jdbc is &lt;1.6.0.u3-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034462" version="1" comment="java-1_6_0-sun-plugin is &lt;1.6.0.u3-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034463" version="1" comment="java-1_6_0-sun is &lt;1.6.0.u3-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034464" version="1" comment="libpng-32bit is &lt;1.2.18-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034465" version="1" comment="libpng-64bit is &lt;1.2.18-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034466" version="1" comment="libpng-devel-32bit is &lt;1.2.18-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034467" version="1" comment="libpng-devel-64bit is &lt;1.2.18-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034468" version="1" comment="libpng-devel is &lt;1.2.18-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034469" version="1" comment="libpng is &lt;1.2.18-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034470" version="1" comment="MozillaThunderbird-translations is &lt;2.0.0.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034471" version="1" comment="MozillaThunderbird is &lt;2.0.0.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034472" version="1" comment="rubygem-actionpack is &lt;1.13.3-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034473" version="1" comment="kdegraphics3-pdf is &lt;3.5.7-60.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034474" version="1" comment="RealPlayer is &lt;10.0.5-100.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034475" version="1" comment="RealPlayer is &lt;10.0.9-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034476" version="1" comment="e2fsprogs-devel is &lt;1.40.2-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034477" version="1" comment="e2fsprogs is &lt;1.40.2-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034478" version="1" comment="libblkid-devel is &lt;1.40.2-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034479" version="1" comment="libblkid1 is &lt;1.40.2-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034480" version="1" comment="libcom_err-devel is &lt;1.40.2-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034481" version="1" comment="libcom_err2-32bit is &lt;1.40.2-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034482" version="1" comment="libcom_err2-64bit is &lt;1.40.2-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034483" version="1" comment="libcom_err2 is &lt;1.40.2-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034484" version="1" comment="libext2fs-devel is &lt;1.40.2-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034485" version="1" comment="libext2fs2 is &lt;1.40.2-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034486" version="1" comment="libuuid-devel is &lt;1.40.2-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034487" version="1" comment="libuuid1-32bit is &lt;1.40.2-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034488" version="1" comment="libuuid1-64bit is &lt;1.40.2-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034489" version="1" comment="libuuid1 is &lt;1.40.2-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034490" version="1" comment="kernel-bigsmp is &lt;2.6.22.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034491" version="1" comment="kernel-debug is &lt;2.6.22.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034492" version="1" comment="kernel-default is &lt;2.6.22.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034493" version="1" comment="kernel-kdump is &lt;2.6.22.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034494" version="1" comment="kernel-ppc64 is &lt;2.6.22.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034495" version="1" comment="kernel-rt is &lt;2.6.22.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034496" version="1" comment="kernel-rt_debug is &lt;2.6.22.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034497" version="1" comment="kernel-source is &lt;2.6.22.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034498" version="1" comment="kernel-syms is &lt;2.6.22.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034499" version="1" comment="kernel-xen is &lt;2.6.22.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034500" version="1" comment="kernel-xenpae is &lt;2.6.22.13-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034501" version="1" comment="cairo-32bit is &lt;1.4.10-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034502" version="1" comment="cairo-64bit is &lt;1.4.10-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034503" version="1" comment="cairo-devel-64bit is &lt;1.4.10-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034504" version="1" comment="cairo-devel is &lt;1.4.10-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034505" version="1" comment="cairo-doc is &lt;1.4.10-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034506" version="1" comment="cairo is &lt;1.4.10-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034507" version="1" comment="opera is &lt;9.24-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034508" version="1" comment="phpMyAdmin is &lt;2.11.0-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034509" version="1" comment="nagios-www is &lt;2.9-48.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034510" version="1" comment="nagios is &lt;2.9-48.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034511" version="1" comment="openldap2-back-meta is &lt;2.3.37-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034512" version="1" comment="openldap2-back-perl is &lt;2.3.37-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034513" version="1" comment="openldap2-devel-32bit is &lt;2.3.37-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034514" version="1" comment="openldap2-devel-64bit is &lt;2.3.37-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034515" version="1" comment="openldap2-devel is &lt;2.3.37-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034516" version="1" comment="openldap2 is &lt;2.3.37-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034517" version="1" comment="xorg-x11-devel-32bit is &lt;7.2-103.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034518" version="1" comment="xorg-x11-devel-64bit is &lt;7.2-103.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034519" version="1" comment="xorg-x11-devel is &lt;7.2-103.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034520" version="1" comment="xorg-x11-libs-32bit is &lt;7.2-103.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034521" version="1" comment="xorg-x11-libs-64bit is &lt;7.2-103.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034522" version="1" comment="xorg-x11-libs is &lt;7.2-103.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034523" version="1" comment="xorg-x11-server-extra is &lt;7.2-143.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034524" version="1" comment="xorg-x11-server-sdk is &lt;7.2-143.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034525" version="1" comment="xorg-x11-server is &lt;7.2-143.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034526" version="1" comment="emacs-el is &lt;22.1-40.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034527" version="1" comment="emacs-info is &lt;22.1-40.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034528" version="1" comment="emacs-nox is &lt;22.1-40.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034529" version="1" comment="emacs-x11 is &lt;22.1-40.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034530" version="1" comment="emacs is &lt;22.1-40.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034531" version="1" comment="cups-client is &lt;1.2.12-22.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034532" version="1" comment="cups-devel is &lt;1.2.12-22.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034533" version="1" comment="cups-libs-32bit is &lt;1.2.12-22.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034534" version="1" comment="cups-libs-64bit is &lt;1.2.12-22.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034535" version="1" comment="cups-libs is &lt;1.2.12-22.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034536" version="1" comment="cups is &lt;1.2.12-22.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034537" version="1" comment="krb5-32bit is &lt;1.6.2-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034538" version="1" comment="krb5-64bit is &lt;1.6.2-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034539" version="1" comment="krb5-apps-clients is &lt;1.6.2-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034540" version="1" comment="krb5-apps-servers is &lt;1.6.2-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034541" version="1" comment="krb5-client is &lt;1.6.2-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034542" version="1" comment="krb5-devel-32bit is &lt;1.6.2-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034543" version="1" comment="krb5-devel-64bit is &lt;1.6.2-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034544" version="1" comment="krb5-devel is &lt;1.6.2-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034545" version="1" comment="krb5-server is &lt;1.6.2-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034546" version="1" comment="krb5 is &lt;1.6.2-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034547" version="1" comment="xen-devel is &lt;3.1.0_15042-51.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034548" version="1" comment="xen-doc-html is &lt;3.1.0_15042-51.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034549" version="1" comment="xen-doc-pdf is &lt;3.1.0_15042-51.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034550" version="1" comment="xen-libs is &lt;3.1.0_15042-51.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034551" version="1" comment="xen-tools-domU is &lt;3.1.0_15042-51.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034552" version="1" comment="xen-tools-ioemu is &lt;3.1.0_15042-51.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034553" version="1" comment="xen-tools is &lt;3.1.0_15042-51.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034554" version="1" comment="xen is &lt;3.1.0_15042-51.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034555" version="1" comment="texlive-bin-cjk is &lt;2007-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034556" version="1" comment="texlive-bin-devel is &lt;2007-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034557" version="1" comment="texlive-bin-dvilj is &lt;2007-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034558" version="1" comment="texlive-bin-latex is &lt;2007-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034559" version="1" comment="texlive-bin-metapost is &lt;2007-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034560" version="1" comment="texlive-bin-omega is &lt;2007-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034561" version="1" comment="texlive-bin-xetex is &lt;2007-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034562" version="1" comment="texlive-bin is &lt;2007-68.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034563" version="1" comment="epiphany-devel is &lt;2.20.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034564" version="1" comment="epiphany-doc is &lt;2.20.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034565" version="1" comment="epiphany-extensions-lang is &lt;2.20.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034566" version="1" comment="epiphany-extensions is &lt;2.20.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034567" version="1" comment="epiphany-lang is &lt;2.20.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034568" version="1" comment="epiphany is &lt;2.20.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034569" version="1" comment="mozilla-xulrunner181-32bit is &lt;1.8.1.10-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034570" version="1" comment="mozilla-xulrunner181-64bit is &lt;1.8.1.10-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034571" version="1" comment="mozilla-xulrunner181-devel is &lt;1.8.1.10-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034572" version="1" comment="mozilla-xulrunner181-l10n is &lt;1.8.1.10-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034573" version="1" comment="mozilla-xulrunner181 is &lt;1.8.1.10-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034574" version="1" comment="seamonkey-dom-inspector is &lt;1.1.7-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034575" version="1" comment="seamonkey-irc is &lt;1.1.7-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034576" version="1" comment="seamonkey-mail is &lt;1.1.7-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034577" version="1" comment="seamonkey-spellchecker is &lt;1.1.7-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034578" version="1" comment="seamonkey-venkman is &lt;1.1.7-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034579" version="1" comment="seamonkey is &lt;1.1.7-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034580" version="1" comment="MozillaFirefox-translations is &lt;2.0.0.10-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034581" version="1" comment="MozillaFirefox is &lt;2.0.0.10-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034582" version="1" comment="libqt4-32bit is &lt;4.3.1-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034583" version="1" comment="libqt4-64bit is &lt;4.3.1-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034584" version="1" comment="libqt4-dbus-1-32bit is &lt;4.3.1-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034585" version="1" comment="libqt4-dbus-1-64bit is &lt;4.3.1-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034586" version="1" comment="libqt4-dbus-1 is &lt;4.3.1-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034587" version="1" comment="libqt4-devel-doc is &lt;4.3.1-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034588" version="1" comment="libqt4-devel is &lt;4.3.1-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034589" version="1" comment="libqt4-qt3support-32bit is &lt;4.3.1-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034590" version="1" comment="libqt4-qt3support-64bit is &lt;4.3.1-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034591" version="1" comment="libqt4-qt3support is &lt;4.3.1-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034592" version="1" comment="libqt4-sql-32bit is &lt;4.3.1-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034593" version="1" comment="libqt4-sql-64bit is &lt;4.3.1-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034594" version="1" comment="libqt4-sql is &lt;4.3.1-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034595" version="1" comment="libqt4-x11-32bit is &lt;4.3.1-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034596" version="1" comment="libqt4-x11-64bit is &lt;4.3.1-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034597" version="1" comment="libqt4-x11 is &lt;4.3.1-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034598" version="1" comment="libqt4 is &lt;4.3.1-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034599" version="1" comment="cifs-mount is &lt;3.0.26a-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034600" version="1" comment="ldapsmb is &lt;1.34b-110.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034601" version="1" comment="libmsrpc-devel is &lt;3.0.26a-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034602" version="1" comment="libmsrpc is &lt;3.0.26a-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034603" version="1" comment="libsmbclient-32bit is &lt;3.0.26a-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034604" version="1" comment="libsmbclient-64bit is &lt;3.0.26a-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034605" version="1" comment="libsmbclient-devel is &lt;3.0.26a-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034606" version="1" comment="libsmbclient is &lt;3.0.26a-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034607" version="1" comment="libsmbsharemodes-devel is &lt;3.0.26a-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034608" version="1" comment="libsmbsharemodes is &lt;3.0.26a-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034609" version="1" comment="samba-32bit is &lt;3.0.26a-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034610" version="1" comment="samba-64bit is &lt;3.0.26a-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034611" version="1" comment="samba-client-32bit is &lt;3.0.26a-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034612" version="1" comment="samba-client-64bit is &lt;3.0.26a-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034613" version="1" comment="samba-client is &lt;3.0.26a-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034614" version="1" comment="samba-devel is &lt;3.0.26a-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034615" version="1" comment="samba-doc is &lt;3.0.26a-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034616" version="1" comment="samba-krb-printing is &lt;3.0.26a-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034617" version="1" comment="samba-python is &lt;3.0.26a-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034618" version="1" comment="samba-vscan is &lt;0.3.6b-181.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034619" version="1" comment="samba-winbind-32bit is &lt;3.0.26a-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034620" version="1" comment="samba-winbind-64bit is &lt;3.0.26a-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034621" version="1" comment="samba-winbind is &lt;3.0.26a-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034622" version="1" comment="samba is &lt;3.0.26a-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034623" version="1" comment="imp is &lt;4.1.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034624" version="1" comment="cacti is &lt;0.8.6j-64.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034625" version="1" comment="xemacs-el is &lt;21.5.28.20070807-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034626" version="1" comment="xemacs-info is &lt;21.5.28.20070807-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034627" version="1" comment="xemacs is &lt;21.5.28.20070807-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034628" version="1" comment="emacs-el is &lt;22.1-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034629" version="1" comment="emacs-info is &lt;22.1-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034630" version="1" comment="emacs-nox is &lt;22.1-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034631" version="1" comment="emacs-x11 is &lt;22.1-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034632" version="1" comment="emacs is &lt;22.1-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034633" version="1" comment="htdig-devel is &lt;3.2.0b6-110.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034634" version="1" comment="htdig-doc is &lt;3.2.0b6-110.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034635" version="1" comment="htdig is &lt;3.2.0b6-110.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034636" version="1" comment="wireshark-devel is &lt;0.99.6-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034637" version="1" comment="wireshark is &lt;0.99.6-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034638" version="1" comment="gnump3d is &lt;2.9.8-84.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034639" version="1" comment="yast2-core-devel is &lt;2.15.13-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034640" version="1" comment="yast2-core is &lt;2.15.13-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034641" version="1" comment="rsync is &lt;2.6.9-55.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034642" version="1" comment="kernel-bigsmp is &lt;2.6.22.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034643" version="1" comment="kernel-debug is &lt;2.6.22.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034644" version="1" comment="kernel-default is &lt;2.6.22.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034645" version="1" comment="kernel-kdump is &lt;2.6.22.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034646" version="1" comment="kernel-ppc64 is &lt;2.6.22.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034647" version="1" comment="kernel-rt is &lt;2.6.22.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034648" version="1" comment="kernel-rt_debug is &lt;2.6.22.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034649" version="1" comment="kernel-source is &lt;2.6.22.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034650" version="1" comment="kernel-syms is &lt;2.6.22.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034651" version="1" comment="kernel-xen is &lt;2.6.22.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034652" version="1" comment="kernel-xenpae is &lt;2.6.22.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034653" version="1" comment="squid is &lt;2.6.STABLE14-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034654" version="1" comment="kernel-bigsmp is &lt;2.6.22.18-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034655" version="1" comment="kernel-debug is &lt;2.6.22.18-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034656" version="1" comment="kernel-default is &lt;2.6.22.18-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034657" version="1" comment="kernel-kdump is &lt;2.6.22.18-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034658" version="1" comment="kernel-ppc64 is &lt;2.6.22.18-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034659" version="1" comment="kernel-source is &lt;2.6.22.18-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034660" version="1" comment="kernel-syms is &lt;2.6.22.18-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034661" version="1" comment="kernel-xen is &lt;2.6.22.18-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034662" version="1" comment="kernel-xenpae is &lt;2.6.22.18-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034663" version="1" comment="libxml2-32bit is &lt;2.6.30-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034664" version="1" comment="libxml2-64bit is &lt;2.6.30-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034665" version="1" comment="libxml2-devel-32bit is &lt;2.6.30-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034666" version="1" comment="libxml2-devel-64bit is &lt;2.6.30-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034667" version="1" comment="libxml2-devel is &lt;2.6.30-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034668" version="1" comment="libxml2-python is &lt;2.6.30-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034669" version="1" comment="libxml2 is &lt;2.6.30-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034670" version="1" comment="clamav-db is &lt;0.92-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033716" version="1" comment="clamav is &lt;0.92-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034671" version="1" comment="libexif-32bit is &lt;0.6.16-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034672" version="1" comment="libexif-64bit is &lt;0.6.16-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034673" version="1" comment="libexif-devel is &lt;0.6.16-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034674" version="1" comment="libexif is &lt;0.6.16-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034675" version="1" comment="libexif5 is &lt;0.5.12-80.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034676" version="1" comment="libexiv2-devel is &lt;0.15-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034677" version="1" comment="libexiv2 is &lt;0.15-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034678" version="1" comment="gnome-screensaver is &lt;2.20.0-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034679" version="1" comment="apache2-devel is &lt;2.2.4-70.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034680" version="1" comment="apache2-doc is &lt;2.2.4-70.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034681" version="1" comment="apache2-example-pages is &lt;2.2.4-70.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034682" version="1" comment="apache2-prefork is &lt;2.2.4-70.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034683" version="1" comment="apache2-utils is &lt;2.2.4-70.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034684" version="1" comment="apache2-worker is &lt;2.2.4-70.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034685" version="1" comment="apache2 is &lt;2.2.4-70.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034686" version="1" comment="NX is &lt;2.1.0-35.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034687" version="1" comment="opera is &lt;9.25-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034688" version="1" comment="xfce4-panel-devel is &lt;4.4.1-61.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034689" version="1" comment="xfce4-panel is &lt;4.4.1-61.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034690" version="1" comment="libxfcegui4-devel is &lt;4.4.1-55.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034691" version="1" comment="libxfcegui4 is &lt;4.4.1-55.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034692" version="1" comment="clamav-db is &lt;0.93-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034693" version="1" comment="clamav is &lt;0.93-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034694" version="1" comment="dovecot-devel is &lt;1.0.5-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034695" version="1" comment="dovecot is &lt;1.0.5-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034696" version="1" comment="libcdio++0 is &lt;0.78.2-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034697" version="1" comment="libcdio-devel is &lt;0.78.2-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034698" version="1" comment="libcdio-utils is &lt;0.78.2-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034699" version="1" comment="libcdio7-32bit is &lt;0.78.2-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034700" version="1" comment="libcdio7-64bit is &lt;0.78.2-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034701" version="1" comment="libcdio7 is &lt;0.78.2-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034702" version="1" comment="libcdio_cdda0 is &lt;0.78.2-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034703" version="1" comment="libcdio_paranoia0 is &lt;0.78.2-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034704" version="1" comment="libiso9660-5-32bit is &lt;0.78.2-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034705" version="1" comment="libiso9660-5-64bit is &lt;0.78.2-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034706" version="1" comment="libiso9660-5 is &lt;0.78.2-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034707" version="1" comment="libudf0 is &lt;0.78.2-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034708" version="1" comment="openldap2-back-meta is &lt;2.3.37-7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034709" version="1" comment="openldap2-back-perl is &lt;2.3.37-7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034710" version="1" comment="openldap2-devel-32bit is &lt;2.3.37-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034711" version="1" comment="openldap2-devel-64bit is &lt;2.3.37-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034712" version="1" comment="openldap2-devel is &lt;2.3.37-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034713" version="1" comment="openldap2 is &lt;2.3.37-7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034714" version="1" comment="kernel-bigsmp is &lt;2.6.22.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034715" version="1" comment="kernel-debug is &lt;2.6.22.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034716" version="1" comment="kernel-default is &lt;2.6.22.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034717" version="1" comment="kernel-kdump is &lt;2.6.22.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034718" version="1" comment="kernel-ppc64 is &lt;2.6.22.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034719" version="1" comment="kernel-source is &lt;2.6.22.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034720" version="1" comment="kernel-syms is &lt;2.6.22.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034721" version="1" comment="kernel-xen is &lt;2.6.22.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034722" version="1" comment="kernel-xenpae is &lt;2.6.22.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034723" version="1" comment="libmikmod-32bit is &lt;3.1.11a-34.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034724" version="1" comment="libmikmod-64bit is &lt;3.1.11a-34.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034725" version="1" comment="libmikmod-devel is &lt;3.1.11a-34.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034726" version="1" comment="libmikmod is &lt;3.1.11a-34.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034727" version="1" comment="ghostscript-fonts-other is &lt;8.15.4-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034728" version="1" comment="ghostscript-fonts-rus is &lt;8.15.4-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034729" version="1" comment="ghostscript-fonts-std is &lt;8.15.4-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034730" version="1" comment="ghostscript-ijs-devel is &lt;8.15.4-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034731" version="1" comment="ghostscript-library is &lt;8.15.4-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034732" version="1" comment="ghostscript-omni is &lt;8.15.4-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034733" version="1" comment="ghostscript-x11 is &lt;8.15.4-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034734" version="1" comment="libgimpprint-devel is &lt;4.2.7-178.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034735" version="1" comment="libgimpprint is &lt;4.2.7-178.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034736" version="1" comment="MozillaThunderbird-translations is &lt;2.0.0.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034737" version="1" comment="MozillaThunderbird is &lt;2.0.0.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034738" version="1" comment="seamonkey-dom-inspector is &lt;1.1.12-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034739" version="1" comment="seamonkey-irc is &lt;1.1.12-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034740" version="1" comment="seamonkey-mail is &lt;1.1.12-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034741" version="1" comment="seamonkey-spellchecker is &lt;1.1.12-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034742" version="1" comment="seamonkey-venkman is &lt;1.1.12-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034743" version="1" comment="seamonkey is &lt;1.1.12-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034744" version="1" comment="MozillaFirefox-translations is &lt;2.0.0.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034745" version="1" comment="MozillaFirefox is &lt;2.0.0.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034746" version="1" comment="mozilla-xulrunner181-32bit is &lt;1.8.1.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034747" version="1" comment="mozilla-xulrunner181-64bit is &lt;1.8.1.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034748" version="1" comment="mozilla-xulrunner181-devel is &lt;1.8.1.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034749" version="1" comment="mozilla-xulrunner181-l10n is &lt;1.8.1.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034750" version="1" comment="mozilla-xulrunner181 is &lt;1.8.1.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034751" version="1" comment="epiphany-devel is &lt;2.20.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034752" version="1" comment="epiphany-doc is &lt;2.20.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034753" version="1" comment="epiphany-extensions is &lt;2.20.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034754" version="1" comment="epiphany is &lt;2.20.0-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034755" version="1" comment="mozilla-xulrunner181-32bit is &lt;1.8.1.18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034756" version="1" comment="mozilla-xulrunner181-64bit is &lt;1.8.1.18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034757" version="1" comment="mozilla-xulrunner181-devel is &lt;1.8.1.18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034758" version="1" comment="mozilla-xulrunner181-l10n is &lt;1.8.1.18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034759" version="1" comment="mozilla-xulrunner181 is &lt;1.8.1.18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034760" version="1" comment="MozillaFirefox-translations is &lt;2.0.0.18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034761" version="1" comment="MozillaFirefox is &lt;2.0.0.18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034762" version="1" comment="seamonkey-dom-inspector is &lt;1.1.13-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034763" version="1" comment="seamonkey-irc is &lt;1.1.13-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034764" version="1" comment="seamonkey-mail is &lt;1.1.13-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034765" version="1" comment="seamonkey-spellchecker is &lt;1.1.13-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034766" version="1" comment="seamonkey-venkman is &lt;1.1.13-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034767" version="1" comment="seamonkey is &lt;1.1.13-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034768" version="1" comment="cups-client is &lt;1.2.12-22.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034769" version="1" comment="cups-devel is &lt;1.2.12-22.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034770" version="1" comment="cups-libs-32bit is &lt;1.2.12-22.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034771" version="1" comment="cups-libs-64bit is &lt;1.2.12-22.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034772" version="1" comment="cups-libs is &lt;1.2.12-22.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034773" version="1" comment="cups is &lt;1.2.12-22.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034774" version="1" comment="cups-client is &lt;1.2.12-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034775" version="1" comment="cups-devel is &lt;1.2.12-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034776" version="1" comment="cups-libs-32bit is &lt;1.2.12-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034777" version="1" comment="cups-libs-64bit is &lt;1.2.12-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034778" version="1" comment="cups-libs is &lt;1.2.12-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034779" version="1" comment="cups is &lt;1.2.12-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034780" version="1" comment="krb5-32bit is &lt;1.6.2-22.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034781" version="1" comment="krb5-64bit is &lt;1.6.2-22.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034782" version="1" comment="krb5-apps-clients is &lt;1.6.2-22.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034783" version="1" comment="krb5-apps-servers is &lt;1.6.2-22.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034784" version="1" comment="krb5-client is &lt;1.6.2-22.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034785" version="1" comment="krb5-devel-32bit is &lt;1.6.2-22.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034786" version="1" comment="krb5-devel-64bit is &lt;1.6.2-22.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034787" version="1" comment="krb5-devel is &lt;1.6.2-22.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034788" version="1" comment="krb5-server is &lt;1.6.2-22.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034789" version="1" comment="krb5 is &lt;1.6.2-22.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034790" version="1" comment="evolution-devel is &lt;2.12.0-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034791" version="1" comment="evolution-pilot is &lt;2.12.0-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034792" version="1" comment="evolution is &lt;2.12.0-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034793" version="1" comment="xine-devel is &lt;1.1.8-14.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034794" version="1" comment="xine-extra is &lt;1.1.8-14.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034795" version="1" comment="xine-lib-32bit is &lt;1.1.8-14.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034796" version="1" comment="xine-lib-64bit is &lt;1.1.8-14.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034797" version="1" comment="xine-lib is &lt;1.1.8-14.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034798" version="1" comment="xine-ui is &lt;0.99.5-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034799" version="1" comment="bind-chrootenv is &lt;9.4.1.P1-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034800" version="1" comment="bind-devel-64bit is &lt;9.4.1.P1-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034801" version="1" comment="bind-devel is &lt;9.4.1.P1-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034802" version="1" comment="bind-doc is &lt;9.4.1.P1-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034803" version="1" comment="bind-libs-32bit is &lt;9.4.1.P1-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034804" version="1" comment="bind-libs-64bit is &lt;9.4.1.P1-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034805" version="1" comment="bind-libs is &lt;9.4.1.P1-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034806" version="1" comment="bind-utils is &lt;9.4.1.P1-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034807" version="1" comment="bind is &lt;9.4.1.P1-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034808" version="1" comment="moodle-af is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034809" version="1" comment="moodle-ar is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034810" version="1" comment="moodle-be is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034811" version="1" comment="moodle-bg is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034812" version="1" comment="moodle-bs is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034813" version="1" comment="moodle-ca is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034814" version="1" comment="moodle-cs is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034815" version="1" comment="moodle-da is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034816" version="1" comment="moodle-de is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034817" version="1" comment="moodle-de_du is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034818" version="1" comment="moodle-el is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034819" version="1" comment="moodle-es is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034820" version="1" comment="moodle-et is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034821" version="1" comment="moodle-eu is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034822" version="1" comment="moodle-fa is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034823" version="1" comment="moodle-fi is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034824" version="1" comment="moodle-fr is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034825" version="1" comment="moodle-ga is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034826" version="1" comment="moodle-gl is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034827" version="1" comment="moodle-he is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034828" version="1" comment="moodle-hi is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034829" version="1" comment="moodle-hr is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034830" version="1" comment="moodle-hu is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034831" version="1" comment="moodle-id is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034832" version="1" comment="moodle-is is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034833" version="1" comment="moodle-it is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034834" version="1" comment="moodle-ja is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034835" version="1" comment="moodle-ka is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034836" version="1" comment="moodle-km is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034837" version="1" comment="moodle-kn is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034838" version="1" comment="moodle-ko is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034839" version="1" comment="moodle-lt is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034840" version="1" comment="moodle-lv is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034841" version="1" comment="moodle-mi_tn is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034842" version="1" comment="moodle-ms is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034843" version="1" comment="moodle-nl is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034844" version="1" comment="moodle-nn is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034845" version="1" comment="moodle-no is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034846" version="1" comment="moodle-pl is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034847" version="1" comment="moodle-pt is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034848" version="1" comment="moodle-ro is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034849" version="1" comment="moodle-ru is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034850" version="1" comment="moodle-sk is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034851" version="1" comment="moodle-sl is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034852" version="1" comment="moodle-so is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034853" version="1" comment="moodle-sq is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034854" version="1" comment="moodle-sr is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034855" version="1" comment="moodle-sv is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034856" version="1" comment="moodle-th is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034857" version="1" comment="moodle-tl is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034858" version="1" comment="moodle-tr is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034859" version="1" comment="moodle-uk is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034860" version="1" comment="moodle-vi is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034861" version="1" comment="moodle-zh_cn is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034862" version="1" comment="moodle is &lt;1.8.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034863" version="1" comment="boost-64bit is &lt;1.33.1-108.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034864" version="1" comment="boost-devel-64bit is &lt;1.33.1-108.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034865" version="1" comment="boost-devel is &lt;1.33.1-108.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034866" version="1" comment="boost-doc is &lt;1.33.1-108.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034867" version="1" comment="boost is &lt;1.33.1-108.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034868" version="1" comment="xine-devel is &lt;1.1.8-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034869" version="1" comment="xine-extra is &lt;1.1.8-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034870" version="1" comment="xine-lib-32bit is &lt;1.1.8-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034871" version="1" comment="xine-lib-64bit is &lt;1.1.8-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034872" version="1" comment="xine-lib is &lt;1.1.8-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034873" version="1" comment="clamav-db is &lt;0.92.1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033747" version="1" comment="clamav is &lt;0.92.1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034874" version="1" comment="xdg-utils is &lt;1.0.1-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034875" version="1" comment="ghostscript-fonts-other is &lt;8.15.4-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034876" version="1" comment="ghostscript-fonts-rus is &lt;8.15.4-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034877" version="1" comment="ghostscript-fonts-std is &lt;8.15.4-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034878" version="1" comment="ghostscript-ijs-devel is &lt;8.15.4-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034879" version="1" comment="ghostscript-library is &lt;8.15.4-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034880" version="1" comment="ghostscript-omni is &lt;8.15.4-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034881" version="1" comment="ghostscript-x11 is &lt;8.15.4-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034882" version="1" comment="libgimpprint-devel is &lt;4.2.7-178.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034883" version="1" comment="libgimpprint is &lt;4.2.7-178.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034884" version="1" comment="MozillaFirefox-translations is &lt;2.0.0.12-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034885" version="1" comment="MozillaFirefox is &lt;2.0.0.12-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034886" version="1" comment="MozillaThunderbird-translations is &lt;2.0.0.12-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034887" version="1" comment="MozillaThunderbird is &lt;2.0.0.12-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034888" version="1" comment="seamonkey-dom-inspector is &lt;1.1.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034889" version="1" comment="seamonkey-irc is &lt;1.1.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034890" version="1" comment="seamonkey-mail is &lt;1.1.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034891" version="1" comment="seamonkey-spellchecker is &lt;1.1.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034892" version="1" comment="seamonkey-venkman is &lt;1.1.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034893" version="1" comment="seamonkey is &lt;1.1.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034894" version="1" comment="epiphany-devel is &lt;2.20.0-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034895" version="1" comment="epiphany-doc is &lt;2.20.0-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034896" version="1" comment="epiphany-extensions is &lt;2.20.0-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034897" version="1" comment="epiphany is &lt;2.20.0-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034898" version="1" comment="mozilla-xulrunner181-32bit is &lt;1.8.1.12-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034899" version="1" comment="mozilla-xulrunner181-64bit is &lt;1.8.1.12-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034900" version="1" comment="mozilla-xulrunner181-devel is &lt;1.8.1.12-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034901" version="1" comment="mozilla-xulrunner181-l10n is &lt;1.8.1.12-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034902" version="1" comment="mozilla-xulrunner181 is &lt;1.8.1.12-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034903" version="1" comment="tk-32bit is &lt;8.4.15-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034904" version="1" comment="tk-64bit is &lt;8.4.15-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034905" version="1" comment="tk-devel is &lt;8.4.15-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034906" version="1" comment="tk is &lt;8.4.15-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034907" version="1" comment="mailman is &lt;2.1.9-90.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034908" version="1" comment="dbus-1-32bit is &lt;1.0.2-59.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034909" version="1" comment="dbus-1-64bit is &lt;1.0.2-59.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034910" version="1" comment="dbus-1-devel-doc is &lt;1.0.2-59.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034911" version="1" comment="dbus-1-devel is &lt;1.0.2-59.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034912" version="1" comment="dbus-1-glib-32bit is &lt;0.74-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034913" version="1" comment="dbus-1-glib-64bit is &lt;0.74-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034914" version="1" comment="dbus-1-glib-devel is &lt;0.74-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034915" version="1" comment="dbus-1-glib-doc is &lt;0.74-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034916" version="1" comment="dbus-1-glib is &lt;0.74-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034917" version="1" comment="dbus-1-mono is &lt;0.63-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034918" version="1" comment="dbus-1-python is &lt;0.82.0-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034919" version="1" comment="dbus-1-qt3-32bit is &lt;0.62-110.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034920" version="1" comment="dbus-1-qt3-64bit is &lt;0.62-110.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034921" version="1" comment="dbus-1-qt3-devel is &lt;0.62-110.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034922" version="1" comment="dbus-1-qt3 is &lt;0.62-110.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034923" version="1" comment="dbus-1-x11 is &lt;1.0.2-67.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034924" version="1" comment="dbus-1 is &lt;1.0.2-59.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034925" version="1" comment="cups-client is &lt;1.2.12-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034926" version="1" comment="cups-devel is &lt;1.2.12-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034927" version="1" comment="cups-libs-32bit is &lt;1.2.12-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034928" version="1" comment="cups-libs-64bit is &lt;1.2.12-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034929" version="1" comment="cups-libs is &lt;1.2.12-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034930" version="1" comment="cups is &lt;1.2.12-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034931" version="1" comment="acroread is &lt;8.1.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034932" version="1" comment="gnumeric-devel is &lt;1.7.11-32.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034933" version="1" comment="gnumeric is &lt;1.7.11-32.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034934" version="1" comment="pcre-32bit is &lt;7.2-14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034935" version="1" comment="pcre-64bit is &lt;7.2-14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034936" version="1" comment="pcre-devel is &lt;7.2-14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034937" version="1" comment="pcre is &lt;7.2-14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034938" version="1" comment="geronimo-jetty-servlet-container is &lt;1.1-138.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034939" version="1" comment="geronimo-tomcat-servlet-container is &lt;1.1-138.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034940" version="1" comment="geronimo is &lt;1.1-138.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034941" version="1" comment="cacti is &lt;0.8.6j-64.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034942" version="1" comment="acroread is &lt;8.1.2-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034943" version="1" comment="gnome-screensaver is &lt;2.20.0-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034944" version="1" comment="unzip is &lt;5.52-77.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034945" version="1" comment="qemu is &lt;0.10.1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034946" version="1" comment="libsnmp15 is &lt;5.4.1-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034947" version="1" comment="net-snmp-32bit is &lt;5.4.1-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034948" version="1" comment="net-snmp-64bit is &lt;5.4.1-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034949" version="1" comment="net-snmp-devel-64bit is &lt;5.4.1-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034950" version="1" comment="net-snmp-devel is &lt;5.4.1-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034951" version="1" comment="net-snmp is &lt;5.4.1-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034952" version="1" comment="perl-SNMP is &lt;5.4.1-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034953" version="1" comment="snmp-mibs is &lt;5.4.1-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034954" version="1" comment="lighttpd-mod_cml is &lt;1.4.18-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034955" version="1" comment="lighttpd-mod_magnet is &lt;1.4.18-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034956" version="1" comment="lighttpd-mod_mysql_vhost is &lt;1.4.18-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034957" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.18-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034958" version="1" comment="lighttpd-mod_trigger_b4_dl is &lt;1.4.18-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034959" version="1" comment="lighttpd-mod_webdav is &lt;1.4.18-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034960" version="1" comment="lighttpd is &lt;1.4.18-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034961" version="1" comment="moodle-af is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034962" version="1" comment="moodle-ar is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034963" version="1" comment="moodle-be is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034964" version="1" comment="moodle-bg is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034965" version="1" comment="moodle-bs is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034966" version="1" comment="moodle-ca is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034967" version="1" comment="moodle-cs is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034968" version="1" comment="moodle-da is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034969" version="1" comment="moodle-de is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034970" version="1" comment="moodle-de_du is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034971" version="1" comment="moodle-el is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034972" version="1" comment="moodle-es is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034973" version="1" comment="moodle-et is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034974" version="1" comment="moodle-eu is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034975" version="1" comment="moodle-fa is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034976" version="1" comment="moodle-fi is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034977" version="1" comment="moodle-fr is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034978" version="1" comment="moodle-ga is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034979" version="1" comment="moodle-gl is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034980" version="1" comment="moodle-he is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034981" version="1" comment="moodle-hi is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034982" version="1" comment="moodle-hr is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034983" version="1" comment="moodle-hu is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034984" version="1" comment="moodle-id is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034985" version="1" comment="moodle-is is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034986" version="1" comment="moodle-it is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034987" version="1" comment="moodle-ja is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034988" version="1" comment="moodle-ka is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034989" version="1" comment="moodle-km is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034990" version="1" comment="moodle-kn is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034991" version="1" comment="moodle-ko is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034992" version="1" comment="moodle-lt is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034993" version="1" comment="moodle-lv is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034994" version="1" comment="moodle-mi_tn is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034995" version="1" comment="moodle-ms is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034996" version="1" comment="moodle-nl is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034997" version="1" comment="moodle-nn is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034998" version="1" comment="moodle-no is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034999" version="1" comment="moodle-pl is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035000" version="1" comment="moodle-pt is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035001" version="1" comment="moodle-ro is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035002" version="1" comment="moodle-ru is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035003" version="1" comment="moodle-sk is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035004" version="1" comment="moodle-sl is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035005" version="1" comment="moodle-so is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035006" version="1" comment="moodle-sq is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035007" version="1" comment="moodle-sr is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035008" version="1" comment="moodle-sv is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035009" version="1" comment="moodle-th is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035010" version="1" comment="moodle-tl is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035011" version="1" comment="moodle-tr is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035012" version="1" comment="moodle-uk is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035013" version="1" comment="moodle-vi is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035014" version="1" comment="moodle-zh_cn is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035015" version="1" comment="moodle is &lt;1.8.2-17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035016" version="1" comment="wireshark-devel is &lt;0.99.6-31.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035017" version="1" comment="wireshark is &lt;0.99.6-31.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035018" version="1" comment="opera is &lt;9.26-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035019" version="1" comment="ImageMagick-devel is &lt;6.3.5.10-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035020" version="1" comment="ImageMagick-extra is &lt;6.3.5.10-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035021" version="1" comment="ImageMagick is &lt;6.3.5.10-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035022" version="1" comment="libMagick++-devel is &lt;6.3.5.10-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035023" version="1" comment="libMagick++10 is &lt;6.3.5.10-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035024" version="1" comment="libMagick10 is &lt;6.3.5.10-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035025" version="1" comment="libWand10 is &lt;6.3.5.10-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035026" version="1" comment="perl-PerlMagick is &lt;6.3.5.10-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035027" version="1" comment="GraphicsMagick-devel is &lt;1.1.8-20.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035028" version="1" comment="GraphicsMagick is &lt;1.1.8-20.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035029" version="1" comment="libGraphicsMagick++-devel is &lt;1.1.8-20.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035030" version="1" comment="libGraphicsMagick++1 is &lt;1.1.8-20.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035031" version="1" comment="libGraphicsMagick1 is &lt;1.1.8-20.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035032" version="1" comment="libGraphicsMagickWand0 is &lt;1.1.8-20.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035033" version="1" comment="perl-GraphicsMagick is &lt;1.1.8-20.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035034" version="1" comment="cifs-mount is &lt;3.0.26a-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035035" version="1" comment="ldapsmb is &lt;1.34b-110.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035036" version="1" comment="libmsrpc-devel is &lt;3.0.26a-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035037" version="1" comment="libmsrpc is &lt;3.0.26a-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035038" version="1" comment="libsmbclient-32bit is &lt;3.0.26a-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035039" version="1" comment="libsmbclient-64bit is &lt;3.0.26a-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035040" version="1" comment="libsmbclient-devel is &lt;3.0.26a-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035041" version="1" comment="libsmbclient is &lt;3.0.26a-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035042" version="1" comment="libsmbsharemodes-devel is &lt;3.0.26a-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035043" version="1" comment="libsmbsharemodes is &lt;3.0.26a-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035044" version="1" comment="samba-32bit is &lt;3.0.26a-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035045" version="1" comment="samba-64bit is &lt;3.0.26a-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035046" version="1" comment="samba-client-32bit is &lt;3.0.26a-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035047" version="1" comment="samba-client-64bit is &lt;3.0.26a-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035048" version="1" comment="samba-client is &lt;3.0.26a-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035049" version="1" comment="samba-devel is &lt;3.0.26a-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035050" version="1" comment="samba-krb-printing is &lt;3.0.26a-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035051" version="1" comment="samba-python is &lt;3.0.26a-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035052" version="1" comment="samba-vscan is &lt;0.3.6b-181.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035053" version="1" comment="samba-winbind-32bit is &lt;3.0.26a-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035054" version="1" comment="samba-winbind-64bit is &lt;3.0.26a-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035055" version="1" comment="samba-winbind is &lt;3.0.26a-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035056" version="1" comment="samba is &lt;3.0.26a-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035057" version="1" comment="evolution-devel is &lt;2.12.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035058" version="1" comment="evolution-pilot is &lt;2.12.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035059" version="1" comment="evolution is &lt;2.12.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035060" version="1" comment="rxvt-unicode is &lt;8.3-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035061" version="1" comment="ruby-devel is &lt;1.8.6.p36-20.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035062" version="1" comment="ruby-doc-html is &lt;1.8.6.p36-20.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035063" version="1" comment="ruby-doc-ri is &lt;1.8.6.p36-20.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035064" version="1" comment="ruby-examples is &lt;1.8.6.p36-20.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035065" version="1" comment="ruby-test-suite is &lt;1.8.6.p36-20.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035066" version="1" comment="ruby-tk is &lt;1.8.6.p36-20.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035067" version="1" comment="ruby is &lt;1.8.6.p36-20.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035068" version="1" comment="phpMyAdmin is &lt;2.11.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035069" version="1" comment="phpMyAdmin is &lt;2.11.9.4-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035070" version="1" comment="sarg is &lt;2.2.3.1-39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035071" version="1" comment="java-1_6_0-sun-alsa is &lt;1.6.0.u5-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035072" version="1" comment="java-1_6_0-sun-demo is &lt;1.6.0.u5-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035073" version="1" comment="java-1_6_0-sun-devel is &lt;1.6.0.u5-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035074" version="1" comment="java-1_6_0-sun-jdbc is &lt;1.6.0.u5-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035075" version="1" comment="java-1_6_0-sun-plugin is &lt;1.6.0.u5-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035076" version="1" comment="java-1_6_0-sun is &lt;1.6.0.u5-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035077" version="1" comment="java-1_5_0-sun-alsa is &lt;1.5.0_update15-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035078" version="1" comment="java-1_5_0-sun-demo is &lt;1.5.0_update15-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035079" version="1" comment="java-1_5_0-sun-devel is &lt;1.5.0_update15-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035080" version="1" comment="java-1_5_0-sun-jdbc is &lt;1.5.0_update15-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035081" version="1" comment="java-1_5_0-sun-plugin is &lt;1.5.0_update15-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035082" version="1" comment="java-1_5_0-sun-src is &lt;1.5.0_update15-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035083" version="1" comment="java-1_5_0-sun is &lt;1.5.0_update15-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035084" version="1" comment="silc-toolkit-devel is &lt;1.1.2-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035085" version="1" comment="silc-toolkit is &lt;1.1.2-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035086" version="1" comment="tomcat55-admin-webapps is &lt;5.5.23-113.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035087" version="1" comment="tomcat55-common-lib is &lt;5.5.23-113.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035088" version="1" comment="tomcat55-jasper-javadoc is &lt;5.5.23-113.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035089" version="1" comment="tomcat55-jasper is &lt;5.5.23-113.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035090" version="1" comment="tomcat55-jsp-2_0-api-javadoc is &lt;5.5.23-113.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035091" version="1" comment="tomcat55-jsp-2_0-api is &lt;5.5.23-113.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035092" version="1" comment="tomcat55-server-lib is &lt;5.5.23-113.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035093" version="1" comment="tomcat55-servlet-2_4-api-javadoc is &lt;5.5.23-113.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035094" version="1" comment="tomcat55-servlet-2_4-api is &lt;5.5.23-113.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035095" version="1" comment="tomcat55-webapps is &lt;5.5.23-113.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035096" version="1" comment="tomcat55 is &lt;5.5.23-113.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035097" version="1" comment="MozillaFirefox-translations is &lt;2.0.0.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035098" version="1" comment="MozillaFirefox is &lt;2.0.0.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035099" version="1" comment="horde is &lt;3.1.4-55.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035100" version="1" comment="viewvc is &lt;1.0.4-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035101" version="1" comment="bzip2-doc is &lt;1.0.4-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035102" version="1" comment="bzip2 is &lt;1.0.4-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035103" version="1" comment="libbz2-1-32bit is &lt;1.0.4-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035104" version="1" comment="libbz2-1-64bit is &lt;1.0.4-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035105" version="1" comment="libbz2-1 is &lt;1.0.4-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035106" version="1" comment="libbz2-devel is &lt;1.0.4-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035107" version="1" comment="xgl is &lt;git_070104-77.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035108" version="1" comment="epiphany-devel is &lt;2.20.0-8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035109" version="1" comment="epiphany-doc is &lt;2.20.0-8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035110" version="1" comment="epiphany-extensions is &lt;2.20.0-8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035111" version="1" comment="epiphany is &lt;2.20.0-8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035112" version="1" comment="mozilla-xulrunner181-32bit is &lt;1.8.1.14-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035113" version="1" comment="mozilla-xulrunner181-64bit is &lt;1.8.1.14-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035114" version="1" comment="mozilla-xulrunner181-devel is &lt;1.8.1.14-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035115" version="1" comment="mozilla-xulrunner181-l10n is &lt;1.8.1.14-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035116" version="1" comment="mozilla-xulrunner181 is &lt;1.8.1.14-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035117" version="1" comment="MozillaThunderbird-translations is &lt;2.0.0.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035118" version="1" comment="MozillaThunderbird is &lt;2.0.0.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035119" version="1" comment="libpng-32bit is &lt;1.2.18-15.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035120" version="1" comment="libpng-64bit is &lt;1.2.18-15.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035121" version="1" comment="libpng-devel-32bit is &lt;1.2.18-15.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035122" version="1" comment="libpng-devel-64bit is &lt;1.2.18-15.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035123" version="1" comment="libpng-devel is &lt;1.2.18-15.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035124" version="1" comment="libpng is &lt;1.2.18-15.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035125" version="1" comment="apache2-mod_php5 is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035126" version="1" comment="php5-bcmath is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035127" version="1" comment="php5-bz2 is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035128" version="1" comment="php5-calendar is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035129" version="1" comment="php5-ctype is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035130" version="1" comment="php5-curl is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035131" version="1" comment="php5-dba is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035132" version="1" comment="php5-dbase is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035133" version="1" comment="php5-devel is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035134" version="1" comment="php5-dom is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035135" version="1" comment="php5-exif is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035136" version="1" comment="php5-fastcgi is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035137" version="1" comment="php5-ftp is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035138" version="1" comment="php5-gd is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035139" version="1" comment="php5-gettext is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035140" version="1" comment="php5-gmp is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035141" version="1" comment="php5-hash is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035142" version="1" comment="php5-iconv is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035143" version="1" comment="php5-imap is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035144" version="1" comment="php5-json is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035145" version="1" comment="php5-ldap is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035146" version="1" comment="php5-mbstring is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035147" version="1" comment="php5-mcrypt is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035148" version="1" comment="php5-mhash is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035149" version="1" comment="php5-mysql is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035150" version="1" comment="php5-ncurses is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035151" version="1" comment="php5-odbc is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035152" version="1" comment="php5-openssl is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035153" version="1" comment="php5-pcntl is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035154" version="1" comment="php5-pdo is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035155" version="1" comment="php5-pear is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035156" version="1" comment="php5-pgsql is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035157" version="1" comment="php5-posix is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035158" version="1" comment="php5-pspell is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035159" version="1" comment="php5-readline is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035160" version="1" comment="php5-shmop is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035161" version="1" comment="php5-snmp is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035162" version="1" comment="php5-soap is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035163" version="1" comment="php5-sockets is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035164" version="1" comment="php5-sqlite is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035165" version="1" comment="php5-suhosin is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035166" version="1" comment="php5-sysvmsg is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035167" version="1" comment="php5-sysvsem is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035168" version="1" comment="php5-sysvshm is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035169" version="1" comment="php5-tidy is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035170" version="1" comment="php5-tokenizer is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035171" version="1" comment="php5-wddx is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035172" version="1" comment="php5-xmlreader is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035173" version="1" comment="php5-xmlrpc is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035174" version="1" comment="php5-xmlwriter is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035175" version="1" comment="php5-xsl is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035176" version="1" comment="php5-zip is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035177" version="1" comment="php5-zlib is &lt;5.2.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035178" version="1" comment="clamav-db is &lt;0.94-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033770" version="1" comment="clamav is &lt;0.94-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035179" version="1" comment="libvorbis-32bit is &lt;1.2.0-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035180" version="1" comment="libvorbis-64bit is &lt;1.2.0-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035181" version="1" comment="libvorbis-devel is &lt;1.2.0-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035182" version="1" comment="libvorbis-doc is &lt;1.2.0-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035183" version="1" comment="libvorbis is &lt;1.2.0-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035184" version="1" comment="bind-chrootenv is &lt;9.4.1.P1-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035185" version="1" comment="bind-devel-64bit is &lt;9.4.1.P1-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035186" version="1" comment="bind-devel is &lt;9.4.1.P1-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035187" version="1" comment="bind-doc is &lt;9.4.1.P1-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035188" version="1" comment="bind-libs-32bit is &lt;9.4.1.P1-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035189" version="1" comment="bind-libs-64bit is &lt;9.4.1.P1-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035190" version="1" comment="bind-libs is &lt;9.4.1.P1-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035191" version="1" comment="bind-utils is &lt;9.4.1.P1-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035192" version="1" comment="bind is &lt;9.4.1.P1-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035193" version="1" comment="dnsmasq is &lt;2.45-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035194" version="1" comment="namazu-cgi is &lt;2.0.18-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035195" version="1" comment="namazu-devel is &lt;2.0.18-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035196" version="1" comment="namazu is &lt;2.0.18-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035197" version="1" comment="xine-devel is &lt;1.1.8-14.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035198" version="1" comment="xine-extra is &lt;1.1.8-14.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035199" version="1" comment="xine-lib-32bit is &lt;1.1.8-14.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035200" version="1" comment="xine-lib-64bit is &lt;1.1.8-14.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035201" version="1" comment="xine-lib is &lt;1.1.8-14.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035202" version="1" comment="xine-ui is &lt;0.99.5-62.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035203" version="1" comment="openssh-askpass is &lt;4.6p1-58.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035204" version="1" comment="openssh is &lt;4.6p1-58.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035205" version="1" comment="moodle-af is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035206" version="1" comment="moodle-ar is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035207" version="1" comment="moodle-be is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035208" version="1" comment="moodle-bg is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035209" version="1" comment="moodle-bs is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035210" version="1" comment="moodle-ca is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035211" version="1" comment="moodle-cs is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035212" version="1" comment="moodle-da is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035213" version="1" comment="moodle-de is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035214" version="1" comment="moodle-de_du is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035215" version="1" comment="moodle-el is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035216" version="1" comment="moodle-es is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035217" version="1" comment="moodle-et is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035218" version="1" comment="moodle-eu is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035219" version="1" comment="moodle-fa is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035220" version="1" comment="moodle-fi is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035221" version="1" comment="moodle-fr is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035222" version="1" comment="moodle-ga is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035223" version="1" comment="moodle-gl is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035224" version="1" comment="moodle-he is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035225" version="1" comment="moodle-hi is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035226" version="1" comment="moodle-hr is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035227" version="1" comment="moodle-hu is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035228" version="1" comment="moodle-id is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035229" version="1" comment="moodle-is is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035230" version="1" comment="moodle-it is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035231" version="1" comment="moodle-ja is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035232" version="1" comment="moodle-ka is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035233" version="1" comment="moodle-km is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035234" version="1" comment="moodle-kn is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035235" version="1" comment="moodle-ko is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035236" version="1" comment="moodle-lt is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035237" version="1" comment="moodle-lv is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035238" version="1" comment="moodle-mi_tn is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035239" version="1" comment="moodle-ms is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035240" version="1" comment="moodle-nl is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035241" version="1" comment="moodle-nn is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035242" version="1" comment="moodle-no is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035243" version="1" comment="moodle-pl is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035244" version="1" comment="moodle-pt is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035245" version="1" comment="moodle-ro is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035246" version="1" comment="moodle-ru is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035247" version="1" comment="moodle-sk is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035248" version="1" comment="moodle-sl is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035249" version="1" comment="moodle-so is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035250" version="1" comment="moodle-sq is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035251" version="1" comment="moodle-sr is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035252" version="1" comment="moodle-sv is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035253" version="1" comment="moodle-th is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035254" version="1" comment="moodle-tl is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035255" version="1" comment="moodle-tr is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035256" version="1" comment="moodle-uk is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035257" version="1" comment="moodle-vi is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035258" version="1" comment="moodle-zh_cn is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035259" version="1" comment="moodle is &lt;1.8.2-17.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035260" version="1" comment="otrs is &lt;2.1.7-39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035261" version="1" comment="lighttpd-mod_cml is &lt;1.4.18-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035262" version="1" comment="lighttpd-mod_magnet is &lt;1.4.18-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035263" version="1" comment="lighttpd-mod_mysql_vhost is &lt;1.4.18-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035264" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.18-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035265" version="1" comment="lighttpd-mod_trigger_b4_dl is &lt;1.4.18-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035266" version="1" comment="lighttpd-mod_webdav is &lt;1.4.18-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035267" version="1" comment="lighttpd is &lt;1.4.18-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035268" version="1" comment="silc-toolkit-devel is &lt;1.1.2-14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035269" version="1" comment="silc-toolkit is &lt;1.1.2-14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035270" version="1" comment="wireshark-devel is &lt;0.99.6-31.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035271" version="1" comment="wireshark is &lt;0.99.6-31.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035272" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-68.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035273" version="1" comment="libtiff-devel-64bit is &lt;3.8.2-68.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035274" version="1" comment="libtiff-devel is &lt;3.8.2-68.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035275" version="1" comment="libtiff3-32bit is &lt;3.8.2-68.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035276" version="1" comment="libtiff3-64bit is &lt;3.8.2-68.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035277" version="1" comment="libtiff3 is &lt;3.8.2-68.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035278" version="1" comment="tiff is &lt;3.8.2-68.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035279" version="1" comment="squid is &lt;2.6.STABLE14-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035280" version="1" comment="audit-devel is &lt;1.5.5-13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035281" version="1" comment="audit-libs-32bit is &lt;1.5.5-13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035282" version="1" comment="audit-libs-64bit is &lt;1.5.5-13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035283" version="1" comment="audit-libs-python is &lt;1.5.5-20.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035284" version="1" comment="audit-libs is &lt;1.5.5-13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035285" version="1" comment="audit is &lt;1.5.5-13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035286" version="1" comment="pdns-recursor is &lt;3.1.4-58.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035287" version="1" comment="kdelibs4-core is &lt;3.93.0.svn712047-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035288" version="1" comment="kdelibs4-doc is &lt;3.93.0.svn712047-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035289" version="1" comment="kdelibs4 is &lt;3.93.0.svn712047-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035290" version="1" comment="libkde4-32bit is &lt;3.93.0.svn712047-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035291" version="1" comment="libkde4-64bit is &lt;3.93.0.svn712047-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035292" version="1" comment="libkde4-devel is &lt;3.93.0.svn712047-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035293" version="1" comment="libkde4 is &lt;3.93.0.svn712047-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035294" version="1" comment="libkdecore4-32bit is &lt;3.93.0.svn712047-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035295" version="1" comment="libkdecore4-64bit is &lt;3.93.0.svn712047-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035296" version="1" comment="libkdecore4-devel is &lt;3.93.0.svn712047-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035297" version="1" comment="libkdecore4 is &lt;3.93.0.svn712047-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035298" version="1" comment="kdelibs3-32bit is &lt;3.5.7-72.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035299" version="1" comment="kdelibs3-64bit is &lt;3.5.7-72.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035300" version="1" comment="kdelibs3-arts-32bit is &lt;3.5.7-72.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035301" version="1" comment="kdelibs3-arts-64bit is &lt;3.5.7-72.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035302" version="1" comment="kdelibs3-arts is &lt;3.5.7-72.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035303" version="1" comment="kdelibs3-default-style-32bit is &lt;3.5.7-72.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035304" version="1" comment="kdelibs3-default-style-64bit is &lt;3.5.7-72.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035305" version="1" comment="kdelibs3-default-style is &lt;3.5.7-72.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035306" version="1" comment="kdelibs3-devel is &lt;3.5.7-72.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035307" version="1" comment="kdelibs3-doc is &lt;3.5.7-72.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035308" version="1" comment="kdelibs3 is &lt;3.5.7-72.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035309" version="1" comment="python-32bit is &lt;2.5.1-39.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035310" version="1" comment="python-64bit is &lt;2.5.1-39.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035311" version="1" comment="python-curses is &lt;2.5.1-39.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035312" version="1" comment="python-demo is &lt;2.5.1-39.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035313" version="1" comment="python-devel is &lt;2.5.1-39.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035314" version="1" comment="python-gdbm is &lt;2.5.1-39.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035315" version="1" comment="python-idle is &lt;2.5.1-39.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035316" version="1" comment="python-tk is &lt;2.5.1-39.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035317" version="1" comment="python-xml is &lt;2.5.1-39.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035318" version="1" comment="python is &lt;2.5.1-39.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035319" version="1" comment="vorbis-tools is &lt;1.1.1-112.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035320" version="1" comment="gstreamer010-plugins-good-doc is &lt;0.10.6-41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035321" version="1" comment="gstreamer010-plugins-good-extra is &lt;0.10.6-41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035322" version="1" comment="gstreamer010-plugins-good is &lt;0.10.6-41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035323" version="1" comment="xine-devel is &lt;1.1.8-14.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035324" version="1" comment="xine-extra is &lt;1.1.8-14.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035325" version="1" comment="xine-lib-32bit is &lt;1.1.8-14.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035326" version="1" comment="xine-lib-64bit is &lt;1.1.8-14.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035327" version="1" comment="xine-lib is &lt;1.1.8-14.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035328" version="1" comment="xine-ui is &lt;0.99.5-62.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035329" version="1" comment="cups-client is &lt;1.2.12-22.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035330" version="1" comment="cups-devel is &lt;1.2.12-22.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035331" version="1" comment="cups-libs-32bit is &lt;1.2.12-22.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035332" version="1" comment="cups-libs-64bit is &lt;1.2.12-22.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035333" version="1" comment="cups-libs is &lt;1.2.12-22.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035334" version="1" comment="cups is &lt;1.2.12-22.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035335" version="1" comment="poppler-devel is &lt;0.5.4-101.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035336" version="1" comment="poppler-doc is &lt;0.5.4-101.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035337" version="1" comment="poppler-glib is &lt;0.5.4-101.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035338" version="1" comment="poppler-qt4 is &lt;0.5.4-101.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035339" version="1" comment="poppler-qt is &lt;0.5.4-101.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035340" version="1" comment="poppler-tools is &lt;0.5.4-101.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035341" version="1" comment="poppler is &lt;0.5.4-101.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035342" version="1" comment="rsync is &lt;2.6.9-55.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035343" version="1" comment="opera is &lt;9.27-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035344" version="1" comment="libxslt-32bit is &lt;1.1.20-41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035345" version="1" comment="libxslt-64bit is &lt;1.1.20-41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035346" version="1" comment="libxslt-devel-32bit is &lt;1.1.20-41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035347" version="1" comment="libxslt-devel-64bit is &lt;1.1.20-41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035348" version="1" comment="libxslt-devel is &lt;1.1.20-41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035349" version="1" comment="libxslt is &lt;1.1.20-41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035350" version="1" comment="rdesktop is &lt;1.5.0-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035351" version="1" comment="freetype2-32bit is &lt;2.3.5-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035352" version="1" comment="freetype2-64bit is &lt;2.3.5-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035353" version="1" comment="freetype2-devel-32bit is &lt;2.3.5-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035354" version="1" comment="freetype2-devel-64bit is &lt;2.3.5-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035355" version="1" comment="freetype2-devel is &lt;2.3.5-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035356" version="1" comment="freetype2 is &lt;2.3.5-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035357" version="1" comment="sarg is &lt;2.2.3.1-39.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035358" version="1" comment="perl-32bit is &lt;5.8.8-76.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035359" version="1" comment="perl-64bit is &lt;5.8.8-76.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035360" version="1" comment="perl-base is &lt;5.8.8-76.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035361" version="1" comment="perl is &lt;5.8.8-76.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035362" version="1" comment="tomcat55-admin-webapps is &lt;5.5.23-113.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035363" version="1" comment="tomcat55-common-lib is &lt;5.5.23-113.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035364" version="1" comment="tomcat55-jasper-javadoc is &lt;5.5.23-113.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035365" version="1" comment="tomcat55-jasper is &lt;5.5.23-113.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035366" version="1" comment="tomcat55-jsp-2_0-api-javadoc is &lt;5.5.23-113.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035367" version="1" comment="tomcat55-jsp-2_0-api is &lt;5.5.23-113.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035368" version="1" comment="tomcat55-server-lib is &lt;5.5.23-113.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035369" version="1" comment="tomcat55-servlet-2_4-api-javadoc is &lt;5.5.23-113.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035370" version="1" comment="tomcat55-servlet-2_4-api is &lt;5.5.23-113.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035371" version="1" comment="tomcat55-webapps is &lt;5.5.23-113.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035372" version="1" comment="tomcat55 is &lt;5.5.23-113.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035373" version="1" comment="gnutls-32bit is &lt;1.6.1-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035374" version="1" comment="gnutls-64bit is &lt;1.6.1-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035375" version="1" comment="gnutls-devel-32bit is &lt;1.6.1-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035376" version="1" comment="gnutls-devel-64bit is &lt;1.6.1-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035377" version="1" comment="gnutls-devel is &lt;1.6.1-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035378" version="1" comment="gnutls is &lt;1.6.1-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035379" version="1" comment="licq-icqnd is &lt;1.3.4-125.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035380" version="1" comment="licq is &lt;1.3.4-125.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035381" version="1" comment="qemu is &lt;0.9.0.cvs-35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035382" version="1" comment="struts-javadoc is &lt;1.2.9-108.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035383" version="1" comment="struts-manual is &lt;1.2.9-108.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035384" version="1" comment="struts-webapps-tomcat5 is &lt;1.2.9-108.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035385" version="1" comment="struts is &lt;1.2.9-108.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035386" version="1" comment="java-1_5_0-sun-alsa is &lt;1.5.0_update17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035387" version="1" comment="java-1_5_0-sun-demo is &lt;1.5.0_update17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035388" version="1" comment="java-1_5_0-sun-devel is &lt;1.5.0_update17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035389" version="1" comment="java-1_5_0-sun-jdbc is &lt;1.5.0_update17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035390" version="1" comment="java-1_5_0-sun-plugin is &lt;1.5.0_update17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035391" version="1" comment="java-1_5_0-sun-src is &lt;1.5.0_update17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035392" version="1" comment="java-1_5_0-sun is &lt;1.5.0_update17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035393" version="1" comment="java-1_6_0-sun-alsa is &lt;1.6.0.u11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035394" version="1" comment="java-1_6_0-sun-demo is &lt;1.6.0.u11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035395" version="1" comment="java-1_6_0-sun-devel is &lt;1.6.0.u11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035396" version="1" comment="java-1_6_0-sun-jdbc is &lt;1.6.0.u11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035397" version="1" comment="java-1_6_0-sun-plugin is &lt;1.6.0.u11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035398" version="1" comment="java-1_6_0-sun is &lt;1.6.0.u11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035399" version="1" comment="openwsman-client is &lt;1.2.0-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035400" version="1" comment="openwsman-devel is &lt;1.2.0-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035401" version="1" comment="openwsman-server is &lt;1.2.0-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035402" version="1" comment="openwsman is &lt;1.2.0-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035403" version="1" comment="xemacs-packages-el is &lt;20070427-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035404" version="1" comment="xemacs-packages-info is &lt;20070427-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035405" version="1" comment="xemacs-packages is &lt;20070427-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035406" version="1" comment="emacs-el is &lt;22.1-40.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035407" version="1" comment="emacs-info is &lt;22.1-40.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035408" version="1" comment="emacs-nox is &lt;22.1-40.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035409" version="1" comment="emacs-x11 is &lt;22.1-40.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035410" version="1" comment="emacs is &lt;22.1-40.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035411" version="1" comment="openwsman-client is &lt;1.2.0-14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035412" version="1" comment="openwsman-devel is &lt;1.2.0-14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035413" version="1" comment="openwsman-server is &lt;1.2.0-14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035414" version="1" comment="openwsman is &lt;1.2.0-14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035415" version="1" comment="libopensc2-32bit is &lt;0.11.3-21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035416" version="1" comment="libopensc2-64bit is &lt;0.11.3-21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035417" version="1" comment="libopensc2 is &lt;0.11.3-21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035418" version="1" comment="opensc-32bit is &lt;0.11.3-21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035419" version="1" comment="opensc-64bit is &lt;0.11.3-21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035420" version="1" comment="opensc-devel is &lt;0.11.3-21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035421" version="1" comment="opensc is &lt;0.11.3-21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035422" version="1" comment="libopensc2-32bit is &lt;0.11.3-21.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035423" version="1" comment="libopensc2-64bit is &lt;0.11.3-21.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035424" version="1" comment="libopensc2 is &lt;0.11.3-21.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035425" version="1" comment="opensc-32bit is &lt;0.11.3-21.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035426" version="1" comment="opensc-64bit is &lt;0.11.3-21.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035427" version="1" comment="opensc-devel is &lt;0.11.3-21.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035428" version="1" comment="opensc is &lt;0.11.3-21.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035429" version="1" comment="OpenOffice_org-af is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035430" version="1" comment="OpenOffice_org-ar is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035431" version="1" comment="OpenOffice_org-base is &lt;2.3.0.1.2-10.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035432" version="1" comment="OpenOffice_org-be-BY is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035433" version="1" comment="OpenOffice_org-bg is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035434" version="1" comment="OpenOffice_org-ca is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035435" version="1" comment="OpenOffice_org-calc is &lt;2.3.0.1.2-10.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035436" version="1" comment="OpenOffice_org-cs is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035437" version="1" comment="OpenOffice_org-cy is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035438" version="1" comment="OpenOffice_org-da is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035439" version="1" comment="OpenOffice_org-de is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035440" version="1" comment="OpenOffice_org-devel is &lt;2.3.0.1.2-10.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035441" version="1" comment="OpenOffice_org-draw is &lt;2.3.0.1.2-10.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035442" version="1" comment="OpenOffice_org-el is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035443" version="1" comment="OpenOffice_org-en-GB is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035444" version="1" comment="OpenOffice_org-es is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035445" version="1" comment="OpenOffice_org-et is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035446" version="1" comment="OpenOffice_org-fi is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035447" version="1" comment="OpenOffice_org-filters is &lt;2.3.0.1.2-10.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035448" version="1" comment="OpenOffice_org-fr is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035449" version="1" comment="OpenOffice_org-gnome is &lt;2.3.0.1.2-10.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035450" version="1" comment="OpenOffice_org-gu-IN is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035451" version="1" comment="OpenOffice_org-hi-IN is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035452" version="1" comment="OpenOffice_org-hr is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035453" version="1" comment="OpenOffice_org-hu is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035454" version="1" comment="OpenOffice_org-impress is &lt;2.3.0.1.2-10.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035455" version="1" comment="OpenOffice_org-it is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035456" version="1" comment="OpenOffice_org-ja is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035457" version="1" comment="OpenOffice_org-kde is &lt;2.3.0.1.2-10.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035458" version="1" comment="OpenOffice_org-km is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035459" version="1" comment="OpenOffice_org-ko is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035460" version="1" comment="OpenOffice_org-lt is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035461" version="1" comment="OpenOffice_org-mailmerge is &lt;2.3.0.1.2-10.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035462" version="1" comment="OpenOffice_org-math is &lt;2.3.0.1.2-10.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035463" version="1" comment="OpenOffice_org-mk is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035464" version="1" comment="OpenOffice_org-mono is &lt;2.3.0.1.2-10.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035465" version="1" comment="OpenOffice_org-nb is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035466" version="1" comment="OpenOffice_org-nl is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035467" version="1" comment="OpenOffice_org-nn is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035468" version="1" comment="OpenOffice_org-officebean is &lt;2.3.0.1.2-10.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035469" version="1" comment="OpenOffice_org-pa-IN is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035470" version="1" comment="OpenOffice_org-pl is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035471" version="1" comment="OpenOffice_org-pt-BR is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035472" version="1" comment="OpenOffice_org-pt is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035473" version="1" comment="OpenOffice_org-pyuno is &lt;2.3.0.1.2-10.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035474" version="1" comment="OpenOffice_org-ru is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035475" version="1" comment="OpenOffice_org-rw is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035476" version="1" comment="OpenOffice_org-sdk-doc is &lt;2.3.0.1.2-10.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035477" version="1" comment="OpenOffice_org-sdk is &lt;2.3.0.1.2-10.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035478" version="1" comment="OpenOffice_org-sk is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035479" version="1" comment="OpenOffice_org-sl is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035480" version="1" comment="OpenOffice_org-sr-CS is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035481" version="1" comment="OpenOffice_org-st is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035482" version="1" comment="OpenOffice_org-sv is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035483" version="1" comment="OpenOffice_org-testtool is &lt;2.3.0.1.2-10.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035484" version="1" comment="OpenOffice_org-tr is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035485" version="1" comment="OpenOffice_org-ts is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035486" version="1" comment="OpenOffice_org-vi is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035487" version="1" comment="OpenOffice_org-writer is &lt;2.3.0.1.2-10.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035488" version="1" comment="OpenOffice_org-xh is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035489" version="1" comment="OpenOffice_org-zh-CN is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035490" version="1" comment="OpenOffice_org-zh-TW is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035491" version="1" comment="OpenOffice_org-zu is &lt;2.3.0.1.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035492" version="1" comment="OpenOffice_org is &lt;2.3.0.1.2-10.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035493" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-68.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035494" version="1" comment="libtiff-devel-64bit is &lt;3.8.2-68.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035495" version="1" comment="libtiff-devel is &lt;3.8.2-68.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035496" version="1" comment="libtiff3-32bit is &lt;3.8.2-68.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035497" version="1" comment="libtiff3-64bit is &lt;3.8.2-68.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035498" version="1" comment="libtiff3 is &lt;3.8.2-68.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035499" version="1" comment="tiff is &lt;3.8.2-68.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035500" version="1" comment="mtr-gtk is &lt;0.72-94.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035501" version="1" comment="mtr is &lt;0.72-94.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035502" version="1" comment="pan is &lt;0.132-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035503" version="1" comment="apache2-devel is &lt;2.2.4-70.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035504" version="1" comment="apache2-doc is &lt;2.2.4-70.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035505" version="1" comment="apache2-example-pages is &lt;2.2.4-70.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035506" version="1" comment="apache2-prefork is &lt;2.2.4-70.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035507" version="1" comment="apache2-utils is &lt;2.2.4-70.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035508" version="1" comment="apache2-worker is &lt;2.2.4-70.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035509" version="1" comment="apache2 is &lt;2.2.4-70.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035510" version="1" comment="pcre-32bit is &lt;7.2-14.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035511" version="1" comment="pcre-64bit is &lt;7.2-14.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035512" version="1" comment="pcre-devel is &lt;7.2-14.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035513" version="1" comment="pcre is &lt;7.2-14.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035514" version="1" comment="bluez-cups is &lt;3.18-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035515" version="1" comment="bluez-libs is &lt;3.18-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035516" version="1" comment="bluez-test is &lt;3.18-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035517" version="1" comment="bluez-utils is &lt;3.18-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035518" version="1" comment="squirrelmail is &lt;1.4.10a-45.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035519" version="1" comment="courier-authlib-devel is &lt;0.59.3-44.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035520" version="1" comment="courier-authlib-ldap is &lt;0.59.3-44.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035521" version="1" comment="courier-authlib-mysql is &lt;0.59.3-44.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035522" version="1" comment="courier-authlib-pgsql is &lt;0.59.3-44.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035523" version="1" comment="courier-authlib-pipe is &lt;0.59.3-44.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035524" version="1" comment="courier-authlib-userdb is &lt;0.59.3-44.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035525" version="1" comment="courier-authlib is &lt;0.59.3-44.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035526" version="1" comment="xterm is &lt;229-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035527" version="1" comment="imlib2-devel is &lt;1.3.0-66.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035528" version="1" comment="imlib2-filters is &lt;1.3.0-66.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035529" version="1" comment="imlib2-loaders is &lt;1.3.0-66.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035530" version="1" comment="imlib2 is &lt;1.3.0-66.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035531" version="1" comment="acroread is &lt;8.1.3-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035532" version="1" comment="acroread is &lt;8.1.2_SU1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035533" version="1" comment="courier-authlib-devel is &lt;0.59.3-44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035534" version="1" comment="courier-authlib-ldap is &lt;0.59.3-44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035535" version="1" comment="courier-authlib-mysql is &lt;0.59.3-44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035536" version="1" comment="courier-authlib-pgsql is &lt;0.59.3-44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035537" version="1" comment="courier-authlib-pipe is &lt;0.59.3-44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035538" version="1" comment="courier-authlib-userdb is &lt;0.59.3-44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035539" version="1" comment="courier-authlib is &lt;0.59.3-44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035540" version="1" comment="libexiv2-devel is &lt;0.15-8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035541" version="1" comment="libexiv2 is &lt;0.15-8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035542" version="1" comment="gvim is &lt;7.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035543" version="1" comment="vim-base is &lt;7.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035544" version="1" comment="vim-data is &lt;7.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035545" version="1" comment="vim-enhanced is &lt;7.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035546" version="1" comment="clamav-db is &lt;0.93.3-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033814" version="1" comment="clamav is &lt;0.93.3-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035547" version="1" comment="clamav-db is &lt;0.93.1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033813" version="1" comment="clamav is &lt;0.93.1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035548" version="1" comment="opera is &lt;9.50-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035549" version="1" comment="MozillaThunderbird-translations is &lt;2.0.0.16-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035550" version="1" comment="MozillaThunderbird is &lt;2.0.0.16-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035551" version="1" comment="MozillaFirefox-translations is &lt;2.0.0.16-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035552" version="1" comment="MozillaFirefox is &lt;2.0.0.16-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035553" version="1" comment="seamonkey-dom-inspector is &lt;1.1.11-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035554" version="1" comment="seamonkey-irc is &lt;1.1.11-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035555" version="1" comment="seamonkey-mail is &lt;1.1.11-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035556" version="1" comment="seamonkey-spellchecker is &lt;1.1.11-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035557" version="1" comment="seamonkey-venkman is &lt;1.1.11-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035558" version="1" comment="seamonkey is &lt;1.1.11-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035559" version="1" comment="MozillaFirefox-translations is &lt;2.0.0.15-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035560" version="1" comment="MozillaFirefox is &lt;2.0.0.15-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035561" version="1" comment="apache2-mod_php5 is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035562" version="1" comment="php5-bcmath is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035563" version="1" comment="php5-bz2 is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035564" version="1" comment="php5-calendar is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035565" version="1" comment="php5-ctype is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035566" version="1" comment="php5-curl is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035567" version="1" comment="php5-dba is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035568" version="1" comment="php5-dbase is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035569" version="1" comment="php5-devel is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035570" version="1" comment="php5-dom is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035571" version="1" comment="php5-exif is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035572" version="1" comment="php5-fastcgi is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035573" version="1" comment="php5-ftp is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035574" version="1" comment="php5-gd is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035575" version="1" comment="php5-gettext is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035576" version="1" comment="php5-gmp is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035577" version="1" comment="php5-hash is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035578" version="1" comment="php5-iconv is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035579" version="1" comment="php5-imap is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035580" version="1" comment="php5-json is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035581" version="1" comment="php5-ldap is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035582" version="1" comment="php5-mbstring is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035583" version="1" comment="php5-mcrypt is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035584" version="1" comment="php5-mhash is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035585" version="1" comment="php5-mysql is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035586" version="1" comment="php5-ncurses is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035587" version="1" comment="php5-odbc is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035588" version="1" comment="php5-openssl is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035589" version="1" comment="php5-pcntl is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035590" version="1" comment="php5-pdo is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035591" version="1" comment="php5-pear is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035592" version="1" comment="php5-pgsql is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035593" version="1" comment="php5-posix is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035594" version="1" comment="php5-pspell is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035595" version="1" comment="php5-readline is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035596" version="1" comment="php5-shmop is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035597" version="1" comment="php5-snmp is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035598" version="1" comment="php5-soap is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035599" version="1" comment="php5-sockets is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035600" version="1" comment="php5-sqlite is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035601" version="1" comment="php5-suhosin is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035602" version="1" comment="php5-sysvmsg is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035603" version="1" comment="php5-sysvsem is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035604" version="1" comment="php5-sysvshm is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035605" version="1" comment="php5-tidy is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035606" version="1" comment="php5-tokenizer is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035607" version="1" comment="php5-wddx is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035608" version="1" comment="php5-xmlreader is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035609" version="1" comment="php5-xmlrpc is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035610" version="1" comment="php5-xmlwriter is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035611" version="1" comment="php5-xsl is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035612" version="1" comment="php5-zip is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035613" version="1" comment="php5-zlib is &lt;5.2.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035614" version="1" comment="finch-devel is &lt;2.3.1-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035615" version="1" comment="finch is &lt;2.3.1-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035616" version="1" comment="libpurple-devel is &lt;2.3.1-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035617" version="1" comment="libpurple-meanwhile is &lt;2.3.1-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035618" version="1" comment="libpurple-mono is &lt;2.3.1-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035619" version="1" comment="libpurple is &lt;2.3.1-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035620" version="1" comment="pidgin-devel is &lt;2.3.1-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035621" version="1" comment="pidgin is &lt;2.3.1-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035622" version="1" comment="libxslt-32bit is &lt;1.1.20-41.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035623" version="1" comment="libxslt-64bit is &lt;1.1.20-41.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035624" version="1" comment="libxslt-devel-32bit is &lt;1.1.20-41.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035625" version="1" comment="libxslt-devel-64bit is &lt;1.1.20-41.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035626" version="1" comment="libxslt-devel is &lt;1.1.20-41.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035627" version="1" comment="libxslt is &lt;1.1.20-41.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035628" version="1" comment="postfix-devel is &lt;2.4.5-20.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035629" version="1" comment="postfix-mysql is &lt;2.4.5-20.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035630" version="1" comment="postfix-postgresql is &lt;2.4.5-20.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035631" version="1" comment="postfix is &lt;2.4.5-20.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035632" version="1" comment="hplip-hpijs is &lt;2.7.7-37.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035633" version="1" comment="hplip is &lt;2.7.7-37.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035634" version="1" comment="openldap2-back-meta is &lt;2.3.37-7.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035635" version="1" comment="openldap2-back-perl is &lt;2.3.37-7.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035636" version="1" comment="openldap2-client-32bit is &lt;2.3.37-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035637" version="1" comment="openldap2-client-64bit is &lt;2.3.37-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035638" version="1" comment="openldap2-client is &lt;2.3.37-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035639" version="1" comment="openldap2-devel-32bit is &lt;2.3.37-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035640" version="1" comment="openldap2-devel-64bit is &lt;2.3.37-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035641" version="1" comment="openldap2-devel is &lt;2.3.37-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035642" version="1" comment="openldap2 is &lt;2.3.37-7.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035643" version="1" comment="sudo is &lt;1.6.9p2-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035644" version="1" comment="opera is &lt;9.51-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035645" version="1" comment="java-1_6_0-sun-alsa is &lt;1.6.0.u7-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035646" version="1" comment="java-1_6_0-sun-demo is &lt;1.6.0.u7-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035647" version="1" comment="java-1_6_0-sun-devel is &lt;1.6.0.u7-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035648" version="1" comment="java-1_6_0-sun-jdbc is &lt;1.6.0.u7-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035649" version="1" comment="java-1_6_0-sun-plugin is &lt;1.6.0.u7-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035650" version="1" comment="java-1_6_0-sun is &lt;1.6.0.u7-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035651" version="1" comment="java-1_5_0-sun-alsa is &lt;1.5.0_update16-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035652" version="1" comment="java-1_5_0-sun-demo is &lt;1.5.0_update16-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035653" version="1" comment="java-1_5_0-sun-devel is &lt;1.5.0_update16-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035654" version="1" comment="java-1_5_0-sun-jdbc is &lt;1.5.0_update16-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035655" version="1" comment="java-1_5_0-sun-plugin is &lt;1.5.0_update16-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035656" version="1" comment="java-1_5_0-sun-src is &lt;1.5.0_update16-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035657" version="1" comment="java-1_5_0-sun is &lt;1.5.0_update16-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035658" version="1" comment="GraphicsMagick-devel is &lt;1.1.8-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035659" version="1" comment="GraphicsMagick is &lt;1.1.8-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035660" version="1" comment="libGraphicsMagick++-devel is &lt;1.1.8-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035661" version="1" comment="libGraphicsMagick++1 is &lt;1.1.8-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035662" version="1" comment="libGraphicsMagick1 is &lt;1.1.8-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035663" version="1" comment="libGraphicsMagickWand0 is &lt;1.1.8-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035664" version="1" comment="perl-GraphicsMagick is &lt;1.1.8-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035665" version="1" comment="wireshark-devel is &lt;0.99.6-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035666" version="1" comment="wireshark is &lt;0.99.6-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035667" version="1" comment="libzypp-devel is &lt;3.27.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035668" version="1" comment="libzypp is &lt;3.27.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035669" version="1" comment="zypper is &lt;0.8.26-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035670" version="1" comment="xine-devel is &lt;1.1.8-14.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035671" version="1" comment="xine-extra is &lt;1.1.8-14.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035672" version="1" comment="xine-lib-32bit is &lt;1.1.8-14.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035673" version="1" comment="xine-lib-64bit is &lt;1.1.8-14.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035674" version="1" comment="xine-lib is &lt;1.1.8-14.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035675" version="1" comment="libxml2-32bit is &lt;2.6.30-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035676" version="1" comment="libxml2-64bit is &lt;2.6.30-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035677" version="1" comment="libxml2-devel-32bit is &lt;2.6.30-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035678" version="1" comment="libxml2-devel-64bit is &lt;2.6.30-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035679" version="1" comment="libxml2-devel is &lt;2.6.30-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035680" version="1" comment="libxml2 is &lt;2.6.30-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035681" version="1" comment="moodle-af is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035682" version="1" comment="moodle-ar is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035683" version="1" comment="moodle-be is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035684" version="1" comment="moodle-bg is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035685" version="1" comment="moodle-bs is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035686" version="1" comment="moodle-ca is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035687" version="1" comment="moodle-cs is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035688" version="1" comment="moodle-da is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035689" version="1" comment="moodle-de is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035690" version="1" comment="moodle-de_du is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035691" version="1" comment="moodle-el is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035692" version="1" comment="moodle-es is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035693" version="1" comment="moodle-et is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035694" version="1" comment="moodle-eu is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035695" version="1" comment="moodle-fa is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035696" version="1" comment="moodle-fi is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035697" version="1" comment="moodle-fr is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035698" version="1" comment="moodle-ga is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035699" version="1" comment="moodle-gl is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035700" version="1" comment="moodle-he is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035701" version="1" comment="moodle-hi is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035702" version="1" comment="moodle-hr is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035703" version="1" comment="moodle-hu is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035704" version="1" comment="moodle-id is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035705" version="1" comment="moodle-is is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035706" version="1" comment="moodle-it is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035707" version="1" comment="moodle-ja is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035708" version="1" comment="moodle-ka is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035709" version="1" comment="moodle-km is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035710" version="1" comment="moodle-kn is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035711" version="1" comment="moodle-ko is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035712" version="1" comment="moodle-lt is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035713" version="1" comment="moodle-lv is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035714" version="1" comment="moodle-mi_tn is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035715" version="1" comment="moodle-ms is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035716" version="1" comment="moodle-nl is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035717" version="1" comment="moodle-nn is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035718" version="1" comment="moodle-no is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035719" version="1" comment="moodle-pl is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035720" version="1" comment="moodle-pt is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035721" version="1" comment="moodle-ro is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035722" version="1" comment="moodle-ru is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035723" version="1" comment="moodle-sk is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035724" version="1" comment="moodle-sl is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035725" version="1" comment="moodle-so is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035726" version="1" comment="moodle-sq is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035727" version="1" comment="moodle-sr is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035728" version="1" comment="moodle-sv is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035729" version="1" comment="moodle-th is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035730" version="1" comment="moodle-tl is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035731" version="1" comment="moodle-tr is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035732" version="1" comment="moodle-uk is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035733" version="1" comment="moodle-vi is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035734" version="1" comment="moodle-zh_cn is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035735" version="1" comment="moodle is &lt;1.8.2-17.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035736" version="1" comment="pdns-backend-ldap is &lt;2.9.21-57.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035737" version="1" comment="pdns-backend-mysql is &lt;2.9.21-57.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035738" version="1" comment="pdns-backend-postgresql is &lt;2.9.21-57.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035739" version="1" comment="pdns-backend-sqlite2 is &lt;2.9.21-57.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035740" version="1" comment="pdns-backend-sqlite3 is &lt;2.9.21-57.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035741" version="1" comment="pdns is &lt;2.9.21-57.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035742" version="1" comment="bytefx-data-mysql is &lt;1.2.5-16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035743" version="1" comment="ibm-data-db2 is &lt;1.2.5-16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035744" version="1" comment="mono-complete is &lt;1.2.5-16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035745" version="1" comment="mono-core-32bit is &lt;1.2.5-16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035746" version="1" comment="mono-core is &lt;1.2.5-16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035747" version="1" comment="mono-data-firebird is &lt;1.2.5-16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035748" version="1" comment="mono-data-oracle is &lt;1.2.5-16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035749" version="1" comment="mono-data-postgresql is &lt;1.2.5-16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035750" version="1" comment="mono-data-sqlite is &lt;1.2.5-16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035751" version="1" comment="mono-data-sybase is &lt;1.2.5-16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035752" version="1" comment="mono-data is &lt;1.2.5-16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035753" version="1" comment="mono-devel is &lt;1.2.5-16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035754" version="1" comment="mono-extras is &lt;1.2.5-16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035755" version="1" comment="mono-jscript is &lt;1.2.5-16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035756" version="1" comment="mono-locale-extras is &lt;1.2.5-16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035757" version="1" comment="mono-nunit is &lt;1.2.5-16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035758" version="1" comment="mono-web is &lt;1.2.5-16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035759" version="1" comment="mono-winforms is &lt;1.2.5-16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053195" version="1" comment="ruby-devel is &lt;1.8.6.p369-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053196" version="1" comment="ruby-doc-html is &lt;1.8.6.p369-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053197" version="1" comment="ruby-doc-ri is &lt;1.8.6.p369-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053198" version="1" comment="ruby-examples is &lt;1.8.6.p369-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053199" version="1" comment="ruby-test-suite is &lt;1.8.6.p369-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053200" version="1" comment="ruby-tk is &lt;1.8.6.p369-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053201" version="1" comment="ruby is &lt;1.8.6.p369-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035760" version="1" comment="uvcvideo-kmp-bigsmp is &lt;r117_2.6.22.18_0.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035761" version="1" comment="uvcvideo-kmp-debug is &lt;r117_2.6.22.18_0.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035762" version="1" comment="uvcvideo-kmp-default is &lt;r117_2.6.22.18_0.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035763" version="1" comment="uvcvideo-kmp-ppc64 is &lt;r117_2.6.22.18_0.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035764" version="1" comment="uvcvideo-kmp-xen is &lt;r117_2.6.22.18_0.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035765" version="1" comment="uvcvideo-kmp-xenpae is &lt;r117_2.6.22.18_0.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035766" version="1" comment="jasper is &lt;1.900.1-44.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035767" version="1" comment="libjasper-32bit is &lt;1.900.1-44.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035768" version="1" comment="libjasper-64bit is &lt;1.900.1-44.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035769" version="1" comment="libjasper-devel is &lt;1.900.1-44.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035770" version="1" comment="libjasper is &lt;1.900.1-44.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035771" version="1" comment="git-arch is &lt;1.5.2.4-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035772" version="1" comment="git-core is &lt;1.5.2.4-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035773" version="1" comment="git-cvs is &lt;1.5.2.4-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035774" version="1" comment="git-email is &lt;1.5.2.4-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035775" version="1" comment="git-svn is &lt;1.5.2.4-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035776" version="1" comment="git is &lt;1.5.2.4-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035777" version="1" comment="gitk is &lt;1.5.2.4-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035778" version="1" comment="cups-client is &lt;1.2.12-22.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035779" version="1" comment="cups-devel is &lt;1.2.12-22.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035780" version="1" comment="cups-libs-32bit is &lt;1.2.12-22.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035781" version="1" comment="cups-libs-64bit is &lt;1.2.12-22.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035782" version="1" comment="cups-libs is &lt;1.2.12-22.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035783" version="1" comment="cups is &lt;1.2.12-22.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035784" version="1" comment="cups-client is &lt;1.2.12-22.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035785" version="1" comment="cups-devel is &lt;1.2.12-22.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035786" version="1" comment="cups-libs-32bit is &lt;1.2.12-22.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035787" version="1" comment="cups-libs-64bit is &lt;1.2.12-22.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035788" version="1" comment="cups-libs is &lt;1.2.12-22.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035789" version="1" comment="cups is &lt;1.2.12-22.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035790" version="1" comment="novell-ipsec-tools-devel is &lt;0.6.3-114.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035791" version="1" comment="novell-ipsec-tools is &lt;0.6.3-114.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035792" version="1" comment="ipsec-tools is &lt;0.6.5-104.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035793" version="1" comment="apache2-mod_php5 is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035794" version="1" comment="php5-bcmath is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035795" version="1" comment="php5-bz2 is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035796" version="1" comment="php5-calendar is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035797" version="1" comment="php5-ctype is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035798" version="1" comment="php5-curl is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035799" version="1" comment="php5-dba is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035800" version="1" comment="php5-dbase is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035801" version="1" comment="php5-devel is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035802" version="1" comment="php5-dom is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035803" version="1" comment="php5-exif is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035804" version="1" comment="php5-fastcgi is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035805" version="1" comment="php5-ftp is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035806" version="1" comment="php5-gd is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035807" version="1" comment="php5-gettext is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035808" version="1" comment="php5-gmp is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035809" version="1" comment="php5-hash is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035810" version="1" comment="php5-iconv is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035811" version="1" comment="php5-imap is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035812" version="1" comment="php5-json is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035813" version="1" comment="php5-ldap is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035814" version="1" comment="php5-mbstring is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035815" version="1" comment="php5-mcrypt is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035816" version="1" comment="php5-mhash is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035817" version="1" comment="php5-mysql is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035818" version="1" comment="php5-ncurses is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035819" version="1" comment="php5-odbc is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035820" version="1" comment="php5-openssl is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035821" version="1" comment="php5-pcntl is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035822" version="1" comment="php5-pdo is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035823" version="1" comment="php5-pear is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035824" version="1" comment="php5-pgsql is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035825" version="1" comment="php5-posix is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035826" version="1" comment="php5-pspell is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035827" version="1" comment="php5-readline is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035828" version="1" comment="php5-shmop is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035829" version="1" comment="php5-snmp is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035830" version="1" comment="php5-soap is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035831" version="1" comment="php5-sockets is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035832" version="1" comment="php5-sqlite is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035833" version="1" comment="php5-suhosin is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035834" version="1" comment="php5-sysvmsg is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035835" version="1" comment="php5-sysvsem is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035836" version="1" comment="php5-sysvshm is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035837" version="1" comment="php5-tidy is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035838" version="1" comment="php5-tokenizer is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035839" version="1" comment="php5-wddx is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035840" version="1" comment="php5-xmlreader is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035841" version="1" comment="php5-xmlrpc is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035842" version="1" comment="php5-xmlwriter is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035843" version="1" comment="php5-xsl is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035844" version="1" comment="php5-zip is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035845" version="1" comment="php5-zlib is &lt;5.2.6-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035846" version="1" comment="squirrelmail is &lt;1.4.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035847" version="1" comment="squirrelmail is &lt;1.4.10a-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035848" version="1" comment="pam_krb5-32bit is &lt;2.2.17-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035849" version="1" comment="pam_krb5-64bit is &lt;2.2.17-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035850" version="1" comment="pam_krb5 is &lt;2.2.17-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035851" version="1" comment="dbus-1-32bit is &lt;1.0.2-59.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035852" version="1" comment="dbus-1-64bit is &lt;1.0.2-59.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035853" version="1" comment="dbus-1-devel-doc is &lt;1.0.2-59.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035854" version="1" comment="dbus-1-devel is &lt;1.0.2-59.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035855" version="1" comment="dbus-1-x11 is &lt;1.0.2-67.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035856" version="1" comment="dbus-1 is &lt;1.0.2-59.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035857" version="1" comment="enscript is &lt;1.6.4-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035858" version="1" comment="postfix-devel is &lt;2.4.5-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035859" version="1" comment="postfix-mysql is &lt;2.4.5-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035860" version="1" comment="postfix-postgresql is &lt;2.4.5-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035861" version="1" comment="postfix is &lt;2.4.5-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035862" version="1" comment="wireshark-devel is &lt;0.99.6-31.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035863" version="1" comment="wireshark is &lt;0.99.6-31.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035864" version="1" comment="emacs-el is &lt;22.1-40.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035865" version="1" comment="emacs-info is &lt;22.1-40.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035866" version="1" comment="emacs-nox is &lt;22.1-40.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035867" version="1" comment="emacs-x11 is &lt;22.1-40.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035868" version="1" comment="emacs is &lt;22.1-40.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035869" version="1" comment="libmysqlclient-devel is &lt;5.0.45-22.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035870" version="1" comment="libmysqlclient15-32bit is &lt;5.0.45-22.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035871" version="1" comment="libmysqlclient15-64bit is &lt;5.0.45-22.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035872" version="1" comment="libmysqlclient15 is &lt;5.0.45-22.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035873" version="1" comment="libmysqlclient_r15-32bit is &lt;5.0.45-22.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035874" version="1" comment="libmysqlclient_r15-64bit is &lt;5.0.45-22.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035875" version="1" comment="libmysqlclient_r15 is &lt;5.0.45-22.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035876" version="1" comment="mysql-Max is &lt;5.0.45-22.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035877" version="1" comment="mysql-bench is &lt;5.0.45-22.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035878" version="1" comment="mysql-client is &lt;5.0.45-22.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035879" version="1" comment="mysql-debug is &lt;5.0.45-22.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035880" version="1" comment="mysql-tools is &lt;5.0.45-22.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035881" version="1" comment="mysql is &lt;5.0.45-22.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035882" version="1" comment="pam_mount-32bit is &lt;0.18-84.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035883" version="1" comment="pam_mount-64bit is &lt;0.18-84.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035884" version="1" comment="pam_mount is &lt;0.18-84.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035885" version="1" comment="rubygem-activerecord is &lt;1.15.3-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035886" version="1" comment="imp is &lt;4.1.4-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035887" version="1" comment="libxml2-32bit is &lt;2.6.30-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035888" version="1" comment="libxml2-64bit is &lt;2.6.30-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035889" version="1" comment="libxml2-devel-32bit is &lt;2.6.30-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035890" version="1" comment="libxml2-devel-64bit is &lt;2.6.30-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035891" version="1" comment="libxml2-devel is &lt;2.6.30-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035892" version="1" comment="libxml2 is &lt;2.6.30-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035893" version="1" comment="libxml2-32bit is &lt;2.6.30-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035894" version="1" comment="libxml2-64bit is &lt;2.6.30-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035895" version="1" comment="libxml2-devel-32bit is &lt;2.6.30-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035896" version="1" comment="libxml2-devel-64bit is &lt;2.6.30-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035897" version="1" comment="libxml2-devel is &lt;2.6.30-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035898" version="1" comment="libxml2 is &lt;2.6.30-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035899" version="1" comment="lighttpd-mod_cml is &lt;1.4.18-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035900" version="1" comment="lighttpd-mod_magnet is &lt;1.4.18-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035901" version="1" comment="lighttpd-mod_mysql_vhost is &lt;1.4.18-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035902" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.18-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035903" version="1" comment="lighttpd-mod_trigger_b4_dl is &lt;1.4.18-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035904" version="1" comment="lighttpd-mod_webdav is &lt;1.4.18-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035905" version="1" comment="lighttpd is &lt;1.4.18-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035906" version="1" comment="libsnmp15 is &lt;5.4.1-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035907" version="1" comment="net-snmp-32bit is &lt;5.4.1-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035908" version="1" comment="net-snmp-64bit is &lt;5.4.1-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035909" version="1" comment="net-snmp-devel-64bit is &lt;5.4.1-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035910" version="1" comment="net-snmp-devel is &lt;5.4.1-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035911" version="1" comment="net-snmp is &lt;5.4.1-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035912" version="1" comment="perl-SNMP is &lt;5.4.1-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035913" version="1" comment="snmp-mibs is &lt;5.4.1-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035914" version="1" comment="bluez-cups is &lt;3.18-13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035915" version="1" comment="bluez-test is &lt;3.18-13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035916" version="1" comment="bluez-utils is &lt;3.18-13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035917" version="1" comment="dbus-1-32bit is &lt;1.0.2-59.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035918" version="1" comment="dbus-1-64bit is &lt;1.0.2-59.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035919" version="1" comment="dbus-1-devel-doc is &lt;1.0.2-59.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035920" version="1" comment="dbus-1-devel is &lt;1.0.2-59.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035921" version="1" comment="dbus-1-glib-32bit is &lt;0.74-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035922" version="1" comment="dbus-1-glib-64bit is &lt;0.74-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035923" version="1" comment="dbus-1-glib-devel is &lt;0.74-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035924" version="1" comment="dbus-1-glib-doc is &lt;0.74-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035925" version="1" comment="dbus-1-glib is &lt;0.74-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035926" version="1" comment="dbus-1-mono is &lt;0.63-90.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035927" version="1" comment="dbus-1-python-devel is &lt;0.82.0-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035928" version="1" comment="dbus-1-python is &lt;0.82.0-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035929" version="1" comment="dbus-1-qt3-32bit is &lt;0.62-110.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035930" version="1" comment="dbus-1-qt3-64bit is &lt;0.62-110.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035931" version="1" comment="dbus-1-qt3-devel is &lt;0.62-110.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035932" version="1" comment="dbus-1-qt3 is &lt;0.62-110.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035933" version="1" comment="dbus-1-x11 is &lt;1.0.2-67.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035934" version="1" comment="dbus-1 is &lt;1.0.2-59.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035935" version="1" comment="hal-32bit is &lt;0.5.9_git20070831-13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035936" version="1" comment="hal-64bit is &lt;0.5.9_git20070831-13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035937" version="1" comment="hal-devel is &lt;0.5.9_git20070831-13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035938" version="1" comment="hal is &lt;0.5.9_git20070831-13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035939" version="1" comment="bluez-cups is &lt;3.18-13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035940" version="1" comment="bluez-test is &lt;3.18-13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035941" version="1" comment="bluez-utils is &lt;3.18-13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035942" version="1" comment="hal-32bit is &lt;0.5.9_git20070831-13.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035943" version="1" comment="hal-64bit is &lt;0.5.9_git20070831-13.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035944" version="1" comment="hal-devel is &lt;0.5.9_git20070831-13.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035945" version="1" comment="hal is &lt;0.5.9_git20070831-13.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035946" version="1" comment="powersave-devel is &lt;0.15.17-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035947" version="1" comment="powersave-libs-32bit is &lt;0.15.17-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035948" version="1" comment="powersave-libs-64bit is &lt;0.15.17-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035949" version="1" comment="powersave-libs is &lt;0.15.17-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035950" version="1" comment="powersave is &lt;0.15.17-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035951" version="1" comment="glib2-32bit is &lt;2.14.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035952" version="1" comment="glib2-64bit is &lt;2.14.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035953" version="1" comment="glib2-devel-64bit is &lt;2.14.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035954" version="1" comment="glib2-devel is &lt;2.14.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035955" version="1" comment="glib2-doc is &lt;2.14.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035956" version="1" comment="glib2-lang is &lt;2.14.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035957" version="1" comment="glib2 is &lt;2.14.1-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035958" version="1" comment="ndiswrapper-kmp-bigsmp is &lt;1.47_2.6.22.19_0.1-32.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035959" version="1" comment="ndiswrapper-kmp-default is &lt;1.47_2.6.22.19_0.1-32.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035960" version="1" comment="ndiswrapper-kmp-xen is &lt;1.47_2.6.22.19_0.1-32.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035961" version="1" comment="ndiswrapper-kmp-xenpae is &lt;1.47_2.6.22.19_0.1-32.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035962" version="1" comment="ndiswrapper is &lt;1.47-32.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054299" version="1" comment="libmysqlclient-devel is &lt;5.0.45-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054300" version="1" comment="libmysqlclient15-32bit is &lt;5.0.45-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054301" version="1" comment="libmysqlclient15-64bit is &lt;5.0.45-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054302" version="1" comment="libmysqlclient15 is &lt;5.0.45-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054303" version="1" comment="libmysqlclient_r15-32bit is &lt;5.0.45-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054304" version="1" comment="libmysqlclient_r15-64bit is &lt;5.0.45-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054305" version="1" comment="libmysqlclient_r15 is &lt;5.0.45-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054306" version="1" comment="mysql-Max is &lt;5.0.45-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054307" version="1" comment="mysql-bench is &lt;5.0.45-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054308" version="1" comment="mysql-client is &lt;5.0.45-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054309" version="1" comment="mysql-debug is &lt;5.0.45-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054310" version="1" comment="mysql-tools is &lt;5.0.45-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054311" version="1" comment="mysql is &lt;5.0.45-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035963" version="1" comment="freeradius-devel is &lt;1.1.6-47.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035964" version="1" comment="freeradius-dialupadmin is &lt;1.1.6-47.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035965" version="1" comment="freeradius is &lt;1.1.6-47.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035966" version="1" comment="kernel-bigsmp is &lt;2.6.22.19-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035967" version="1" comment="kernel-debug is &lt;2.6.22.19-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035968" version="1" comment="kernel-default is &lt;2.6.22.19-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035969" version="1" comment="kernel-kdump is &lt;2.6.22.19-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035970" version="1" comment="kernel-ppc64 is &lt;2.6.22.19-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035971" version="1" comment="kernel-source is &lt;2.6.22.19-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035972" version="1" comment="kernel-syms is &lt;2.6.22.19-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035973" version="1" comment="kernel-xen is &lt;2.6.22.19-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035974" version="1" comment="kernel-xenpae is &lt;2.6.22.19-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035975" version="1" comment="graphviz-devel is &lt;2.12-50.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035976" version="1" comment="graphviz-doc is &lt;2.12-50.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035977" version="1" comment="graphviz-gd is &lt;2.12-50.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035978" version="1" comment="graphviz-guile is &lt;2.12-50.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035979" version="1" comment="graphviz-java is &lt;2.12-50.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035980" version="1" comment="graphviz-lua is &lt;2.12-50.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035981" version="1" comment="graphviz-ocaml is &lt;2.12-50.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035982" version="1" comment="graphviz-perl is &lt;2.12-50.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035983" version="1" comment="graphviz-php is &lt;2.12-50.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035984" version="1" comment="graphviz-python is &lt;2.12-50.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035985" version="1" comment="graphviz-ruby is &lt;2.12-50.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035986" version="1" comment="graphviz-sharp is &lt;2.12-50.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035987" version="1" comment="graphviz-tcl is &lt;2.12-50.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035988" version="1" comment="graphviz is &lt;2.12-50.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035989" version="1" comment="jhead is &lt;2.7-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035990" version="1" comment="dovecot-devel is &lt;1.0.5-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035991" version="1" comment="dovecot is &lt;1.0.5-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035992" version="1" comment="lynx is &lt;2.8.6-48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035993" version="1" comment="opera is &lt;9.60-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035994" version="1" comment="opera is &lt;9.61-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035995" version="1" comment="libgadu-devel is &lt;1.7.1-29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035996" version="1" comment="libgadu is &lt;1.7.1-29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035997" version="1" comment="opera is &lt;9.62-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035998" version="1" comment="python-32bit is &lt;2.5.1-39.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035999" version="1" comment="python-64bit is &lt;2.5.1-39.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036000" version="1" comment="python-curses is &lt;2.5.1-39.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036001" version="1" comment="python-demo is &lt;2.5.1-39.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036002" version="1" comment="python-devel is &lt;2.5.1-39.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036003" version="1" comment="python-gdbm is &lt;2.5.1-39.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036004" version="1" comment="python-idle is &lt;2.5.1-39.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036005" version="1" comment="python-tk is &lt;2.5.1-39.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036006" version="1" comment="python-xml is &lt;2.5.1-39.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036007" version="1" comment="python is &lt;2.5.1-39.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036008" version="1" comment="valgrind-devel is &lt;3.2.3-57.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036009" version="1" comment="valgrind is &lt;3.2.3-57.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036010" version="1" comment="kernel-bigsmp is &lt;2.6.22.19-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036011" version="1" comment="kernel-debug is &lt;2.6.22.19-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036012" version="1" comment="kernel-default is &lt;2.6.22.19-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036013" version="1" comment="kernel-kdump is &lt;2.6.22.19-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036014" version="1" comment="kernel-ppc64 is &lt;2.6.22.19-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036015" version="1" comment="kernel-source is &lt;2.6.22.19-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036016" version="1" comment="kernel-syms is &lt;2.6.22.19-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036017" version="1" comment="kernel-xen is &lt;2.6.22.19-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036018" version="1" comment="kernel-xenpae is &lt;2.6.22.19-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036019" version="1" comment="gnutls-32bit is &lt;1.6.1-36.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036020" version="1" comment="gnutls-64bit is &lt;1.6.1-36.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036021" version="1" comment="gnutls-devel-32bit is &lt;1.6.1-36.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036022" version="1" comment="gnutls-devel-64bit is &lt;1.6.1-36.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036023" version="1" comment="gnutls-devel is &lt;1.6.1-36.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036024" version="1" comment="gnutls is &lt;1.6.1-36.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036025" version="1" comment="gnutls-32bit is &lt;1.6.1-36.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036026" version="1" comment="gnutls-64bit is &lt;1.6.1-36.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036027" version="1" comment="gnutls-devel-32bit is &lt;1.6.1-36.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036028" version="1" comment="gnutls-devel-64bit is &lt;1.6.1-36.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036029" version="1" comment="gnutls-devel is &lt;1.6.1-36.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036030" version="1" comment="gnutls is &lt;1.6.1-36.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036031" version="1" comment="imap-devel is &lt;2006c1_suse-51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036032" version="1" comment="imap-lib is &lt;2006c1_suse-51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036033" version="1" comment="imap is &lt;2006c1_suse-51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036034" version="1" comment="MozillaThunderbird-translations is &lt;2.0.0.18-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036035" version="1" comment="MozillaThunderbird is &lt;2.0.0.18-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036036" version="1" comment="clamav-db is &lt;0.94.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033880" version="1" comment="clamav is &lt;0.94.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036037" version="1" comment="htop is &lt;0.6.6-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036038" version="1" comment="libopenssl-devel is &lt;0.9.8e-45.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036039" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8e-45.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036040" version="1" comment="libopenssl0_9_8-64bit is &lt;0.9.8e-45.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036041" version="1" comment="libopenssl0_9_8 is &lt;0.9.8e-45.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036042" version="1" comment="openssl-certs is &lt;0.9.8e-45.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036043" version="1" comment="openssl-doc is &lt;0.9.8e-45.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036044" version="1" comment="openssl is &lt;0.9.8e-45.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036045" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-75.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036046" version="1" comment="compat-openssl097g-64bit is &lt;0.9.7g-75.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036047" version="1" comment="compat-openssl097g is &lt;0.9.7g-75.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036048" version="1" comment="avahi-32bit is &lt;0.6.20-40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036049" version="1" comment="avahi-64bit is &lt;0.6.20-40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036050" version="1" comment="avahi-compat-howl-devel is &lt;0.6.20-40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036051" version="1" comment="avahi-compat-howl is &lt;0.6.20-40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036052" version="1" comment="avahi-compat-mDNSResponder-32bit is &lt;0.6.20-40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036053" version="1" comment="avahi-compat-mDNSResponder-64bit is &lt;0.6.20-40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036054" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.6.20-40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036055" version="1" comment="avahi-compat-mDNSResponder is &lt;0.6.20-40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036056" version="1" comment="avahi-devel is &lt;0.6.20-40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036057" version="1" comment="avahi-glib-32bit is &lt;0.6.20-40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036058" version="1" comment="avahi-glib-64bit is &lt;0.6.20-40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036059" version="1" comment="avahi-glib is &lt;0.6.20-40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036060" version="1" comment="avahi-python is &lt;0.6.20-40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036061" version="1" comment="avahi-qt3 is &lt;0.6.20-40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036062" version="1" comment="avahi-qt4 is &lt;0.6.20-40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036063" version="1" comment="avahi is &lt;0.6.20-40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036064" version="1" comment="libvirt-devel is &lt;0.3.0-30.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036065" version="1" comment="libvirt-doc is &lt;0.3.0-30.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036066" version="1" comment="libvirt-python is &lt;0.3.0-30.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036067" version="1" comment="libvirt is &lt;0.3.0-30.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036068" version="1" comment="optipng is &lt;0.6.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036069" version="1" comment="pam_mount-32bit is &lt;0.18-84.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036070" version="1" comment="pam_mount-64bit is &lt;0.18-84.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036071" version="1" comment="pam_mount is &lt;0.18-84.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036072" version="1" comment="imlib2-devel is &lt;1.3.0-66.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036073" version="1" comment="imlib2-filters is &lt;1.3.0-66.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036074" version="1" comment="imlib2-loaders is &lt;1.3.0-66.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036075" version="1" comment="imlib2 is &lt;1.3.0-66.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036076" version="1" comment="rubygem-actionpack is &lt;1.13.3-20.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036077" version="1" comment="mediawiki is &lt;1.10.0-32.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036078" version="1" comment="virtualbox-guest-tools is &lt;1.5.2-10.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036079" version="1" comment="virtualbox is &lt;1.5.2-10.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036080" version="1" comment="xorg-x11-driver-virtualbox is &lt;1.5.2-10.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036081" version="1" comment="pdns-backend-ldap is &lt;2.9.21-57.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036082" version="1" comment="pdns-backend-mysql is &lt;2.9.21-57.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036083" version="1" comment="pdns-backend-postgresql is &lt;2.9.21-57.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036084" version="1" comment="pdns-backend-sqlite2 is &lt;2.9.21-57.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036085" version="1" comment="pdns-backend-sqlite3 is &lt;2.9.21-57.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036086" version="1" comment="pdns is &lt;2.9.21-57.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036087" version="1" comment="clamav-db is &lt;0.94.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033890" version="1" comment="clamav is &lt;0.94.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036088" version="1" comment="moodle-af is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036089" version="1" comment="moodle-ar is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036090" version="1" comment="moodle-be is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036091" version="1" comment="moodle-bg is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036092" version="1" comment="moodle-bs is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036093" version="1" comment="moodle-ca is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036094" version="1" comment="moodle-cs is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036095" version="1" comment="moodle-da is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036096" version="1" comment="moodle-de is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036097" version="1" comment="moodle-de_du is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036098" version="1" comment="moodle-el is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036099" version="1" comment="moodle-es is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036100" version="1" comment="moodle-et is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036101" version="1" comment="moodle-eu is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036102" version="1" comment="moodle-fa is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036103" version="1" comment="moodle-fi is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036104" version="1" comment="moodle-fr is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036105" version="1" comment="moodle-ga is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036106" version="1" comment="moodle-gl is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036107" version="1" comment="moodle-he is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036108" version="1" comment="moodle-hi is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036109" version="1" comment="moodle-hr is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036110" version="1" comment="moodle-hu is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036111" version="1" comment="moodle-id is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036112" version="1" comment="moodle-is is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036113" version="1" comment="moodle-it is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036114" version="1" comment="moodle-ja is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036115" version="1" comment="moodle-ka is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036116" version="1" comment="moodle-km is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036117" version="1" comment="moodle-kn is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036118" version="1" comment="moodle-ko is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036119" version="1" comment="moodle-lt is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036120" version="1" comment="moodle-lv is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036121" version="1" comment="moodle-mi_tn is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036122" version="1" comment="moodle-ms is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036123" version="1" comment="moodle-nl is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036124" version="1" comment="moodle-nn is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036125" version="1" comment="moodle-no is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036126" version="1" comment="moodle-pl is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036127" version="1" comment="moodle-pt is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036128" version="1" comment="moodle-ro is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036129" version="1" comment="moodle-ru is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036130" version="1" comment="moodle-sk is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036131" version="1" comment="moodle-sl is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036132" version="1" comment="moodle-so is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036133" version="1" comment="moodle-sq is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036134" version="1" comment="moodle-sr is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036135" version="1" comment="moodle-sv is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036136" version="1" comment="moodle-th is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036137" version="1" comment="moodle-tl is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036138" version="1" comment="moodle-tr is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036139" version="1" comment="moodle-uk is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036140" version="1" comment="moodle-vi is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036141" version="1" comment="moodle-zh_cn is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036142" version="1" comment="moodle is &lt;1.8.2-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036143" version="1" comment="apache2-mod_php5 is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036144" version="1" comment="php5-bcmath is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036145" version="1" comment="php5-bz2 is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036146" version="1" comment="php5-calendar is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036147" version="1" comment="php5-ctype is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036148" version="1" comment="php5-curl is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036149" version="1" comment="php5-dba is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036150" version="1" comment="php5-dbase is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036151" version="1" comment="php5-devel is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036152" version="1" comment="php5-dom is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036153" version="1" comment="php5-exif is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036154" version="1" comment="php5-fastcgi is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036155" version="1" comment="php5-ftp is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036156" version="1" comment="php5-gd is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036157" version="1" comment="php5-gettext is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036158" version="1" comment="php5-gmp is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036159" version="1" comment="php5-hash is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036160" version="1" comment="php5-iconv is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036161" version="1" comment="php5-imap is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036162" version="1" comment="php5-json is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036163" version="1" comment="php5-ldap is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036164" version="1" comment="php5-mbstring is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036165" version="1" comment="php5-mcrypt is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036166" version="1" comment="php5-mhash is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036167" version="1" comment="php5-mysql is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036168" version="1" comment="php5-ncurses is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036169" version="1" comment="php5-odbc is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036170" version="1" comment="php5-openssl is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036171" version="1" comment="php5-pcntl is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036172" version="1" comment="php5-pdo is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036173" version="1" comment="php5-pear is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036174" version="1" comment="php5-pgsql is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036175" version="1" comment="php5-posix is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036176" version="1" comment="php5-pspell is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036177" version="1" comment="php5-readline is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036178" version="1" comment="php5-shmop is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036179" version="1" comment="php5-snmp is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036180" version="1" comment="php5-soap is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036181" version="1" comment="php5-sockets is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036182" version="1" comment="php5-sqlite is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036183" version="1" comment="php5-suhosin is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036184" version="1" comment="php5-sysvmsg is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036185" version="1" comment="php5-sysvsem is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036186" version="1" comment="php5-sysvshm is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036187" version="1" comment="php5-tidy is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036188" version="1" comment="php5-tokenizer is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036189" version="1" comment="php5-wddx is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036190" version="1" comment="php5-xmlreader is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036191" version="1" comment="php5-xmlrpc is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036192" version="1" comment="php5-xmlwriter is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036193" version="1" comment="php5-xsl is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036194" version="1" comment="php5-zip is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036195" version="1" comment="php5-zlib is &lt;5.2.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031991" version="1" comment="flash-player is &lt;9.0.152.0-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036196" version="1" comment="seamonkey-dom-inspector is &lt;1.1.14-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036197" version="1" comment="seamonkey-irc is &lt;1.1.14-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036198" version="1" comment="seamonkey-mail is &lt;1.1.14-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036199" version="1" comment="seamonkey-spellchecker is &lt;1.1.14-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036200" version="1" comment="seamonkey-venkman is &lt;1.1.14-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036201" version="1" comment="seamonkey is &lt;1.1.14-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036202" version="1" comment="MozillaFirefox-translations is &lt;2.0.0.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036203" version="1" comment="MozillaFirefox is &lt;2.0.0.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036204" version="1" comment="MozillaThunderbird-translations is &lt;2.0.0.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036205" version="1" comment="MozillaThunderbird is &lt;2.0.0.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036206" version="1" comment="mozilla-xulrunner181-32bit is &lt;1.8.1.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036207" version="1" comment="mozilla-xulrunner181-64bit is &lt;1.8.1.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036208" version="1" comment="mozilla-xulrunner181-devel is &lt;1.8.1.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036209" version="1" comment="mozilla-xulrunner181-l10n is &lt;1.8.1.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036210" version="1" comment="mozilla-xulrunner181 is &lt;1.8.1.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053694" version="1" comment="tomcat55-admin-webapps is &lt;5.5.23-113.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053695" version="1" comment="tomcat55-common-lib is &lt;5.5.23-113.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053696" version="1" comment="tomcat55-jasper-javadoc is &lt;5.5.23-113.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053697" version="1" comment="tomcat55-jasper is &lt;5.5.23-113.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053698" version="1" comment="tomcat55-jsp-2_0-api-javadoc is &lt;5.5.23-113.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053699" version="1" comment="tomcat55-jsp-2_0-api is &lt;5.5.23-113.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053700" version="1" comment="tomcat55-server-lib is &lt;5.5.23-113.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053701" version="1" comment="tomcat55-servlet-2_4-api-javadoc is &lt;5.5.23-113.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053702" version="1" comment="tomcat55-servlet-2_4-api is &lt;5.5.23-113.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053703" version="1" comment="tomcat55-webapps is &lt;5.5.23-113.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053704" version="1" comment="tomcat55 is &lt;5.5.23-113.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036211" version="1" comment="git-arch is &lt;1.5.2.4-24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036212" version="1" comment="git-core is &lt;1.5.2.4-24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036213" version="1" comment="git-cvs is &lt;1.5.2.4-24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036214" version="1" comment="git-email is &lt;1.5.2.4-24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036215" version="1" comment="git-svn is &lt;1.5.2.4-24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036216" version="1" comment="git is &lt;1.5.2.4-24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036217" version="1" comment="gitk is &lt;1.5.2.4-24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056024" version="1" comment="apache2-mod_jk is &lt;1.2.21-59.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036218" version="1" comment="apache2-mod_php5 is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036219" version="1" comment="php5-bcmath is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036220" version="1" comment="php5-bz2 is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036221" version="1" comment="php5-calendar is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036222" version="1" comment="php5-ctype is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036223" version="1" comment="php5-curl is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036224" version="1" comment="php5-dba is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036225" version="1" comment="php5-dbase is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036226" version="1" comment="php5-devel is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036227" version="1" comment="php5-dom is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036228" version="1" comment="php5-exif is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036229" version="1" comment="php5-fastcgi is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036230" version="1" comment="php5-ftp is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036231" version="1" comment="php5-gd is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036232" version="1" comment="php5-gettext is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036233" version="1" comment="php5-gmp is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036234" version="1" comment="php5-hash is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036235" version="1" comment="php5-iconv is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036236" version="1" comment="php5-imap is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036237" version="1" comment="php5-json is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036238" version="1" comment="php5-ldap is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036239" version="1" comment="php5-mbstring is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036240" version="1" comment="php5-mcrypt is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036241" version="1" comment="php5-mhash is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036242" version="1" comment="php5-mysql is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036243" version="1" comment="php5-ncurses is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036244" version="1" comment="php5-odbc is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036245" version="1" comment="php5-openssl is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036246" version="1" comment="php5-pcntl is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036247" version="1" comment="php5-pdo is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036248" version="1" comment="php5-pear is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036249" version="1" comment="php5-pgsql is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036250" version="1" comment="php5-posix is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036251" version="1" comment="php5-pspell is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036252" version="1" comment="php5-readline is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036253" version="1" comment="php5-shmop is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036254" version="1" comment="php5-snmp is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036255" version="1" comment="php5-soap is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036256" version="1" comment="php5-sockets is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036257" version="1" comment="php5-sqlite is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036258" version="1" comment="php5-suhosin is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036259" version="1" comment="php5-sysvmsg is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036260" version="1" comment="php5-sysvsem is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036261" version="1" comment="php5-sysvshm is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036262" version="1" comment="php5-tidy is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036263" version="1" comment="php5-tokenizer is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036264" version="1" comment="php5-wddx is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036265" version="1" comment="php5-xmlreader is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036266" version="1" comment="php5-xmlrpc is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036267" version="1" comment="php5-xmlwriter is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036268" version="1" comment="php5-xsl is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036269" version="1" comment="php5-zip is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036270" version="1" comment="php5-zlib is &lt;5.2.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036271" version="1" comment="phpPgAdmin is &lt;4.1.3-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036272" version="1" comment="opera is &lt;9.63-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036273" version="1" comment="netatalk-devel is &lt;2.0.3-130.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036274" version="1" comment="netatalk is &lt;2.0.3-130.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036275" version="1" comment="audiofile-32bit is &lt;0.2.6-77.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036276" version="1" comment="audiofile-64bit is &lt;0.2.6-77.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036277" version="1" comment="audiofile-devel is &lt;0.2.6-77.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036278" version="1" comment="audiofile is &lt;0.2.6-77.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036279" version="1" comment="libpng-32bit is &lt;1.2.18-15.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036280" version="1" comment="libpng-64bit is &lt;1.2.18-15.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036281" version="1" comment="libpng-devel-32bit is &lt;1.2.18-15.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036282" version="1" comment="libpng-devel-64bit is &lt;1.2.18-15.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036283" version="1" comment="libpng-devel is &lt;1.2.18-15.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036284" version="1" comment="libpng is &lt;1.2.18-15.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036285" version="1" comment="horde is &lt;3.1.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036286" version="1" comment="libsnmp15 is &lt;5.4.1-19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036287" version="1" comment="net-snmp-32bit is &lt;5.4.1-19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036288" version="1" comment="net-snmp-64bit is &lt;5.4.1-19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036289" version="1" comment="net-snmp-devel-64bit is &lt;5.4.1-19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036290" version="1" comment="net-snmp-devel is &lt;5.4.1-19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036291" version="1" comment="net-snmp is &lt;5.4.1-19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036292" version="1" comment="perl-SNMP is &lt;5.4.1-19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036293" version="1" comment="snmp-mibs is &lt;5.4.1-19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036294" version="1" comment="psi is &lt;0.10-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036295" version="1" comment="clamav-db is &lt;0.95-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036296" version="1" comment="clamav is &lt;0.95-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054840" version="1" comment="silc-toolkit-devel is &lt;1.1.2-14.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054841" version="1" comment="silc-toolkit is &lt;1.1.2-14.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036297" version="1" comment="xntp-doc is &lt;4.2.4p3-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036298" version="1" comment="xntp is &lt;4.2.4p3-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053396" version="1" comment="libapr-util1-64bit is &lt;1.2.8-68.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053397" version="1" comment="libapr-util1-dbd-mysql is &lt;1.2.8-68.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053398" version="1" comment="libapr-util1-dbd-pgsql is &lt;1.2.8-68.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053399" version="1" comment="libapr-util1-dbd-sqlite3 is &lt;1.2.8-68.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053400" version="1" comment="libapr-util1-devel-64bit is &lt;1.2.8-68.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053401" version="1" comment="libapr-util1-devel is &lt;1.2.8-68.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053402" version="1" comment="libapr-util1 is &lt;1.2.8-68.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036299" version="1" comment="bind-chrootenv is &lt;9.4.1.P1-12.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036300" version="1" comment="bind-devel-64bit is &lt;9.4.1.P1-12.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036301" version="1" comment="bind-devel is &lt;9.4.1.P1-12.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036302" version="1" comment="bind-doc is &lt;9.4.1.P1-12.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036303" version="1" comment="bind-libs-32bit is &lt;9.4.1.P1-12.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036304" version="1" comment="bind-libs-64bit is &lt;9.4.1.P1-12.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036305" version="1" comment="bind-libs is &lt;9.4.1.P1-12.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036306" version="1" comment="bind-utils is &lt;9.4.1.P1-12.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036307" version="1" comment="bind is &lt;9.4.1.P1-12.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036308" version="1" comment="sudo is &lt;1.6.9p2-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036309" version="1" comment="curl-ca-bundle is &lt;7.16.4-16.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036310" version="1" comment="curl is &lt;7.16.4-16.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036311" version="1" comment="libcurl-devel is &lt;7.16.4-16.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036312" version="1" comment="libcurl4-32bit is &lt;7.16.4-16.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036313" version="1" comment="libcurl4-64bit is &lt;7.16.4-16.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036314" version="1" comment="libcurl4 is &lt;7.16.4-16.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036315" version="1" comment="libpng-32bit is &lt;1.2.18-15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036316" version="1" comment="libpng-64bit is &lt;1.2.18-15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036317" version="1" comment="libpng-devel-32bit is &lt;1.2.18-15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036318" version="1" comment="libpng-devel-64bit is &lt;1.2.18-15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036319" version="1" comment="libpng-devel is &lt;1.2.18-15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036320" version="1" comment="libpng is &lt;1.2.18-15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036321" version="1" comment="libpng-32bit is &lt;1.2.18-15.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036322" version="1" comment="libpng-64bit is &lt;1.2.18-15.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036323" version="1" comment="libpng-devel-32bit is &lt;1.2.18-15.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036324" version="1" comment="libpng-devel-64bit is &lt;1.2.18-15.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036325" version="1" comment="libpng-devel is &lt;1.2.18-15.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036326" version="1" comment="libpng is &lt;1.2.18-15.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036327" version="1" comment="MozillaFirefox-translations is &lt;2.0.0.21post-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036328" version="1" comment="MozillaFirefox is &lt;2.0.0.21post-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036329" version="1" comment="seamonkey-dom-inspector is &lt;1.1.16-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036330" version="1" comment="seamonkey-irc is &lt;1.1.16-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036331" version="1" comment="seamonkey-mail is &lt;1.1.16-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036332" version="1" comment="seamonkey-spellchecker is &lt;1.1.16-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036333" version="1" comment="seamonkey-venkman is &lt;1.1.16-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036334" version="1" comment="seamonkey is &lt;1.1.16-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036335" version="1" comment="eID-belgium is &lt;2.5.9-119.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032032" version="1" comment="flash-player is &lt;9.0.159.0-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036336" version="1" comment="kpartx is &lt;0.4.7-80.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036337" version="1" comment="multipath-tools is &lt;0.4.7-80.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036338" version="1" comment="libnasl is &lt;2.2.10-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036339" version="1" comment="amarok-lang is &lt;1.4.7-37.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036340" version="1" comment="amarok-libvisual is &lt;1.4.7-37.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036341" version="1" comment="amarok-xine is &lt;1.4.7-37.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036342" version="1" comment="amarok-yauap is &lt;1.4.7-37.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036343" version="1" comment="amarok is &lt;1.4.7-37.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036344" version="1" comment="poppler-devel is &lt;0.5.4-101.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036345" version="1" comment="poppler-doc is &lt;0.5.4-101.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036346" version="1" comment="poppler-glib is &lt;0.5.4-101.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036347" version="1" comment="poppler-qt4 is &lt;0.5.4-101.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036348" version="1" comment="poppler-qt is &lt;0.5.4-101.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036349" version="1" comment="poppler-tools is &lt;0.5.4-101.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036350" version="1" comment="poppler is &lt;0.5.4-101.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036351" version="1" comment="kdegraphics3-3D is &lt;3.5.7-60.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036352" version="1" comment="kdegraphics3-devel is &lt;3.5.7-60.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036353" version="1" comment="kdegraphics3-extra is &lt;3.5.7-60.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036354" version="1" comment="kdegraphics3-fax is &lt;3.5.7-60.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036355" version="1" comment="kdegraphics3-imaging is &lt;3.5.7-60.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036356" version="1" comment="kdegraphics3-kamera is &lt;3.5.7-60.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036357" version="1" comment="kdegraphics3-pdf is &lt;3.5.7-60.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036358" version="1" comment="kdegraphics3-postscript is &lt;3.5.7-60.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036359" version="1" comment="kdegraphics3-scan is &lt;3.5.7-60.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036360" version="1" comment="kdegraphics3-tex is &lt;3.5.7-60.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036361" version="1" comment="kdegraphics3 is &lt;3.5.7-60.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036362" version="1" comment="xpdf-tools is &lt;3.02-19.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036363" version="1" comment="xpdf is &lt;3.02-19.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036364" version="1" comment="cups-client is &lt;1.2.12-22.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036365" version="1" comment="cups-devel is &lt;1.2.12-22.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036366" version="1" comment="cups-libs-32bit is &lt;1.2.12-22.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036367" version="1" comment="cups-libs-64bit is &lt;1.2.12-22.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036368" version="1" comment="cups-libs is &lt;1.2.12-22.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036369" version="1" comment="cups is &lt;1.2.12-22.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053856" version="1" comment="icu-data is &lt;3.6-13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053857" version="1" comment="icu is &lt;3.6-13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053858" version="1" comment="libicu-32bit is &lt;3.6-13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053859" version="1" comment="libicu-64bit is &lt;3.6-13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053860" version="1" comment="libicu-devel-32bit is &lt;3.6-13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053861" version="1" comment="libicu-devel-64bit is &lt;3.6-13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053862" version="1" comment="libicu-devel is &lt;3.6-13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053863" version="1" comment="libicu-doc is &lt;3.6-13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053864" version="1" comment="libicu is &lt;3.6-13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036370" version="1" comment="xntp-doc is &lt;4.2.4p3-25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036371" version="1" comment="xntp is &lt;4.2.4p3-25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036372" version="1" comment="libsndfile-32bit is &lt;1.0.17-81.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036373" version="1" comment="libsndfile-64bit is &lt;1.0.17-81.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036374" version="1" comment="libsndfile-devel is &lt;1.0.17-81.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036375" version="1" comment="libsndfile-octave is &lt;1.0.17-81.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036376" version="1" comment="libsndfile-progs is &lt;1.0.17-81.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036377" version="1" comment="libsndfile is &lt;1.0.17-81.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036378" version="1" comment="acroread is &lt;8.1.4-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036379" version="1" comment="acroread is &lt;8.1.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054575" version="1" comment="OpenOffice_org-base is &lt;2.3.0.1.2-10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054576" version="1" comment="OpenOffice_org-calc is &lt;2.3.0.1.2-10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054577" version="1" comment="OpenOffice_org-devel is &lt;2.3.0.1.2-10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054578" version="1" comment="OpenOffice_org-draw is &lt;2.3.0.1.2-10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054579" version="1" comment="OpenOffice_org-filters is &lt;2.3.0.1.2-10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054580" version="1" comment="OpenOffice_org-gnome is &lt;2.3.0.1.2-10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054581" version="1" comment="OpenOffice_org-impress is &lt;2.3.0.1.2-10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054582" version="1" comment="OpenOffice_org-kde is &lt;2.3.0.1.2-10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054583" version="1" comment="OpenOffice_org-mailmerge is &lt;2.3.0.1.2-10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054584" version="1" comment="OpenOffice_org-math is &lt;2.3.0.1.2-10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054585" version="1" comment="OpenOffice_org-mono is &lt;2.3.0.1.2-10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054586" version="1" comment="OpenOffice_org-officebean is &lt;2.3.0.1.2-10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054587" version="1" comment="OpenOffice_org-pyuno is &lt;2.3.0.1.2-10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054588" version="1" comment="OpenOffice_org-sdk-doc is &lt;2.3.0.1.2-10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054589" version="1" comment="OpenOffice_org-sdk is &lt;2.3.0.1.2-10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054590" version="1" comment="OpenOffice_org-testtool is &lt;2.3.0.1.2-10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054591" version="1" comment="OpenOffice_org-writer is &lt;2.3.0.1.2-10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054592" version="1" comment="OpenOffice_org is &lt;2.3.0.1.2-10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036380" version="1" comment="ganglia-monitor-core-devel is &lt;2.5.7-99.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036381" version="1" comment="ganglia-monitor-core-gmetad is &lt;2.5.7-99.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036382" version="1" comment="ganglia-monitor-core-gmond is &lt;2.5.7-99.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036383" version="1" comment="ganglia-monitor-core is &lt;2.5.7-99.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036384" version="1" comment="ganglia-webfrontend is &lt;2.5.7-99.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036385" version="1" comment="sbl is &lt;3.0f-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036386" version="1" comment="NetworkManager-gnome is &lt;0.6.5-37.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036387" version="1" comment="NetworkManager-devel is &lt;0.6.5-37.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036388" version="1" comment="NetworkManager-glib is &lt;0.6.5-37.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036389" version="1" comment="NetworkManager is &lt;0.6.5-37.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036390" version="1" comment="NetworkManager-kde-devel is &lt;0.2r674918-55.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036391" version="1" comment="NetworkManager-kde is &lt;0.2r674918-55.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036392" version="1" comment="NetworkManager-openvpn-kde is &lt;0.2r674918-55.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036393" version="1" comment="NetworkManager-vpnc-kde is &lt;0.2r674918-55.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036394" version="1" comment="libopensc2-32bit is &lt;0.11.3-21.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036395" version="1" comment="libopensc2-64bit is &lt;0.11.3-21.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036396" version="1" comment="libopensc2 is &lt;0.11.3-21.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036397" version="1" comment="opensc-32bit is &lt;0.11.3-21.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036398" version="1" comment="opensc-64bit is &lt;0.11.3-21.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036399" version="1" comment="opensc-devel is &lt;0.11.3-21.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036400" version="1" comment="opensc is &lt;0.11.3-21.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036401" version="1" comment="gstreamer010-plugins-good-doc is &lt;0.10.6-41.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036402" version="1" comment="gstreamer010-plugins-good-extra is &lt;0.10.6-41.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036403" version="1" comment="gstreamer010-plugins-good is &lt;0.10.6-41.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036404" version="1" comment="audacity is &lt;1.3.3-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036405" version="1" comment="moodle-af is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036406" version="1" comment="moodle-ar is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036407" version="1" comment="moodle-be is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036408" version="1" comment="moodle-bg is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036409" version="1" comment="moodle-bs is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036410" version="1" comment="moodle-ca is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036411" version="1" comment="moodle-cs is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036412" version="1" comment="moodle-da is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036413" version="1" comment="moodle-de is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036414" version="1" comment="moodle-de_du is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036415" version="1" comment="moodle-el is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036416" version="1" comment="moodle-es is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036417" version="1" comment="moodle-et is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036418" version="1" comment="moodle-eu is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036419" version="1" comment="moodle-fa is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036420" version="1" comment="moodle-fi is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036421" version="1" comment="moodle-fr is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036422" version="1" comment="moodle-ga is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036423" version="1" comment="moodle-gl is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036424" version="1" comment="moodle-he is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036425" version="1" comment="moodle-hi is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036426" version="1" comment="moodle-hr is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036427" version="1" comment="moodle-hu is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036428" version="1" comment="moodle-id is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036429" version="1" comment="moodle-is is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036430" version="1" comment="moodle-it is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036431" version="1" comment="moodle-ja is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036432" version="1" comment="moodle-ka is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036433" version="1" comment="moodle-km is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036434" version="1" comment="moodle-kn is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036435" version="1" comment="moodle-ko is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036436" version="1" comment="moodle-lt is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036437" version="1" comment="moodle-lv is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036438" version="1" comment="moodle-mi_tn is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036439" version="1" comment="moodle-ms is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036440" version="1" comment="moodle-nl is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036441" version="1" comment="moodle-nn is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036442" version="1" comment="moodle-no is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036443" version="1" comment="moodle-pl is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036444" version="1" comment="moodle-pt is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036445" version="1" comment="moodle-ro is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036446" version="1" comment="moodle-ru is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036447" version="1" comment="moodle-sk is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036448" version="1" comment="moodle-sl is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036449" version="1" comment="moodle-so is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036450" version="1" comment="moodle-sq is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036451" version="1" comment="moodle-sr is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036452" version="1" comment="moodle-sv is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036453" version="1" comment="moodle-th is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036454" version="1" comment="moodle-tl is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036455" version="1" comment="moodle-tr is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036456" version="1" comment="moodle-uk is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036457" version="1" comment="moodle-vi is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036458" version="1" comment="moodle-zh_cn is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036459" version="1" comment="moodle is &lt;1.8.2-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036460" version="1" comment="python-crypto is &lt;2.0.1-103.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036461" version="1" comment="liblcms-32bit is &lt;1.16-39.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036462" version="1" comment="liblcms-64bit is &lt;1.16-39.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036463" version="1" comment="liblcms-devel-32bit is &lt;1.16-39.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036464" version="1" comment="liblcms-devel-64bit is &lt;1.16-39.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036465" version="1" comment="liblcms-devel is &lt;1.16-39.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036466" version="1" comment="liblcms is &lt;1.16-39.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036467" version="1" comment="evolution-data-server-32bit is &lt;1.12.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036468" version="1" comment="evolution-data-server-64bit is &lt;1.12.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036469" version="1" comment="evolution-data-server-devel is &lt;1.12.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036470" version="1" comment="evolution-data-server-doc is &lt;1.12.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036471" version="1" comment="evolution-data-server is &lt;1.12.0-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036472" version="1" comment="ghostscript-fonts-other is &lt;8.15.4-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036473" version="1" comment="ghostscript-fonts-rus is &lt;8.15.4-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036474" version="1" comment="ghostscript-fonts-std is &lt;8.15.4-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036475" version="1" comment="ghostscript-ijs-devel is &lt;8.15.4-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036476" version="1" comment="ghostscript-library is &lt;8.15.4-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036477" version="1" comment="ghostscript-omni is &lt;8.15.4-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036478" version="1" comment="ghostscript-x11 is &lt;8.15.4-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036479" version="1" comment="libgimpprint-devel is &lt;4.2.7-178.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036480" version="1" comment="libgimpprint is &lt;4.2.7-178.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036481" version="1" comment="libopenssl-devel is &lt;0.9.8e-45.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036482" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8e-45.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036483" version="1" comment="libopenssl0_9_8-64bit is &lt;0.9.8e-45.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036484" version="1" comment="libopenssl0_9_8 is &lt;0.9.8e-45.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036485" version="1" comment="openssl-certs is &lt;0.9.8e-45.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036486" version="1" comment="openssl-doc is &lt;0.9.8e-45.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036487" version="1" comment="openssl is &lt;0.9.8e-45.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036488" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-75.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036489" version="1" comment="compat-openssl097g-64bit is &lt;0.9.7g-75.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036490" version="1" comment="compat-openssl097g is &lt;0.9.7g-75.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036491" version="1" comment="wireshark-devel is &lt;0.99.6-31.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036492" version="1" comment="wireshark is &lt;0.99.6-31.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036493" version="1" comment="perl-DBD-Pg is &lt;1.49-76.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054123" version="1" comment="kernel-bigsmp is &lt;2.6.22.19-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054124" version="1" comment="kernel-debug is &lt;2.6.22.19-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054125" version="1" comment="kernel-default is &lt;2.6.22.19-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054126" version="1" comment="kernel-kdump is &lt;2.6.22.19-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054127" version="1" comment="kernel-ppc64 is &lt;2.6.22.19-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054128" version="1" comment="kernel-source is &lt;2.6.22.19-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054129" version="1" comment="kernel-syms is &lt;2.6.22.19-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054130" version="1" comment="kernel-xen is &lt;2.6.22.19-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054131" version="1" comment="kernel-xenpae is &lt;2.6.22.19-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036494" version="1" comment="cyrus-sasl-32bit is &lt;2.1.22-82.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036495" version="1" comment="cyrus-sasl-64bit is &lt;2.1.22-82.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036496" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.22-82.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036497" version="1" comment="cyrus-sasl-crammd5-64bit is &lt;2.1.22-82.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036498" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.22-82.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036499" version="1" comment="cyrus-sasl-devel-32bit is &lt;2.1.22-82.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036500" version="1" comment="cyrus-sasl-devel-64bit is &lt;2.1.22-82.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036501" version="1" comment="cyrus-sasl-devel is &lt;2.1.22-82.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036502" version="1" comment="cyrus-sasl-digestmd5-32bit is &lt;2.1.22-82.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036503" version="1" comment="cyrus-sasl-digestmd5-64bit is &lt;2.1.22-82.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036504" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.22-82.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036505" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.22-82.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036506" version="1" comment="cyrus-sasl-gssapi-64bit is &lt;2.1.22-82.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036507" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.22-82.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036508" version="1" comment="cyrus-sasl-otp-32bit is &lt;2.1.22-82.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036509" version="1" comment="cyrus-sasl-otp-64bit is &lt;2.1.22-82.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036510" version="1" comment="cyrus-sasl-otp is &lt;2.1.22-82.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036511" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.22-82.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036512" version="1" comment="cyrus-sasl-plain-64bit is &lt;2.1.22-82.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036513" version="1" comment="cyrus-sasl-plain is &lt;2.1.22-82.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036514" version="1" comment="cyrus-sasl is &lt;2.1.22-82.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053403" version="1" comment="dhcp-client is &lt;3.0.6-24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053404" version="1" comment="dhcp-devel is &lt;3.0.6-24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053405" version="1" comment="dhcp-relay is &lt;3.0.6-24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053406" version="1" comment="dhcp-server is &lt;3.0.6-24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053407" version="1" comment="dhcp is &lt;3.0.6-24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053631" version="1" comment="bind-chrootenv is &lt;9.4.1.P1-12.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053632" version="1" comment="bind-devel-64bit is &lt;9.4.1.P1-12.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053633" version="1" comment="bind-devel is &lt;9.4.1.P1-12.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053634" version="1" comment="bind-doc is &lt;9.4.1.P1-12.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053635" version="1" comment="bind-libs-32bit is &lt;9.4.1.P1-12.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053636" version="1" comment="bind-libs-64bit is &lt;9.4.1.P1-12.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053637" version="1" comment="bind-libs is &lt;9.4.1.P1-12.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053638" version="1" comment="bind-utils is &lt;9.4.1.P1-12.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053639" version="1" comment="bind is &lt;9.4.1.P1-12.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036515" version="1" comment="xine-devel is &lt;1.1.8-14.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036516" version="1" comment="xine-extra is &lt;1.1.8-14.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036517" version="1" comment="xine-lib-32bit is &lt;1.1.8-14.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036518" version="1" comment="xine-lib-64bit is &lt;1.1.8-14.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036519" version="1" comment="xine-lib is &lt;1.1.8-14.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036520" version="1" comment="optipng is &lt;0.6.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036521" version="1" comment="openswan-doc is &lt;2.4.7-64.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036522" version="1" comment="openswan is &lt;2.4.7-64.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036523" version="1" comment="cups-client is &lt;1.2.12-22.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036524" version="1" comment="cups-devel is &lt;1.2.12-22.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036525" version="1" comment="cups-libs-32bit is &lt;1.2.12-22.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036526" version="1" comment="cups-libs-64bit is &lt;1.2.12-22.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036527" version="1" comment="cups-libs is &lt;1.2.12-22.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036528" version="1" comment="cups is &lt;1.2.12-22.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054132" version="1" comment="xpdf-tools is &lt;3.02-19.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054133" version="1" comment="xpdf is &lt;3.02-19.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036529" version="1" comment="krb5-32bit is &lt;1.6.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036530" version="1" comment="krb5-64bit is &lt;1.6.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036531" version="1" comment="krb5-apps-clients is &lt;1.6.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036532" version="1" comment="krb5-apps-servers is &lt;1.6.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036533" version="1" comment="krb5-client is &lt;1.6.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036534" version="1" comment="krb5-devel-32bit is &lt;1.6.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036535" version="1" comment="krb5-devel-64bit is &lt;1.6.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036536" version="1" comment="krb5-devel is &lt;1.6.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036537" version="1" comment="krb5-server is &lt;1.6.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036538" version="1" comment="krb5 is &lt;1.6.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053690" version="1" comment="flash-player is &lt;9.0.246.0-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036539" version="1" comment="opera is &lt;9.64-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036540" version="1" comment="postgresql-contrib is &lt;8.2.13-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036541" version="1" comment="postgresql-devel is &lt;8.2.13-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036542" version="1" comment="postgresql-docs is &lt;8.2.13-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036543" version="1" comment="postgresql-libs-32bit is &lt;8.2.13-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036544" version="1" comment="postgresql-libs-64bit is &lt;8.2.13-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036545" version="1" comment="postgresql-libs is &lt;8.2.13-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036546" version="1" comment="postgresql-server is &lt;8.2.13-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036547" version="1" comment="postgresql is &lt;8.2.13-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036548" version="1" comment="freetype2-32bit is &lt;2.3.5-18.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036549" version="1" comment="freetype2-64bit is &lt;2.3.5-18.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036550" version="1" comment="freetype2-devel-32bit is &lt;2.3.5-18.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036551" version="1" comment="freetype2-devel-64bit is &lt;2.3.5-18.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036552" version="1" comment="freetype2-devel is &lt;2.3.5-18.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036553" version="1" comment="freetype2 is &lt;2.3.5-18.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036554" version="1" comment="java-1_5_0-sun-alsa is &lt;1.5.0_update18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036555" version="1" comment="java-1_5_0-sun-demo is &lt;1.5.0_update18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036556" version="1" comment="java-1_5_0-sun-devel is &lt;1.5.0_update18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036557" version="1" comment="java-1_5_0-sun-jdbc is &lt;1.5.0_update18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036558" version="1" comment="java-1_5_0-sun-plugin is &lt;1.5.0_update18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036559" version="1" comment="java-1_5_0-sun-src is &lt;1.5.0_update18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036560" version="1" comment="java-1_5_0-sun is &lt;1.5.0_update18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036561" version="1" comment="java-1_6_0-sun-alsa is &lt;1.6.0.u12-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036562" version="1" comment="java-1_6_0-sun-demo is &lt;1.6.0.u12-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036563" version="1" comment="java-1_6_0-sun-devel is &lt;1.6.0.u12-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036564" version="1" comment="java-1_6_0-sun-jdbc is &lt;1.6.0.u12-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036565" version="1" comment="java-1_6_0-sun-plugin is &lt;1.6.0.u12-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036566" version="1" comment="java-1_6_0-sun-src is &lt;1.6.0.u12-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036567" version="1" comment="java-1_6_0-sun is &lt;1.6.0.u12-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036568" version="1" comment="phpMyAdmin is &lt;2.11.9.5-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036569" version="1" comment="moodle-af is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036570" version="1" comment="moodle-ar is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036571" version="1" comment="moodle-be is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036572" version="1" comment="moodle-bg is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036573" version="1" comment="moodle-bs is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036574" version="1" comment="moodle-ca is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036575" version="1" comment="moodle-cs is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036576" version="1" comment="moodle-da is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036577" version="1" comment="moodle-de is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036578" version="1" comment="moodle-de_du is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036579" version="1" comment="moodle-el is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036580" version="1" comment="moodle-es is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036581" version="1" comment="moodle-et is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036582" version="1" comment="moodle-eu is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036583" version="1" comment="moodle-fa is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036584" version="1" comment="moodle-fi is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036585" version="1" comment="moodle-fr is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036586" version="1" comment="moodle-ga is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036587" version="1" comment="moodle-gl is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036588" version="1" comment="moodle-he is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036589" version="1" comment="moodle-hi is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036590" version="1" comment="moodle-hr is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036591" version="1" comment="moodle-hu is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036592" version="1" comment="moodle-id is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036593" version="1" comment="moodle-is is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036594" version="1" comment="moodle-it is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036595" version="1" comment="moodle-ja is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036596" version="1" comment="moodle-ka is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036597" version="1" comment="moodle-km is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036598" version="1" comment="moodle-kn is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036599" version="1" comment="moodle-ko is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036600" version="1" comment="moodle-lt is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036601" version="1" comment="moodle-lv is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036602" version="1" comment="moodle-mi_tn is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036603" version="1" comment="moodle-ms is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036604" version="1" comment="moodle-nl is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036605" version="1" comment="moodle-nn is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036606" version="1" comment="moodle-no is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036607" version="1" comment="moodle-pl is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036608" version="1" comment="moodle-pt is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036609" version="1" comment="moodle-ro is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036610" version="1" comment="moodle-ru is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036611" version="1" comment="moodle-sk is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036612" version="1" comment="moodle-sl is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036613" version="1" comment="moodle-so is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036614" version="1" comment="moodle-sq is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036615" version="1" comment="moodle-sr is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036616" version="1" comment="moodle-sv is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036617" version="1" comment="moodle-th is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036618" version="1" comment="moodle-tl is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036619" version="1" comment="moodle-tr is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036620" version="1" comment="moodle-uk is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036621" version="1" comment="moodle-vi is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036622" version="1" comment="moodle-zh_cn is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036623" version="1" comment="moodle is &lt;1.8.2-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036624" version="1" comment="libvolume_id-devel is &lt;114-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036625" version="1" comment="libvolume_id is &lt;114-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036626" version="1" comment="udev is &lt;114-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053601" version="1" comment="MozillaFirefox-translations is &lt;3.0.12-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053602" version="1" comment="MozillaFirefox is &lt;3.0.12-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053603" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.12-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053604" version="1" comment="mozilla-xulrunner190-64bit is &lt;1.9.0.12-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053605" version="1" comment="mozilla-xulrunner190-devel is &lt;1.9.0.12-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053606" version="1" comment="mozilla-xulrunner190-gnomevfs-32bit is &lt;1.9.0.12-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053607" version="1" comment="mozilla-xulrunner190-gnomevfs-64bit is &lt;1.9.0.12-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053608" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.12-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053609" version="1" comment="mozilla-xulrunner190-translations-32bit is &lt;1.9.0.12-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053610" version="1" comment="mozilla-xulrunner190-translations-64bit is &lt;1.9.0.12-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053611" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.12-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053612" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.12-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053615" version="1" comment="python-xpcom190 is &lt;1.9.0.12-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055719" version="1" comment="apache2-devel is &lt;2.2.4-70.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055720" version="1" comment="apache2-doc is &lt;2.2.4-70.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055721" version="1" comment="apache2-example-pages is &lt;2.2.4-70.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055722" version="1" comment="apache2-prefork is &lt;2.2.4-70.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055723" version="1" comment="apache2-utils is &lt;2.2.4-70.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055724" version="1" comment="apache2-worker is &lt;2.2.4-70.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055725" version="1" comment="apache2 is &lt;2.2.4-70.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036627" version="1" comment="wireshark-devel is &lt;0.99.6-31.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036628" version="1" comment="wireshark is &lt;0.99.6-31.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054536" version="1" comment="opera is &lt;10.00-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053770" version="1" comment="memcached is &lt;1.2.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036629" version="1" comment="xine-devel is &lt;1.1.8-14.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036630" version="1" comment="xine-extra is &lt;1.1.8-14.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036631" version="1" comment="xine-lib-32bit is &lt;1.1.8-14.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036632" version="1" comment="xine-lib-64bit is &lt;1.1.8-14.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036633" version="1" comment="xine-lib is &lt;1.1.8-14.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054852" version="1" comment="open-iscsi is &lt;2.0.866-15.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053244" version="1" comment="MozillaThunderbird-devel is &lt;2.0.0.22-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053245" version="1" comment="MozillaThunderbird-translations is &lt;2.0.0.22-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053246" version="1" comment="MozillaThunderbird is &lt;2.0.0.22-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055392" version="1" comment="seamonkey-dom-inspector is &lt;1.1.18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055393" version="1" comment="seamonkey-irc is &lt;1.1.18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055394" version="1" comment="seamonkey-mail is &lt;1.1.18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055395" version="1" comment="seamonkey-spellchecker is &lt;1.1.18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055396" version="1" comment="seamonkey-venkman is &lt;1.1.18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055397" version="1" comment="seamonkey is &lt;1.1.18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036634" version="1" comment="libwmf-devel is &lt;0.2.8.4-92.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036635" version="1" comment="libwmf-gnome is &lt;0.2.8.4-92.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036636" version="1" comment="libwmf is &lt;0.2.8.4-92.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036637" version="1" comment="clamav-db is &lt;0.95.1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036638" version="1" comment="clamav is &lt;0.95.1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053461" version="1" comment="finch-devel is &lt;2.3.1-26.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053462" version="1" comment="finch is &lt;2.3.1-26.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053463" version="1" comment="libpurple-devel is &lt;2.3.1-26.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053464" version="1" comment="libpurple-meanwhile is &lt;2.3.1-26.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053465" version="1" comment="libpurple-mono is &lt;2.3.1-26.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053466" version="1" comment="libpurple is &lt;2.3.1-26.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053467" version="1" comment="pidgin-devel is &lt;2.3.1-26.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053468" version="1" comment="pidgin is &lt;2.3.1-26.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036639" version="1" comment="libopenssl-devel is &lt;0.9.8e-45.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036640" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8e-45.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036641" version="1" comment="libopenssl0_9_8-64bit is &lt;0.9.8e-45.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036642" version="1" comment="libopenssl0_9_8 is &lt;0.9.8e-45.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036643" version="1" comment="openssl-certs is &lt;0.9.8e-45.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036644" version="1" comment="openssl-doc is &lt;0.9.8e-45.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036645" version="1" comment="openssl is &lt;0.9.8e-45.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054312" version="1" comment="squirrelmail is &lt;1.4.20-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036646" version="1" comment="libopenssl-devel is &lt;0.9.8e-45.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036647" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8e-45.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036648" version="1" comment="libopenssl0_9_8-64bit is &lt;0.9.8e-45.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036649" version="1" comment="libopenssl0_9_8 is &lt;0.9.8e-45.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036650" version="1" comment="openssl-certs is &lt;0.9.8e-45.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036651" version="1" comment="openssl-doc is &lt;0.9.8e-45.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036652" version="1" comment="openssl is &lt;0.9.8e-45.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036653" version="1" comment="perl-Compress-Raw-Zlib is &lt;2.005-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053082" version="1" comment="gstreamer010-plugins-bad-devel is &lt;0.10.5-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053083" version="1" comment="gstreamer010-plugins-bad-doc is &lt;0.10.5-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053084" version="1" comment="gstreamer010-plugins-bad is &lt;0.10.5-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036654" version="1" comment="acroread is &lt;8.1.5-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036655" version="1" comment="quagga-devel is &lt;0.99.7-37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036656" version="1" comment="quagga is &lt;0.99.7-37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036657" version="1" comment="novell-ipsec-tools-devel is &lt;0.6.3-114.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036658" version="1" comment="novell-ipsec-tools is &lt;0.6.3-114.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036659" version="1" comment="ipsec-tools is &lt;0.6.5-104.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036660" version="1" comment="squirrelmail is &lt;1.4.18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054500" version="1" comment="OpenEXR-32bit is &lt;1.4.0a-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054501" version="1" comment="OpenEXR-64bit is &lt;1.4.0a-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054502" version="1" comment="OpenEXR-devel is &lt;1.4.0a-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054503" version="1" comment="OpenEXR is &lt;1.4.0a-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053469" version="1" comment="libsndfile-32bit is &lt;1.0.17-81.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053470" version="1" comment="libsndfile-64bit is &lt;1.0.17-81.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053471" version="1" comment="libsndfile-devel is &lt;1.0.17-81.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053472" version="1" comment="libsndfile-octave is &lt;1.0.17-81.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053473" version="1" comment="libsndfile-progs is &lt;1.0.17-81.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053474" version="1" comment="libsndfile is &lt;1.0.17-81.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036661" version="1" comment="ImageMagick-devel is &lt;6.3.5.10-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036662" version="1" comment="ImageMagick-extra is &lt;6.3.5.10-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036663" version="1" comment="ImageMagick is &lt;6.3.5.10-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036664" version="1" comment="libMagick++-devel is &lt;6.3.5.10-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036665" version="1" comment="libMagick++10 is &lt;6.3.5.10-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036666" version="1" comment="libMagick10 is &lt;6.3.5.10-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036667" version="1" comment="libWand10 is &lt;6.3.5.10-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036668" version="1" comment="perl-PerlMagick is &lt;6.3.5.10-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036669" version="1" comment="GraphicsMagick-devel is &lt;1.1.8-20.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036670" version="1" comment="GraphicsMagick is &lt;1.1.8-20.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036671" version="1" comment="libGraphicsMagick++-devel is &lt;1.1.8-20.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036672" version="1" comment="libGraphicsMagick++1 is &lt;1.1.8-20.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036673" version="1" comment="libGraphicsMagick1 is &lt;1.1.8-20.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036674" version="1" comment="libGraphicsMagickWand0 is &lt;1.1.8-20.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036675" version="1" comment="perl-GraphicsMagick is &lt;1.1.8-20.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054055" version="1" comment="Xerces-c is &lt;2.7.0-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054056" version="1" comment="libXerces-c-27 is &lt;2.7.0-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054057" version="1" comment="libXerces-c-devel is &lt;2.7.0-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053085" version="1" comment="gstreamer010-plugins-good-doc is &lt;0.10.6-41.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053086" version="1" comment="gstreamer010-plugins-good-extra is &lt;0.10.6-41.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053087" version="1" comment="gstreamer010-plugins-good is &lt;0.10.6-41.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036676" version="1" comment="irssi-devel is &lt;0.8.11-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036677" version="1" comment="irssi is &lt;0.8.11-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053362" version="1" comment="libpng-32bit is &lt;1.2.18-15.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053363" version="1" comment="libpng-64bit is &lt;1.2.18-15.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053364" version="1" comment="libpng-devel-32bit is &lt;1.2.18-15.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053365" version="1" comment="libpng-devel-64bit is &lt;1.2.18-15.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053366" version="1" comment="libpng-devel is &lt;1.2.18-15.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053367" version="1" comment="libpng is &lt;1.2.18-15.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053447" version="1" comment="openswan-doc is &lt;2.4.7-64.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053448" version="1" comment="openswan is &lt;2.4.7-64.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053730" version="1" comment="libtiff3-32bit is &lt;3.8.2-68.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053731" version="1" comment="libtiff3-64bit is &lt;3.8.2-68.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053732" version="1" comment="libtiff3 is &lt;3.8.2-68.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053640" version="1" comment="nagios-www is &lt;2.9-48.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053641" version="1" comment="nagios is &lt;2.9-48.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054058" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-68.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054059" version="1" comment="libtiff-devel-64bit is &lt;3.8.2-68.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054060" version="1" comment="libtiff-devel is &lt;3.8.2-68.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054061" version="1" comment="libtiff3-32bit is &lt;3.8.2-68.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054062" version="1" comment="libtiff3-64bit is &lt;3.8.2-68.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054063" version="1" comment="libtiff3 is &lt;3.8.2-68.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054064" version="1" comment="tiff is &lt;3.8.2-68.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053961" version="1" comment="libfreebl3-32bit is &lt;3.12.3.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053962" version="1" comment="libfreebl3-64bit is &lt;3.12.3.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053963" version="1" comment="libfreebl3 is &lt;3.12.3.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054853" version="1" comment="mozilla-nspr-32bit is &lt;4.7.1-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054854" version="1" comment="mozilla-nspr-64bit is &lt;4.7.1-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054855" version="1" comment="mozilla-nspr-devel is &lt;4.7.1-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054856" version="1" comment="mozilla-nspr is &lt;4.7.1-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053964" version="1" comment="mozilla-nss-32bit is &lt;3.12.3.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053965" version="1" comment="mozilla-nss-64bit is &lt;3.12.3.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053966" version="1" comment="mozilla-nss-devel is &lt;3.12.3.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053967" version="1" comment="mozilla-nss-tools is &lt;3.12.3.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053968" version="1" comment="mozilla-nss is &lt;3.12.3.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054917" version="1" comment="mutt is &lt;1.5.16-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055782" version="1" comment="neon-32bit is &lt;0.26.4-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055783" version="1" comment="neon-64bit is &lt;0.26.4-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055784" version="1" comment="neon-devel is &lt;0.26.4-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055785" version="1" comment="neon is &lt;0.26.4-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054857" version="1" comment="MozillaThunderbird-devel is &lt;2.0.0.23-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054858" version="1" comment="MozillaThunderbird-translations is &lt;2.0.0.23-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054859" version="1" comment="MozillaThunderbird is &lt;2.0.0.23-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054918" version="1" comment="openldap2-back-meta is &lt;2.3.37-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054919" version="1" comment="openldap2-back-perl is &lt;2.3.37-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054920" version="1" comment="openldap2-client-32bit is &lt;2.3.37-20.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054921" version="1" comment="openldap2-client-64bit is &lt;2.3.37-20.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054922" version="1" comment="openldap2-client is &lt;2.3.37-20.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054923" version="1" comment="openldap2-devel-32bit is &lt;2.3.37-20.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054924" version="1" comment="openldap2-devel-64bit is &lt;2.3.37-20.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054925" version="1" comment="openldap2-devel is &lt;2.3.37-20.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054926" version="1" comment="openldap2 is &lt;2.3.37-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053831" version="1" comment="subversion-devel is &lt;1.4.4-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053832" version="1" comment="subversion-perl is &lt;1.4.4-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053833" version="1" comment="subversion-python is &lt;1.4.4-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053834" version="1" comment="subversion-server is &lt;1.4.4-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053835" version="1" comment="subversion-tools is &lt;1.4.4-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053836" version="1" comment="subversion is &lt;1.4.4-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055506" version="1" comment="libapr-util1-64bit is &lt;1.2.8-68.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055507" version="1" comment="libapr-util1-dbd-mysql is &lt;1.2.8-68.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055508" version="1" comment="libapr-util1-dbd-pgsql is &lt;1.2.8-68.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055509" version="1" comment="libapr-util1-dbd-sqlite3 is &lt;1.2.8-68.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055510" version="1" comment="libapr-util1-devel-64bit is &lt;1.2.8-68.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055511" version="1" comment="libapr-util1-devel is &lt;1.2.8-68.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055512" version="1" comment="libapr-util1 is &lt;1.2.8-68.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055513" version="1" comment="libapr1-64bit is &lt;1.2.9-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055514" version="1" comment="libapr1-devel-64bit is &lt;1.2.9-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055515" version="1" comment="libapr1-devel is &lt;1.2.9-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055516" version="1" comment="libapr1 is &lt;1.2.9-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053788" version="1" comment="libxml2-32bit is &lt;2.6.30-4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053789" version="1" comment="libxml2-64bit is &lt;2.6.30-4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053790" version="1" comment="libxml2-devel-32bit is &lt;2.6.30-4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053791" version="1" comment="libxml2-devel-64bit is &lt;2.6.30-4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053792" version="1" comment="libxml2-devel is &lt;2.6.30-4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053793" version="1" comment="libxml2 is &lt;2.6.30-4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054817" version="1" comment="libxml-32bit is &lt;1.8.17-450.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054818" version="1" comment="libxml-64bit is &lt;1.8.17-450.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054819" version="1" comment="libxml-devel is &lt;1.8.17-450.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054820" version="1" comment="libxml is &lt;1.8.17-450.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053907" version="1" comment="libcurl3 is &lt;7.15.5-34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053908" version="1" comment="libcurl2-32bit is &lt;7.11.0-32.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053909" version="1" comment="libcurl2-64bit is &lt;7.11.0-32.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053910" version="1" comment="libcurl2 is &lt;7.11.0-32.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053911" version="1" comment="curl-ca-bundle is &lt;7.16.4-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053912" version="1" comment="curl is &lt;7.16.4-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053913" version="1" comment="libcurl-devel is &lt;7.16.4-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053914" version="1" comment="libcurl4-32bit is &lt;7.16.4-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053915" version="1" comment="libcurl4-64bit is &lt;7.16.4-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053916" version="1" comment="libcurl4 is &lt;7.16.4-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053743" version="1" comment="java-1_6_0-sun-alsa is &lt;1.6.0.u15-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053744" version="1" comment="java-1_6_0-sun-demo is &lt;1.6.0.u15-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053745" version="1" comment="java-1_6_0-sun-devel is &lt;1.6.0.u15-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053746" version="1" comment="java-1_6_0-sun-jdbc is &lt;1.6.0.u15-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053747" version="1" comment="java-1_6_0-sun-plugin is &lt;1.6.0.u15-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053748" version="1" comment="java-1_6_0-sun-src is &lt;1.6.0.u15-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053749" version="1" comment="java-1_6_0-sun is &lt;1.6.0.u15-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053750" version="1" comment="java-1_5_0-sun-alsa is &lt;1.5.0_update20-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053751" version="1" comment="java-1_5_0-sun-demo is &lt;1.5.0_update20-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053752" version="1" comment="java-1_5_0-sun-devel is &lt;1.5.0_update20-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053753" version="1" comment="java-1_5_0-sun-jdbc is &lt;1.5.0_update20-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053754" version="1" comment="java-1_5_0-sun-plugin is &lt;1.5.0_update20-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053755" version="1" comment="java-1_5_0-sun-src is &lt;1.5.0_update20-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053756" version="1" comment="java-1_5_0-sun is &lt;1.5.0_update20-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054504" version="1" comment="wireshark-devel is &lt;0.99.6-31.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054505" version="1" comment="wireshark is &lt;0.99.6-31.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054313" version="1" comment="xerces-j2-demo is &lt;2.8.1-85.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054314" version="1" comment="xerces-j2-javadoc-apis is &lt;2.8.1-85.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054315" version="1" comment="xerces-j2-javadoc-dom3 is &lt;2.8.1-85.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054316" version="1" comment="xerces-j2-javadoc-impl is &lt;2.8.1-85.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054317" version="1" comment="xerces-j2-javadoc-other is &lt;2.8.1-85.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054318" version="1" comment="xerces-j2-javadoc-xni is &lt;2.8.1-85.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054319" version="1" comment="xerces-j2-scripts is &lt;2.8.1-85.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054320" version="1" comment="xerces-j2-xml-apis is &lt;2.8.1-85.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054321" version="1" comment="xerces-j2-xml-resolver is &lt;2.8.1-85.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054322" version="1" comment="xerces-j2 is &lt;2.8.1-85.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055135" version="1" comment="dovecot-devel is &lt;1.0.5-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055136" version="1" comment="dovecot is &lt;1.0.5-6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054927" version="1" comment="cyrus-imapd-devel is &lt;2.3.8-51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054928" version="1" comment="cyrus-imapd is &lt;2.3.8-51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054929" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.8-51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054930" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.8-51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054860" version="1" comment="MozillaFirefox-translations is &lt;3.0.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054861" version="1" comment="MozillaFirefox is &lt;3.0.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054862" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054863" version="1" comment="mozilla-xulrunner190-64bit is &lt;1.9.0.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054864" version="1" comment="mozilla-xulrunner190-devel is &lt;1.9.0.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054865" version="1" comment="mozilla-xulrunner190-gnomevfs-32bit is &lt;1.9.0.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054866" version="1" comment="mozilla-xulrunner190-gnomevfs-64bit is &lt;1.9.0.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054867" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054868" version="1" comment="mozilla-xulrunner190-translations-32bit is &lt;1.9.0.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054869" version="1" comment="mozilla-xulrunner190-translations-64bit is &lt;1.9.0.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054870" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054871" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054872" version="1" comment="python-xpcom190 is &lt;1.9.0.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054931" version="1" comment="openswan-doc is &lt;2.4.7-64.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054932" version="1" comment="openswan is &lt;2.4.7-64.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053794" version="1" comment="fetchmail is &lt;6.3.8-57.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053795" version="1" comment="fetchmailconf is &lt;6.3.8-57.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055189" version="1" comment="apache2-mod_php5 is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055190" version="1" comment="php5-bcmath is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055191" version="1" comment="php5-bz2 is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055192" version="1" comment="php5-calendar is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055193" version="1" comment="php5-ctype is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055194" version="1" comment="php5-curl is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055195" version="1" comment="php5-dba is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055196" version="1" comment="php5-dbase is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055197" version="1" comment="php5-devel is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055198" version="1" comment="php5-dom is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055199" version="1" comment="php5-exif is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055200" version="1" comment="php5-fastcgi is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055201" version="1" comment="php5-ftp is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055202" version="1" comment="php5-gd is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055203" version="1" comment="php5-gettext is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055204" version="1" comment="php5-gmp is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055205" version="1" comment="php5-hash is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055206" version="1" comment="php5-iconv is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055207" version="1" comment="php5-imap is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055208" version="1" comment="php5-json is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055209" version="1" comment="php5-ldap is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055210" version="1" comment="php5-mbstring is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055211" version="1" comment="php5-mcrypt is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055212" version="1" comment="php5-mhash is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055213" version="1" comment="php5-mysql is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055214" version="1" comment="php5-ncurses is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055215" version="1" comment="php5-odbc is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055216" version="1" comment="php5-openssl is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055217" version="1" comment="php5-pcntl is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055218" version="1" comment="php5-pdo is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055219" version="1" comment="php5-pear is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055220" version="1" comment="php5-pgsql is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055221" version="1" comment="php5-posix is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055222" version="1" comment="php5-pspell is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055223" version="1" comment="php5-readline is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055224" version="1" comment="php5-shmop is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055225" version="1" comment="php5-snmp is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055226" version="1" comment="php5-soap is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055227" version="1" comment="php5-sockets is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055228" version="1" comment="php5-sqlite is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055229" version="1" comment="php5-suhosin is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055230" version="1" comment="php5-sysvmsg is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055231" version="1" comment="php5-sysvsem is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055232" version="1" comment="php5-sysvshm is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055233" version="1" comment="php5-tidy is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055234" version="1" comment="php5-tokenizer is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055235" version="1" comment="php5-wddx is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055236" version="1" comment="php5-xmlreader is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055237" version="1" comment="php5-xmlrpc is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055238" version="1" comment="php5-xmlwriter is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055239" version="1" comment="php5-xsl is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055240" version="1" comment="php5-zip is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055241" version="1" comment="php5-zlib is &lt;5.2.11-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054262" version="1" comment="xemacs-el is &lt;21.5.28.20070807-24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054263" version="1" comment="xemacs-info is &lt;21.5.28.20070807-24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054264" version="1" comment="xemacs is &lt;21.5.28.20070807-24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054443" version="1" comment="finch-devel is &lt;2.3.1-26.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054444" version="1" comment="finch is &lt;2.3.1-26.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054445" version="1" comment="libpurple-devel is &lt;2.3.1-26.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054446" version="1" comment="libpurple-meanwhile is &lt;2.3.1-26.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054447" version="1" comment="libpurple-mono is &lt;2.3.1-26.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054448" version="1" comment="libpurple is &lt;2.3.1-26.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054449" version="1" comment="pidgin-devel is &lt;2.3.1-26.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054450" version="1" comment="pidgin is &lt;2.3.1-26.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054782" version="1" comment="gnutls-32bit is &lt;1.6.1-36.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054783" version="1" comment="gnutls-64bit is &lt;1.6.1-36.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054784" version="1" comment="gnutls-devel-32bit is &lt;1.6.1-36.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054785" version="1" comment="gnutls-devel-64bit is &lt;1.6.1-36.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054786" version="1" comment="gnutls-devel is &lt;1.6.1-36.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054787" version="1" comment="gnutls is &lt;1.6.1-36.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055517" version="1" comment="cifs-mount is &lt;3.0.32-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055518" version="1" comment="ldapsmb is &lt;1.34b-110.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055519" version="1" comment="libmsrpc-devel is &lt;3.0.32-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055520" version="1" comment="libmsrpc is &lt;3.0.32-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055521" version="1" comment="libsmbclient-32bit is &lt;3.0.32-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055522" version="1" comment="libsmbclient-64bit is &lt;3.0.32-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055523" version="1" comment="libsmbclient-devel is &lt;3.0.32-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055524" version="1" comment="libsmbclient is &lt;3.0.32-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055525" version="1" comment="libsmbsharemodes-devel is &lt;3.0.32-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055526" version="1" comment="libsmbsharemodes is &lt;3.0.32-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055527" version="1" comment="samba-32bit is &lt;3.0.32-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055528" version="1" comment="samba-64bit is &lt;3.0.32-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055529" version="1" comment="samba-client-32bit is &lt;3.0.32-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055530" version="1" comment="samba-client-64bit is &lt;3.0.32-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055531" version="1" comment="samba-client is &lt;3.0.32-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055532" version="1" comment="samba-devel is &lt;3.0.32-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055533" version="1" comment="samba-krb-printing is &lt;3.0.32-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055534" version="1" comment="samba-python is &lt;3.0.32-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055535" version="1" comment="samba-vscan is &lt;0.3.6b-181.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055536" version="1" comment="samba-winbind-32bit is &lt;3.0.32-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055537" version="1" comment="samba-winbind-64bit is &lt;3.0.32-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055538" version="1" comment="samba-winbind is &lt;3.0.32-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055539" version="1" comment="samba is &lt;3.0.32-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055398" version="1" comment="newt-32bit is &lt;0.52.7-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055399" version="1" comment="newt-64bit is &lt;0.52.7-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055400" version="1" comment="newt-devel is &lt;0.52.7-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055401" version="1" comment="newt-doc is &lt;0.52.7-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055402" version="1" comment="newt-static is &lt;0.52.7-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055403" version="1" comment="newt is &lt;0.52.7-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054821" version="1" comment="dnsmasq is &lt;2.45-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055110" version="1" comment="freeradius-devel is &lt;1.1.6-47.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055111" version="1" comment="freeradius-dialupadmin is &lt;1.1.6-47.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055112" version="1" comment="freeradius is &lt;1.1.6-47.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055030" version="1" comment="postgresql-contrib is &lt;8.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055031" version="1" comment="postgresql-devel is &lt;8.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055032" version="1" comment="postgresql-docs is &lt;8.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055033" version="1" comment="postgresql-libs-32bit is &lt;8.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055034" version="1" comment="postgresql-libs-64bit is &lt;8.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055035" version="1" comment="postgresql-libs is &lt;8.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055036" version="1" comment="postgresql-server is &lt;8.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055037" version="1" comment="postgresql is &lt;8.2.14-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055786" version="1" comment="cyrus-imapd-devel is &lt;2.3.8-51.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055787" version="1" comment="cyrus-imapd is &lt;2.3.8-51.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055788" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.8-51.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055789" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.8-51.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055129" version="1" comment="wireshark-devel is &lt;0.99.6-31.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055130" version="1" comment="wireshark is &lt;0.99.6-31.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056068" version="1" comment="xpdf-tools is &lt;3.02-19.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056069" version="1" comment="xpdf is &lt;3.02-19.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056238" version="1" comment="cups-client is &lt;1.2.12-22.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056239" version="1" comment="cups-devel is &lt;1.2.12-22.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056240" version="1" comment="cups-libs-32bit is &lt;1.2.12-22.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056241" version="1" comment="cups-libs-64bit is &lt;1.2.12-22.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056242" version="1" comment="cups-libs is &lt;1.2.12-22.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056243" version="1" comment="cups is &lt;1.2.12-22.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055726" version="1" comment="viewvc is &lt;1.0.9-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055540" version="1" comment="phpMyAdmin is &lt;2.11.9.6-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056025" version="1" comment="expat is &lt;2.0.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056026" version="1" comment="libexpat-devel is &lt;2.0.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056027" version="1" comment="libexpat1-32bit is &lt;2.0.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056028" version="1" comment="libexpat1-64bit is &lt;2.0.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056029" version="1" comment="libexpat1 is &lt;2.0.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037309"/>
	</rpminfo_test>
 </tests>
 <objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openSUSE-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomboy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NX</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-dom-inspector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-irc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-mail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-spellchecker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-venkman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tkimg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL_image-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL_image-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL_image-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL_image</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-example-pages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-prefork</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-worker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-kdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xenpae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient15-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r15-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-Max</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-bench</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-relay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flash-player</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygems</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xgl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>novell-ipsec-tools-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>novell-ipsec-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat55-admin-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat55-common-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat55-jasper-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat55-jasper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat55-jsp-2_0-api-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat55-jsp-2_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat55-server-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat55-servlet-2_4-api-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat55-servlet-2_4-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat55-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat55</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_jk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm10-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netpbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>claws-mail-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>claws-mail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cacti</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activesupport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt_debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librpcsecgss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>t1lib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>t1lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-qt4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>koffice-database-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>koffice-database-psql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>koffice-database</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>koffice-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>koffice-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>koffice-illustration</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>koffice-planning</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>koffice-presentation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>koffice-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>koffice-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>koffice-spreadsheet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>koffice-wordprocessing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>koffice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xpdf-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xpdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmailconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libs-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-kdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cifs-mount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldapsmb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmsrpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmsrpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbsharemodes-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbsharemodes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-krb-printing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-vscan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-calc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-draw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-impress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-kde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-mailmerge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-mono</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-officebean</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-pyuno</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-sdk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-testtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-writer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC++6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC++6-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_cml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_magnet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_mysql_vhost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_trigger_b4_dl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_webdav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-askpass</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-libs-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-af</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-be-BY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-bg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-cy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-en-GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-et</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-fi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-gu-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-hi-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-hr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-km</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-lt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-mk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-nb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-nn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-pa-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-pt-BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-rw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-sk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-sl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-sr-CS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-st</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-tr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-ts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-vi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-xh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-zh-CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-zh-TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-zu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icu-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>epiphany-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>epiphany-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>epiphany-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>epiphany</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner181-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner181-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner181-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner181-l10n</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner181</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opal-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-gdbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>GraphicsMagick-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>GraphicsMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick++1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagickWand0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-GraphicsMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-certs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-openssl097g-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-openssl097g-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-openssl097g</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tk-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tk-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-doc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-doc-ri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-test-suite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-plugins-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-hpijs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-sun-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-sun-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-sun-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-sun-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-sun-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-sun-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-sun</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-sun-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-sun-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-sun-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-sun-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-sun-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-sun</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionpack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>RealPlayer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>phpMyAdmin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-www</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-meta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-nox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-apps-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-apps-servers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-doc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools-domU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools-ioemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-cjk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-dvilj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-metapost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-omega</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-xetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>epiphany-extensions-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>epiphany-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-dbus-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-dbus-1-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-dbus-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xemacs-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xemacs-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xemacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>htdig-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>htdig-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>htdig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnump3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-core-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav-db</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-screensaver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xfce4-panel-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xfce4-panel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxfcegui4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxfcegui4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio++0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio7-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio_cdda0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio_paranoia0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libiso9660-5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libiso9660-5-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libiso9660-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmikmod-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmikmod-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmikmod-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmikmod</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-rus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-std</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-ijs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-library</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-omni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpprint-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-pilot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xine-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xine-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xine-lib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xine-lib-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xine-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xine-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-chrootenv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-af</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-be</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-bg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-bs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-de_du</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-et</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-eu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-fa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-fi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-ga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-he</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-hi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-hr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-id</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-is</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-ka</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-km</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-kn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-lt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-lv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-mi_tn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-ms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-nn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-no</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-ro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-sk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-sl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-so</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-sq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-sr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-th</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-tl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-tr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-uk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-vi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle-zh_cn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moodle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-mono</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-qt3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-qt3-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-qt3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-qt3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnumeric-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnumeric</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-jetty-servlet-container</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-tomcat-servlet-container</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-SNMP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>snmp-mibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libWand10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PerlMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rxvt-unicode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sarg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>silc-toolkit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>silc-toolkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>horde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>viewvc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_php5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-bcmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-bz2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ctype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-dba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-dbase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-dom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-exif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-fastcgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-gettext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-hash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-iconv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-imap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mbstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mhash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ncurses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pcntl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-posix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-readline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-shmop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-suhosin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sysvmsg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sysvsem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sysvshm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-tidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-tokenizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-wddx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xmlreader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xmlrpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xmlwriter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>namazu-cgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>namazu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>namazu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>otrs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff3-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audit-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audit-libs-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audit-libs-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audit-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-recursor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-arts-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-arts-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-arts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-default-style-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-default-style-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-default-style</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vorbis-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer010-plugins-good-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer010-plugins-good-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer010-plugins-good</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rdesktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>licq-icqnd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>licq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>struts-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>struts-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>struts-webapps-tomcat5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>struts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xemacs-packages-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xemacs-packages-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xemacs-packages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopensc2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopensc2-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopensc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mtr-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mtr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squirrelmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>courier-authlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>courier-authlib-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>courier-authlib-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>courier-authlib-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>courier-authlib-pipe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>courier-authlib-userdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>courier-authlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xterm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib2-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib2-loaders</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-enhanced</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>finch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>finch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-meanwhile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-mono</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-client-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-sqlite2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bytefx-data-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibm-data-db2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-complete</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-core-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-firebird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-oracle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-sybase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-jscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-locale-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-nunit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-winforms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uvcvideo-kmp-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uvcvideo-kmp-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uvcvideo-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uvcvideo-kmp-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uvcvideo-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uvcvideo-kmp-xenpae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jasper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-arch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-cvs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-email</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-svn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gitk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipsec-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_krb5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_krb5-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>enscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_mount-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_mount-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_mount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activerecord</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-python-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hal-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hal-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hal-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>powersave-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>powersave-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>powersave-libs-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>powersave-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>powersave</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ndiswrapper-kmp-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ndiswrapper-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ndiswrapper-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ndiswrapper-kmp-xenpae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ndiswrapper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-dialupadmin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-guile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-ocaml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-php</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-sharp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jhead</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lynx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgadu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgadu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>valgrind-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>valgrind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imap-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>htop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-howl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-howl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-mDNSResponder-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-mDNSResponder-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-mDNSResponder-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-mDNSResponder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-glib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-glib-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-qt3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-qt4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>optipng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mediawiki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-guest-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-driver-virtualbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>phpPgAdmin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netatalk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netatalk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>psi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xntp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xntp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-dbd-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-dbd-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-dbd-sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl-ca-bundle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eID-belgium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kpartx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>multipath-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnasl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>amarok-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>amarok-libvisual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>amarok-xine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>amarok-yauap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>amarok</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3-3D</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3-fax</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3-imaging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3-kamera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3-postscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3-scan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3-tex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-octave</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-progs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ganglia-monitor-core-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ganglia-monitor-core-gmetad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ganglia-monitor-core-gmond</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ganglia-monitor-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ganglia-webfrontend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sbl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-kde-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-kde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-openvpn-kde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-vpnc-kde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audacity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-crypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DBD-Pg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-crammd5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-crammd5-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-crammd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-digestmd5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-digestmd5-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-digestmd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-otp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-otp-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-otp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openswan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-sun-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvolume_id-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvolume_id</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190-gnomevfs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190-gnomevfs-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190-gnomevfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190-translations-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190-translations-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xpcom190</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>memcached</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Compress-Raw-Zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer010-plugins-bad-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer010-plugins-bad-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer010-plugins-bad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quagga-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quagga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenEXR-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenEXR-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenEXR-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenEXR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Xerces-c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXerces-c-27</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXerces-c-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>irssi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>irssi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>neon-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>neon-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>neon-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>neon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr1-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr1-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl2-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-javadoc-apis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-javadoc-dom3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-javadoc-impl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-javadoc-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-javadoc-xni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-xml-apis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-xml-resolver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-imapd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-imapd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Cyrus-IMAP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Cyrus-SIEVE-managesieve</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>newt-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>newt-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>newt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>newt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>newt-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>newt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>expat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1</name>
	</rpminfo_object>
 </objects>
 <states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">10.3</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.0-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-35.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:804.027-95.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3-125.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.6-25.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.4-70.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.22.12-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.45-22.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.7-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.6-24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.124.0-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.2-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.2-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.2-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:git_070104-77.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.14.1-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.3-114.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.23-113.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.21-59.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.23-113.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.45-22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.26.44-10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16-39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.0-35.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.6j-62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.22.16-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.22.16-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.1-91.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2-143.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.14-71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.1-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.115.0-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.151.0-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.12-22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.12-22.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.4-101.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-51.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.02-19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.8-57.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.1-91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2-103.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2-56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2-143.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2-135.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.7-83</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.22.9-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.26a-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-110.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-181.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.0.1.2-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.18-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6p1-58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.2.6-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.0.1.2-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.0.1.2-10.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6-13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.20.0-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1.13-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0.13-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.8-60.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.1-39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.8-20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8e-45.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1-13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.4-70.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.8.8-76.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8e-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-75.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.15-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.6.p36-20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12r+2.13rc2+git20070725-24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.9-19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.99.4-33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.7-37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_update13-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.u3-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.18-15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0.9-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.3-20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.7-60.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.5-100.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.9-11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.40.2-20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.22.13-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.10-25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.24-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.0-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9-48.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.37-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.37-20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2-103.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2-143.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:22.1-40.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.12-22.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.0_15042-51.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2007-68.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.20.0-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1.10-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0.10-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.1-23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.26a-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-110.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-181.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.6j-64.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:21.5.28.20070807-24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:22.1-40.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.0b6-110.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.6-31.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.8-84.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.15.13-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.9-55.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.22.17-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.STABLE14-23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.22.18-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.30-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.92-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.16-23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.12-80.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.20.0-6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.4-70.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-35.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.25-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.1-61.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.1-55.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.93-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.78.2-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.37-7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.37-20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.22.19-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.11a-34.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.15.4-3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-178.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0.17-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.12-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1.17-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.20.0-8.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1.18-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0.18-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.13-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.12-22.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.12-22.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-22.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12.0-5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.8-14.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.5-62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.1.P1-12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.2-17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.33.1-108.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.8-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.92.1-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-86.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.15.4-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-178.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0.12-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.8-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.20.0-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1.12-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.15-25.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.9-90.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-59.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.74-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.63-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.82.0-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.62-110.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-67.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.12-22.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.2-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.11-32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2-14.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1-138.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.6j-64.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.2-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.20.0-6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.52-77.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.1-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.1-19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.18-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.2-17.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.6-31.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.26-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.5.10-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.8-20.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.26a-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-110.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-181.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12.0-5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.3-16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.6.p36-20.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.9-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.9.4-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3.1-39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.u5-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_update15-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.23-113.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0.14-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.4-55.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-42.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:git_070104-77.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.20.0-8.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1.14-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.18-15.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.6-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.94-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.1.P1-12.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.45-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.18-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.8-14.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.5-62.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6p1-58.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.2-17.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.7-39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.18-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-14.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.6-31.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-68.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.STABLE14-23.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.5-13.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.5-20.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.4-58.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.93.0.svn712047-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.7-72.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.1-39.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-112.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.6-41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.8-14.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.5-62.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.12-22.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.4-101.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.9-55.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.27-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.20-41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-79.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.5-18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3.1-39.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.8.8-76.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.23-113.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-36.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.4-125.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.0.cvs-35.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.9-108.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_update17-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.u11-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20070427-27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:22.1-40.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-14.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.3-21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.3-21.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.0.1.2-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.0.1.2-10.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-68.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.72-94.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.132-33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.4-70.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2-14.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.18-13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.18-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.10a-45.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.59.3-44.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:229-17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-66.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.2_SU1-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.59.3-44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15-8.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.93.3-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.93.1-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.50-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0.16-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.11-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0.15-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.6-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.20-41.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.5-20.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.7-37.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.37-7.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.37-20.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.9p2-23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.51-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.u7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_update16-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.8-20.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.6-31.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.27.2-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.26-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.8-14.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.30-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.2-17.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.21-57.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-16.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.6.p369-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:r117_2.6.22.18_0.2-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.1-44.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2.4-24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.12-22.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.12-22.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.3-114.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.5-104.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.6-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.17-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.10a-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.17-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-59.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-67.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.4-83.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.5-20.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.6-31.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:22.1-40.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.45-22.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.18-84.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.3-20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.4-22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.30-4.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.30-4.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.18-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.1-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.18-13.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-59.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.74-25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.63-90.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.82.0-28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.62-110.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-67.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.9_git20070831-13.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.18-13.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.9_git20070831-13.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.17-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.14.1-4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.47_2.6.22.19_0.1-32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.47-32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.45-22.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.6-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.22.19-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12-50.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7-11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.6-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.60-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.61-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.62-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.1-39.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3-57.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.22.19-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-36.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-36.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2006c1_suse-51.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0.18-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.94.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.6-24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8e-45.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-75.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.20-40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.0-30.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.18-84.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-66.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.3-20.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.0-32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-10.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.21-57.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.94.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.2-17.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.9-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.152.0-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0.19-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1.19-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.23-113.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2.4-24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.21-59.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.6-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3-19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.63-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.3-130.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.6-77.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.18-15.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.9-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.1-19.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.95-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-14.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4p3-25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.8-68.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.1.P1-12.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.9p2-23.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.16.4-16.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.18-15.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.18-15.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0.21post-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.16-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.9-119.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.159.0-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.7-80.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.10-15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.7-37.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.4-101.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.7-60.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.02-19.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.12-22.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6-13.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4p3-25.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.17-81.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.4-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.6-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.0.1.2-10.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.7-99.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0f-16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.5-37.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2r674918-55.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.3-21.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.6-41.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.2-17.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-103.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16-39.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.0-5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.15.4-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-178.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8e-45.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-75.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.6-31.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.49-76.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.22.19-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.22-82.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.6-24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.1.P1-12.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.8-14.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.2-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.7-64.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.12-22.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.02-19.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-22.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.246.0-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.64-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.2.13-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.5-18.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_update18-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.u12-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.9.5-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.2-17.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:114-19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.12-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.4-70.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.6-31.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.00-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.8-14.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.866-15.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0.22-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.18-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.8.4-92.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.95.1-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-26.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8e-45.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8e-45.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.005-17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.5-36.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.5-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.7-37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.3-114.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.5-104.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.18-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.0a-36.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.17-81.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.5.10-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.8-20.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-75.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.6-41.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.11-19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.18-15.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.7-64.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-68.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9-48.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-68.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.3.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.1-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.16-36.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.26.4-17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0.23-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.37-7.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.37-20.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.4-30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.8-68.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.9-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.30-4.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.17-450.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.15.5-34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.11.0-32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.16.4-16.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.u15-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_update20-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.6-31.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.1-85.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.8-51.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.14-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.14-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.7-64.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.8-57.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.11-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:21.5.28.20070807-24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-26.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-36.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.32-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-110.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-181.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.52.7-36.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.45-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.6-47.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.2.14-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.8-51.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.6-31.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.02-19.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.12-22.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.9-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.9.6-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-24.2</evr>
  </rpminfo_state>
 </states>
</oval_definitions>
